Reversible Data Hiding Under Inconsistent Distortion Metrics

被引:34
作者
Hou, Dongdong [1 ]
Zhang, Weiming [1 ]
Yang, Yang [1 ]
Yu, Nenghai [1 ]
机构
[1] Univ Sci & Technol China, Sch Informat Sci & Technol, Hefei 230026, Anhui, Peoples R China
关键词
Recursive code construction; rate-distortion bound; optimal transition probability matrix; inconsistent distortion metrics; multi-distortion metric; reversible steganography; reversible data hiding; SPATIAL IMAGE STEGANOGRAPHY; PREDICTION-ERROR EXPANSION; HISTOGRAMS MODIFICATION; SCHEME; WATERMARKING; ALGORITHM;
D O I
10.1109/TIP.2018.2851074
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recursive code construction (RCC), based on the optimal transition probability matrix (OTPM), approaching the rate-distortion bound of reversible data hiding (RDH) has been proposed. Using the existing methods, OTPM can be effectively estimated only for a consistent distortion metric, i.e., if the host elements at different positions share the same distortion metric. However, in many applications, the distortion metrics are position dependent and should thus be inconsistent. Inconsistent distortion metrics can usually be quantified as a multi-distortion metric. In this paper, we first formulate the rate-distortion problem of RDH under a multi-distortion metric and subsequently propose a general framework to estimate the corresponding OTPM, with which RCC is extended to approach the rate-distortion bound of RDH under the multi-distortion metric. We apply the proposed framework to two examples of inconsistent distortion metrics: RDH in color image and reversible steganography. The experimental results show that the proposed method can efficiently improve upon the existing techniques.
引用
收藏
页码:5087 / 5099
页数:13
相关论文
共 41 条
[1]  
[Anonymous], P 42 ANN ALL C COMM
[2]  
[Anonymous], 2012, IEEE T INF FORENSICS
[3]  
Brar A.S, 2012, Int. J. Emerg. Technol. Adv. Eng., P32
[4]   Reversible Data Hiding-Based Approach for Intra-Frame Error Concealment in H.264/AVC [J].
Chung, Kuo-Liang ;
Huang, Yong-Huai ;
Chang, Po-Chun ;
Liao, Hong-Yuan Mark .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2010, 20 (11) :1643-1647
[5]  
Filler T., 2010, BOSS (Break Our Steganography System)
[6]   Lossless data embedding for all image formats [J].
Fridrich, J ;
Goljan, M ;
Du, R .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV, 2002, 4675 :572-583
[7]   Guided Image Filtering [J].
He, Kaiming ;
Sun, Jian ;
Tang, Xiaoou .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2013, 35 (06) :1397-1409
[8]   Universal distortion function for steganography in an arbitrary domain [J].
Holub, Vojtech ;
Fridrich, Jessica ;
Denemark, Tomas .
EURASIP JOURNAL ON INFORMATION SECURITY, 2014, 2014 (01)
[9]  
Holub V, 2012, IEEE INT WORKS INFOR, P234, DOI 10.1109/WIFS.2012.6412655
[10]   Reversible data hiding using Delaunay triangulation and selective embedment [J].
Hong, Wien ;
Chen, Tung-Shou ;
Chen, Jeanne .
INFORMATION SCIENCES, 2015, 308 :140-154