Abstract
Prediction-error expansion (PEE) is the most popular reversible data hiding (RDH) technique due to its efficient capacity-distortion tradeoff. With the generated prediction-error histogram (PEH) and adaptively selected expansion bins, the image redundancy is well exploited by PEE. However, for the most widely used rhombus predictor, the rounding operation which groups different prediction-errors into one value is completely unnecessary. The embedding can be extended to a general case by removing the rounding operation, and more histogram bins can be derived for expansion with a new mapping mechanism. Therefore, in this article, instead of pixel prediction-error, we propose to compute the pixel residuals without the rounding operation, and a new embedding mechanism based on pixel-residual histogram (PRH) modification is devised. In PRH, four bins correspond to one bin in PEH. Then, different from the one-to-one mapping between the prediction-error and pixel modification, a four-to-one mapping between the pixel-residual and pixel modification is established, and the performance is optimized by adaptively selecting four expansion bin pairs for embedding. Since more modification selections are considered, better performance can be obtained. Moreover, the proposed scheme is extended to the two-dimensional (2D) histogram and multiple histograms based embedding, and the performance is further enhanced. The superiority of the proposed method is experimentally verified by comparing it with some state-of-the-art works.
- [1] . 2004. Reversible watermark using the difference expansion of a generalized integer transform. IEEE Transactions on Image Processing 13, 8(2004), 1147–1156.Google Scholar
Digital Library
- [2] . 2019. Embedding distortion analysis in wavelet-domain watermarking. ACM Transactions on Multimedia Computing, Communications, and Applications 15, 4(2019), 24 pages.Google Scholar
Digital Library
- [3] . 2005. Lossless generalized-LSB data embedding. IEEE Transactions on Image Processing 14, 2 (2005), 253–266.Google Scholar
Digital Library
- [4] . 2017. High-Fidelity reversible data hiding using directionally enclosed prediction. IEEE Signal Processing Letters 24, 5 (2017), 574–578.Google Scholar
Cross Ref
- [5] . 2009. Reversible watermarking for knowledge digest embedding and reliability control in medical images. IEEE Transactions on Information Technology in Biomedicine 13, 2 (2009), 158–165.Google Scholar
Digital Library
- [6] . 2013. Reversible watermarking based on invariant image classification and dynamic histogram shifting. IEEE Transactions on Information Forensics and Security 8, 1(2013), 111–120.Google Scholar
Digital Library
- [7] . 2007. Digital Watermarking and Steganography, 2nd Edition. Morgan Kaufmann Publishers Inc., San Francisco, CA.Google Scholar
Digital Library
- [8] . 2014. Local-prediction-based difference expansion reversible watermarking. IEEE Transactions on Image Processing 23, 4 (2014), 1779.Google Scholar
Digital Library
- [9] . 2009. Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge, U.K.: Cambridge University Press.Google Scholar
Cross Ref
- [10] . 2001. Invertible authentication. In Proceedings of the Security and Watermarking of Multimedia Contents III.197–208.Google Scholar
Cross Ref
- [11] . 2020. An insight into pixel value ordering prediction-based prediction-error expansion. IEEE Transactions on Information Forensics and Security 15 (2020), 3859–3871.Google Scholar
Digital Library
- [12] . 2009. DE-Based reversible data hiding with improved overflow location map. IEEE Transactions on Circuits and Systems for Video Technology 19, 2 (2009), 250–260.Google Scholar
Digital Library
- [13] . 2016. Reversible data hiding in JPEG images. IEEE Transactions on Circuits and Systems for Video Technology 26, 9 (2016), 1610–1621.Google Scholar
Digital Library
- [14] . 2010. Reversible watermarking method using optimal histogram pair shifting based on prediction and sorting. TIIS 4, 4 (2010), 655–670.Google Scholar
- [15] . 2019. Skewed histogram shifting for reversible data hiding using a pair of extreme predictions. IEEE Transactions on Circuits and Systems for Video Technology 29, 11 (2019), 3236–3246.Google Scholar
Digital Library
- [16] . 2013. General framework to histogram-shifting-based reversible data hiding. IEEE Transactions on Image Processing 22, 6(2013), 2181–2191.Google Scholar
Digital Library
- [17] . 2013. High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Processing 93, 1 (2013), 198–205.Google Scholar
Digital Library
- [18] . 2015. Efficient reversible data hiding based on multiple histograms modification. IEEE Transactions on Information Forensics and Security 10, 9 (2015), 2016–2027.Google Scholar
Digital Library
- [19] . 2010. Reversible image watermarking using interpolation technique. IEEE Transactions on Information Forensics and Security 5, 1 (2010), 187–193.Google Scholar
Cross Ref
- [20] . 2020. Robust image watermarking using invariant accurate polar harmonic Fourier moments and chaotic mapping. Signal Processing 172 (2020), 107544.Google Scholar
Cross Ref
- [21] . 2016. A reversible data hiding scheme based on code division multiplexing. IEEE Transactions on Information Forensics and Security 11, 9 (2016), 1914–1927.Google Scholar
Digital Library
- [22] . 2018. A multiple linear regression based high-accuracy error prediction algorithm for reversible data hiding. In Proceedings of the IWDW (2018). Springer, 195–205.Google Scholar
- [23] . 2013. A generalized tamper localization approach for reversible watermarking algorithms. ACM Transactions on Multimedia Computing, Communications, and Applications 9, 3(2013), 22 pages.Google Scholar
