121
Views
0
CrossRef citations to date
0
Altmetric
Research Articles

Adaptive multi-predictor based reversible data hiding with superpixel irregular block sorting and optimization

ORCID Icon, , , &
Pages 728-749 | Received 29 Dec 2022, Accepted 15 Mar 2023, Published online: 08 Apr 2023

References

  • Tian J. Reversible data embedding using a difference expansion. IEEE Trans Circuit Syst Video Technol. 2003;13(8):890–896. doi:10.1109/TCSVT.2003.815962.
  • Yu CQ, Zhang XQ, Zhang XP, et al. Reversible data hiding with hierarchical embedding for encrypted images. IEEE Trans Circuits Syst Video Technol. 2022;32(2):451–466. doi:10.1109/TCSVT.2021.3062947.
  • Alattar AM. Reversible watermark using difference expansion of triplets. In IEEE International Conference on Image Processing. 2003;1:501–504. doi:10.1109/ICIP.2003.1247008.
  • Yu CQ, Zhang XQ, Li GX, et al. Reversible data hiding with adaptive difference recovery for encrypted images. Info Sci. 2022;584:89–110. doi:10.1016/j.ins.2021.10.050.
  • Ni Z, Shi YQ, Ansari N, et al. Reversible data hiding. Trans Circuit Syst Video Technol. 2006;16(3):354–362. doi:10.1109/TCSVT.2006.869964.
  • Kuo W, Jiang D, Huang Y. A reversible data hiding scheme based on block division. 2008 congress on image and signal processing, 2008, 5:365–369. doi:10.1109/CISP.2008.730
  • Tai WL, Yeh CM, Chang CC. Reversible data hiding based on histogram modification of pixel differences. IEEE Trans Circuit Syst Video Technol. 2009;19(6):906–910. doi:10.1109/TCSVT.2009.2017409.
  • Wang J, Chen X, Ni J, et al. Multiple histograms-based reversible data hiding: framework and realization. IEEE Trans Circuits Syst Video Technol. 2020;30(8):2313–2328. doi:10.1109/TCSVT.2019.2915584.
  • Jafar IF, Darabkh KA, Al-Zubi RT, et al. Efficient reversible data hiding using multiple predictors. Comput J. 2016;59:423–438. doi:10.1093/comjnl/bxv067.
  • Lee CF, Chen HL, Tso HK. Embedding capacity raising in reversible data hiding based on prediction of difference expansion. J Syst Softw. 2010;83(10):1864–1872. doi:10.1016/j.jss.2010.05.078.
  • Thodi DM, Rodriguez JJ. Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process. 2007;16:721–730. doi:10.1109/TIP.2006.891046.
  • Hong W, Chen TS, Shiu CW. Reversible data hiding for high quality images using modification of prediction errors. J Syst Softw. 2009;82(11):1833–1842. doi:10.1016/j.jss.2009.05.051.
  • Fallahpour M. Reversible image data hiding based on gradient adjusted prediction. Ieice Electron Express. 2008;5(20):870–876. doi:10.1587/elex.5.870.
  • Coltuc D. Improved embedding for prediction-based reversible watermarking. Inf Forensics Secur IEEE Trans on. 2011;6(3):873–882. doi:10.1109/TIFS.2011.2145372.
  • Sachnev V, Kim HJ, Nam J, et al. Reversible watermarking algorithm using sorting and prediction. IEEE Trans Circuits Syst Video Technol. 2009;19(7):989–999. doi:10.1109/TCSVT.2009.2020257.
  • Jung O. An advanced reversible data hiding algorithm using local similarity,: curved surface characteristics, and edge characteristics in images. Appl Sci. 2020;10(3):836–860. doi:10.3390/app10030836.
  • Dragoi IC, Coltuc D. Local-prediction-based difference expansion reversible watermarking. IEEE Trans Image Process. 2014;23(4):1779–1790. doi:10.1109/TIP.2014.2307482.
  • Hwang HJ, Kim SH, Kim HJ. Reversible data hiding using least square predictor via the lasso. EURASIP J Image Video Process. 2016;2016(1):42–53. doi:10.1186/s13640-016-0144-3.
  • Wang WL, Wang CT, Zheng HC, et al. An improved reversible watermarking scheme using weighted prediction and watermarking simulation. Signal Process, Image Commun. 2020;81:20375–20385. doi:10.1016/j.image.2019.115705.
  • Wang X, Wang X, Ma B, et al. High precision error prediction algorithm based on ridge regression predictor for reversible data hiding. IEEE Signal Process Lett. 2021;28:1125–1129. doi:10.1109/LSP.2021.3080181.
  • Hiary S, Jafar I, Hiary H. An efficient multi-predictor reversible data hiding algorithm based on performance evaluation of different prediction schemes. Multimed Tools Appl. 2017;76(2):2131–2157. doi:10.1007/s11042-015-3161-9.
  • Wang K, Chen G, Ai Q, et al. Reversible data hiding based on structural similarity block selection. IEEE Access. 2020;8:20375–20385. doi:10.1109/ACCESS.2020.2966515.
  • Huang D, Huang F. Reversible data hiding based on adaptive block selection strategy. Int J Digit Crime Forensics. 2020;12(1):157–168. doi:10.4018/IJDCF.2020010108.
  • Yu CQ, Zhang XQ, Wang D, et al. Reversible data hiding with pairwise PEE and 2D-PEH decomposition, signal processing. Signal Processing: The Official Publication of the European Association for Signal Processing (EURASIP). 2022;196:108527–108527. doi:10.1016/j.sigpro.2022.108527.
  • Ghimire M, Regentova E, Muthukumar V. A -SLIC: acceleration of SLIC superpixel segmentation algorithm in a Co-design framework. 17th international conference on information technology–New generations, 2020, 663–667. doi:10.1007/978-3-030-43020-7_90
  • Pan H, Siu WC, Law NF. Lossless image compression using binary wavelet transform. image processing. IET Image Process. 2008;1(4):353–362.
  • Kodak lossless true color image suite [Online], (2016) Available from: http://r0k.us/graphics/kodak/.
  • UCID-uncompressed colour image database [Online]. (2016). Available from: http://homepages. lboro.ac.uk/∼cogs/datasets/UCID/ucid.html.
  • USC-SIPI image database [Online]. (2016). Available from: http://sipi.usc.edu/database/.
  • Boroumand M, Chen M, Fridrich J. Deep residual network for steganalysis of digital images[J]. IEEE Trans Inf Forensics Secur. 2018;14(5):1181–1193.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.