SLGP Header

An Analysis on Efficient Reversible Data Hiding Technique in Image Processing

IJEECC Front Page

Communication plays a major role in the technological field. Data hiding is one such application of communication where a secrecy or protection is maintained throughout a particular communication. The paper introduces a new technology for data hiding in image processing, called rhombus prediction embedding algorithm with boundary expansion. The paper also made an analysis of the compression of a location map that plays a major role in increased embedding efficiency. Later the entire hidden data can be retrieved with making no change in the original image thereby showing perfection in data retrieval from the image after use. The entire data hiding system for a particular image has been tried to analyzed and conclude in ModelSim software in VHDL language and MATLAB.
Keywords:Rhombus prediction, embedding efficiency, VHDL, MATLAB, boundary expansion, ModelSim.


  1. Y. Q. Shi, “Reversible data hiding,” in Proc. IWDW, vol. 3304. 2004, pp. 1–12.
  2. R. Caldelli, F. Filippini, and R. Becarelli, “Reversible watermarking techniques: An overview and a classification,” EURASIP J. Inf. Security, vol. 2010, Jun. 2010, Art. ID 134546.
  3. J. M. Barton, “Method and apparatus for embedding authentication information within digital data,” U.S. Patent 5 646 997, Jul. 8, 1997.
  4. C. W. Honsinger, P. W. Jones, M. Rabbani, and J. C. Stoffel, “Lossless recovery of an original image containing embedded data,”U.S. Patent 6 278 791, Aug. 21, 2001.
  5. G. Coatrieux, C. Le Guillou, J.-M.Cauvin, and C. Roux, “Reversible watermarking for knowledge digest embedding and reliability control in medical images,” IEEE Trans. Inf. Technol. Biomed., vol. 13, no. 2,pp. 158–165, Mar. 2009.
  6. F. Battisti, M. Carli, and A. Neri, “Secure annotation for medical images based on reversible watermarking in the Integer Fibonacci–Haar transform domain,” Proc. SPIE, vol. 7870, p. 78700G, Feb. 2011.
  7. S. Lee, C. D. Yoo, and T. Kalker, “Reversible image watermarking based on integer-to-integer wavelet transform,” IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp. 321–330, Sep. 2007.
  8. R. Y. M. Li, O. C. Au, C. K. M. Yuk, S.-K. Yip and T.-W. Chan, “Enhanced image trans-coding using reversible data hiding,” in Proc.IEEE ISCAS, May 2007, pp. 1273–1276.
  9. K. Hwang and D. Li, “Trusted cloud computing with secure resources and data colouring,” IEEE Internet Compute., vol. 14, no. 5, pp. 14–22, Sep./Oct. 2010.
  10. J. Fridrich, M. Goljan, and R. Du, “Invertible authentication,” Proc. SPIE, vol. 4314, pp. 197–208, Aug. 2001.
  11. J. Fridrich, M. Goljan, and R. Du, “Lossless data embedding—New paradigm in digital watermarking,” EURASIP J. Appl. Signal Process., vol. 2002, no. 2, pp. 185–196.