Digital Library
- [24] . 2006. Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology 16, 3 (2006), 354–362.Google Scholar
Digital Library
- [25] . 2006. Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology 16, 3 (2006), 354–362.Google Scholar
Digital Library
- [26] . 2019. Improving pairwise PEE via hybrid-dimensional histogram generation and adaptive mapping selection. IEEE Transactions on Circuits and Systems for Video Technology 29, 7 (2019), 2176–2190.Google Scholar
Cross Ref
- [27] . 2013. Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Transactions on Image Processing 22, 12 (2013), 5010–5021.Google Scholar
Digital Library
- [28] . 2020. High capacity reversible data hiding based on multiple histograms modification. IEEE Transactions on Circuits and Systems for Video Technology 30, 8 (2020), 2329–2342.Google Scholar
Digital Library
- [29] . 2012. Adaptive reversible data hiding scheme based on integer transform. Signal Processing 92, 1 (2012), 54–62.Google Scholar
Digital Library
- [30] . 2020. Optimal reversible data hiding scheme based on multiple histograms modification. IEEE Transactions on Circuits and Systems for Video Technology 30, 8 (2020), 2300–2312.Google Scholar
Digital Library
- [31] . 2019. New framework of reversible data hiding in encrypted JPEG bitstreams. IEEE Transactions on Circuits and Systems for Video Technology 29, 2 (2019), 351–362.Google Scholar
Digital Library
- [32] . 2009. Reversible watermarking algorithm using sorting and prediction. IEEE Transactions on Circuits and Systems for Video Technology 19, 7(2009), 989–999.Google Scholar
Digital Library
- [33] . 2016. Reversible data hiding: Advances in the past two decades. IEEE Access 4 (2016), 3210–3237.Google Scholar
Cross Ref
- [34] . 1977. [online]. Retrieved from https://sipi.usc.edu/.Google Scholar
- [35] . 2007. Expansion embedding techniques for reversible watermarking. IEEE Transactions on Image Processing 16, 3(2007), 721–730.Google Scholar
Digital Library
- [36] . 2003. Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology 13, 8(2003), 890–896.Google Scholar
Digital Library
- [37] . 2020. Multiple histograms-based reversible data hiding: Framework and realization. IEEE Transactions on Circuits and Systems for Video Technology 30, 8 (2020), 2313–2328.Google Scholar
Digital Library
- [38] . 2017. Rate and distortion optimization for reversible data hiding using multiple histogram shifting. IEEE Transactions on Cybernetics 47, 2 (2017), 315–326.Google Scholar
- [39] . 2010. Efficient generalized integer transform for reversible watermarking. IEEE Signal Processing Letters 17, 6(2010), 567–570.Google Scholar
Cross Ref
- [40] . 2008. Reversible watermarking based on invariability and adjustment on pixel pairs. IEEE Signal Processing Letters 15 (2008), 721–724.Google Scholar
Cross Ref
- [41] . 2021. Efficient PVO-Based reversible data hiding by selecting blocks with full-enclosing context. IEEE Transactions on Circuits and Systems for Video Technology (2021), to be published.Google Scholar
- [42] . 2021. Efficient reversible data hiding for JPEG images with multiple histograms modification. IEEE Transactions on Circuits and Systems for Video Technology 31, 7 (2021), 2535–2546.Google Scholar
Cross Ref
- [43] . 2015. Robust color image watermarking using geometric invariant quaternion polar harmonic transform. ACM Transactions on Multimedia Computing, Communications, and Applications 11, 3(2015), 26 pages. .Google Scholar
Digital Library
- [44] . 2020. Reversible data hiding in JPEG images with multi-objective optimization. IEEE Transactions on Circuits and Systems for Video Technology 30, 8 (2020), 2343–2352.Google Scholar
Digital Library
- [45] . 2020. Location-Based PVO and adaptive pairwise modification for efficient reversible data hiding. IEEE Transactions on Information Forensics and Security 15 (2020), 2306–2319.Google Scholar
Digital Library
- [46] . 2013. Reversible data hiding with optimal value transfer. IEEE Transactions on Multimedia 15, 2 (2013), 316–325.Google Scholar
Digital Library
- [47] . 2016. Lossless and reversible data hiding in encrypted images with public-key cryptography. IEEE Transactions on Circuits and Systems for Video Technology 26, 9 (2016), 1622–1631.Google Scholar
Digital Library
- [48] . 2018. On the fault-tolerant performance for a class of robust image steganography. Signal Processing 146 (2018), 99–111.Google Scholar
Cross Ref
Index Terms
A Novel Reversible Data Hiding Scheme Based on Pixel-Residual Histogram
Recommendations
High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion
This paper presents a high-fidelity reversible data hiding scheme for digital images based on a new prediction strategy called pixel-value-ordering (PVO) and the well-known prediction-error expansion (PEE) technique. Specifically, a host image is first ...
A novel pixel value ordering reversible data hiding based on dual-image
AbstractRecently, reversible data hiding (RDH) based on pixel value order (PVO) has been an important research direction in the field of information security due to its high-fidelity characteristics. However, PVO-based schemes have low embedding ...
A novel reversible data hiding scheme based on AMBTC compression technique
Data hiding encompasses a wide range of applications for embedding messages in content. However, hiding data inevitably destroys the host image, even though the distortion is imperceptible. To enhance the hiding capacity and maintain the quality of the ...






Comments