Adaptive reversible data hiding method based on error energy control and histogram shifting

被引:114
作者
Hong, Wien [1 ]
机构
[1] Yu Da Univ, Dept Informat Management, Miaoli 361, Taiwan
关键词
Histogram shifting; Embedding level; Error energy; COMPRESSION; EXPANSION; SCHEME;
D O I
10.1016/j.optcom.2011.09.005
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Tai et al. proposed a reversible data embedding method based on histogram shifting and achieved an excellent embedding performance. Their method shifts the absolute difference of two consecutive pixels for data embedment, and employs an embedding level to control the payload. However, the shifting of absolute difference reduces the number of embeddable spaces and results in a reduction in payload. Instead of shifting the absolute differences, this paper proposes an adaptive method to increase the number of embeddable spaces by referencing a dual binary tree. We also adopt a better predictor and employ an error energy estimator to reduce the number of non-ernbeddable prediction errors. The experimental results reveal that the proposed method significantly improves the image quality and payload of Tai et al.'s works, especially at low embedding level. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:101 / 108
页数:8
相关论文
共 19 条
[1]   Digital image steganography: Survey and analysis of current methods [J].
Cheddad, Abbas ;
Condell, Joan ;
Curran, Kevin ;
Mc Kevitt, Paul .
SIGNAL PROCESSING, 2010, 90 (03) :727-752
[2]   Reversible authentication and cross-recovery of images using (t, n)-threshold and modified-RCM watermarking [J].
Chen, Yeh-Shun ;
Wang, Ran-Zan .
OPTICS COMMUNICATIONS, 2011, 284 (12) :2711-2719
[3]  
Fridrich J., 2001, P ACM INT MULT C EXH, P27, DOI [10.1145/1232454.1232466, DOI 10.1145/1232454.1232466]
[4]   A Novel Data Embedding Method Using Adaptive Pixel Pair Matching [J].
Hong, Wien ;
Chen, Tung-Shou .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (01) :176-184
[5]   A local variance-controlled reversible data hiding method using prediction and histogram-shifting [J].
Hong, Wien ;
Chen, Tung-Shou .
JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (12) :2653-2663
[6]   The emerging JBIG2 standard [J].
Howard, PG ;
Kossentini, F ;
Martins, B ;
Forchhammer, S ;
Rucklidge, WJ .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 1998, 8 (07) :838-848
[7]   Probability-based tampering detection scheme for digital images [J].
Hsu, Ching-Sheng ;
Tu, Shu-Fen .
OPTICS COMMUNICATIONS, 2010, 283 (09) :1737-1743
[8]   Reversible data hiding exploiting spatial correlation between sub-sampled images [J].
Kim, Kyung-Su ;
Lee, Min-Jeong ;
Lee, Hae-Yeoun ;
Lee, Heung-Kyu .
PATTERN RECOGNITION, 2009, 42 (11) :3083-3096
[9]   Steganalysis using higher-order image statistics [J].
Lyu, Siwei ;
Farid, Hany .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (01) :111-119
[10]   LSB matching revisited [J].
Mielikainen, J .
IEEE SIGNAL PROCESSING LETTERS, 2006, 13 (05) :285-287