172
Views
0
CrossRef citations to date
0
Altmetric
Computers and Computing

Improved Reversible Data Hiding Scheme Based on Mean Preservation and Difference Expansion

ORCID Icon, ORCID Icon & ORCID Icon

References

  • I. Cox, M. Miller, J. Bloom, J. Fridrich and T. Kalker, Digital Watermarking and Steganography. Amsterdam/Boston: Morgan Kaufmann Publishers Inc., 2008.
  • A. M. Alattar, “Reversible watermark using the difference expansion of a generalized integer transform,” IEEE. Trans. Image. Process., Vol. 13, no. 8, pp. 1147–1156, 2004.
  • J. Tian, “Reversible data embedding using a difference expansion,” IEEE. Trans. Circuits. Syst. Video. Technol., Vol. 13, no. 8, pp. 890–896, 2003.
  • N. Agarwal, A. K. Singh and P. K. Singh, “Survey of robust and imperceptible watermarking,” Multimed. Tools. Appl., Vol. 78, no. 7, pp. 8603–8633, 2019.
  • L. Kamstra and H. J. A. M. Heijmans, “Reversible data embedding into images using wavelet techniques and sorting,” IEEE. Trans. Image. Process., Vol. 14, no. 12, pp. 2082–2090, 2005.
  • S. Gujjunoori and M. Oruganti, “Difference expansion based reversible data embedding and edge detection,” Multimed. Tools. Appl., Vol. 78, no. 18, pp. 25889–25917, 2019.
  • C. C. Chang and T. C. Lu, “A difference expansion oriented data hiding scheme for restoring the original host images,” J. Syst. Softw., Vol. 79, no. 12, pp. 1754–1766, 2006.
  • D. M. Thodi and J. J. Rodriguez, “Prediction-error based reversible watermarking,” in International Conference on Image Processing (ICIP'04), Singapore, IEEE, Vol. 3, 2004, pp. 1549–1552.
  • C. F. Lee, H. L. Chen and H. K. Tso, “Embedding capacity raising in reversible data hiding based on prediction of difference expansion,” J. Syst. Softw., Vol. 83, no. 10, pp. 1864–1872, 2010.
  • M. Liu, H. S. Seah, C. Zhu, W. Lin and F. Tian, “Reducing location map in prediction-based difference expansion for reversible image data embedding,” Signal. Processing., Vol. 92, no. 3, pp. 819–828, 2012.
  • W. He, G. Xiong, S. Weng, Z. Cai and Y. Wang, “Reversible data hiding using multi-pass pixel-value-ordering and pairwise prediction-error expansion,” Inf. Sci. (Ny), Vol. 467, pp. 784–799, 2018.
  • Z. Ni, Y. Q. Shi, N. Ansari and W. Su, “Reversible data hiding,” IEEE. Trans. Circuits. Syst. Video. Technol., Vol. 16, no. 3, pp. 354–362, 2006.
  • R. Rajkumar and A. Vasuki, “Reversible and robust image watermarking based on histogram shifting,” Cluster Comput, Vol. 22, pp. 12313–12323, 2019. https://doi.org/10.1007/s10586-017-1614-9 .
  • W. Wang, J. Ye, T. Wang and W. Wang, “Reversible data hiding scheme based on significant-bit-difference expansion,” IET Image Processing, Vol. 11, no. 11, pp. 1002–1014, 2017.
  • R. Kumar and K. H. Jung, “Robust reversible data hiding scheme based on two-layer embedding strategy,” Inf. Sci. (Ny), Vol. 512, pp. 96–107, 2020.
  • S. Ramakrishnan and S. Ponni alias Sathya, “Video copyright protection using chaotic maps and singular value decomposition in wavelet domain,” IETE. J. Res., Vol. 66, no. 3, pp. 290–302, 2020.
  • Z. Liu, S. Li, W. Liu, W. Liu and S. Liu, “Image hiding scheme by use of rotating squared sub-image in the gyrator transform domains,” Optics & Laser Technol., Vol. 45, pp. 198–203, 2013.
  • C. C. Lin, S. P. Yang and N. L. Hsueh, “Lossless data hiding based on difference expansion without a location map,” in IEEE Congress on Image and Signal Processing 2008 (CISP'08), Sanya, China, Vol. 2, 2008, pp. 8–12.
  • S. Weng, Y. Zhao, J. S. Pan and R. Ni, “Reversible watermarking based on invariability and adjustment on pixel pairs,” IEEE. Signal. Process. Lett., Vol. 15, pp. 721–724, 2008.
  • V. Sachnev, H. J. Kim, J. Nam, S. Suresh and Y. Q. Shi, “Reversible watermarking algorithm using sorting and prediction,” IEEE. Trans. Circuits. Syst. Video. Technol., Vol. 19, no. 7, pp. 989–999, 2009.
  • W. L. Tai, C. M. Yeh and C. C. Chang, “Reversible data hiding based on histogram modification of pixel differences,” IEEE. Trans. Circuits. Syst. Video. Technol., Vol. 19, no. 6, pp. 906–910, 2009.
  • H. C. Huang, F. C. Chang and W. C. Fang, “Reversible data hiding with histogram-based difference expansion for QR code applications,” IEEE Trans. Consumer Electron., Vol. 57, no. 2, pp. 779–787, 2011.
  • T. Meenpal, “DWT-based blind and robust watermarking using SPIHT algorithm with applications in tele-medicine,” Sādhanā, Vol. 43, no. 1, pp. 1–12, 2018.
  • S. Gujjunoori and B. B. Amberker, “DCT based reversible data embedding for MPEG-4 video using HVS characteristics,” J. Inf. Security Appl., Vol. 18, no. 4, pp. 157–166, 2013.
  • H. Leung, L. M. Chang, F. Liu and Q. K. Fu, “Adaptive reversible data hiding based on block median preservation and modification of prediction errors,” J. Syst. Softw., Vol. 86, pp. 2204–2219, 2013.
  • J. Fridrich, M. Goljan and R. Du, “Lossless data embedding: new paradigm in digital watermarking,” EURASIP. J. Appl. Signal. Processing., Vol. 2002, no. 1, pp. 185–196, 2002.
  • S. Li, G. Chen and X. Mou, “On the dynamical degradation of digital piecewise linear chaotic maps,” Int. J. Bifurcation Chaos, Vol. 15, no. 10, pp. 3119–3151, 2005.
  • Y. Jia, Z. Yin, X. Zhang and Y. Luo, “Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting,” Signal. Processing., Vol. 163, pp. 238–246, 2019.
  • S. P. Jaiswal, O. C. Au, V. Jakhetiya, Y. Guo, A. K. Tiwari and K. Yue, “Efficient adaptive prediction based reversible image watermarking,” in 2013 IEEE International Conference on Image Processing, Melbourne, VIC, 2013, pp. 4540–4544. doi: 10.1109/ICIP.2013.6738935
  • R. K. Jha, P. K. Biswas and B. N. Chatterji, “Contrast enhancement of dark images using stochastic resonance,” IET Image Process, Vol. 6, no. 3, pp. 230–237, 2012.
  • G. Bhatnagar and B. Raman, “A new robust reference watermarking scheme based on DWT-SVD,” Computer Standards & Interfaces, Vol. 31, no. 5, pp. 1002–1013, 2009.
  • S. Agrawal and M. Kumar, “Mean value based reversible data hiding in encrypted images,” Optik, Vol. 130, pp. 922–934, 2017.
  • Z. Wang, A. C. Bovik, H. R. Sheikh and E. P. Simoncelli, “Image quality assessment: from error visibility to structural similarity,” IEEE Trans. Image Process, Vol. 13, no. 4, pp. 600–612, 2004.
  • Q. Yang, Y. Zhang, C. Yang and W. Li, “Information entropy used in digital watermarking ,” in Symposium on Photonics and Optoelectronics (SOPO), IEEE, Shangai, China, 2012, p. 14.
  • http://sipi.usc.edu/database/database.php?volume=misc.
  • https://ccia.ugr.es/cvg/dbimagenes/g512.php.
  • K.-H. Jung, “A high-capacity reversible data hiding scheme based on sort-ing and prediction in digital images,” Multimedia Tools Appl, Vol. 76, no. 11, pp. 13127–13137, 2017.
  • X. Chen, X. Sun, H. Sun, Z. Zhou and J. Zhang, “Reversible watermarking method based on asymmetric-histogram shifting of prediction errors,” J. Syst. Softw., Vol. 86, no. 10, pp. 2620–2626, 2013.
  • T. Zong, Y. Xiang, I. Natgunanathan, S. Guo, W. Zhou and G. Beliakov, “Robust histogram shape-based method for image watermarking,” IEEE. Trans. Circuits. Syst. Video. Technol., Vol. 25, no. 5, pp. 717–729, 2014.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.