Dynamic Content Selection-and-Prediction Framework Applied to Reversible Data Hiding

被引:0
作者
Wu, Han-Zhou [1 ]
Wang, Hong-Xia [1 ]
Shi, Yun-Qing [2 ]
机构
[1] Southwest Jiaotong Univ, Sch Inf Sci & Technol, Chengdu 611756, Peoples R China
[2] New Jersey Inst Technol, Dept Elect & Comp Engn, Newark, NJ 07102 USA
来源
2016 8TH IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS 2016) | 2016年
基金
中国国家自然科学基金;
关键词
Reversible data hiding (RDH); watermarking; histogram shifting; dynamic; multi-layer selection; prediction;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The existing reversible data hiding (RDH) methods often use a fixed pixel preselection pattern and predictor to generate prediction errors that are then utilized for embedding secret data. According to Kerckhoffs's principle, this deterministic operation may allow an illegal decoder to successfully reconstruct the marked prediction-error histogram from a marked image, which is not desirable in application scenarios. This has prompted us to propose a dynamic content selection-and-prediction framework for the RDH in this paper. The proposed framework aims to auto-preselect the complex pixels out from a given image to predict the rest pixels that are thereafter exploited to carry the secret data. Comparing with some state-of-the-art algorithms, the proposed technique guarantees that, the illegal decoder will hardly locate the whole marked pixels and determine the marked prediction errors, which can ensure the security level. In our designed framework, after pixel selection and prediction, there exists a lot of freedom to design the data embedding procedure, meaning that, the proposed framework can be applied to the design of an RDH scheme. In the experiments, we simply employ an optimized histogram shifting operation for data embedding after applying the proposed framework. Our experimental results have shown that, the data embedding process can benefit from the proposed pixel selection and prediction procedure with relatively low embedding rates, and therefore significantly outperform some related works in terms of the payload-distortion performance, especially for images with more smooth regions.
引用
收藏
页数:6
相关论文
共 17 条
  • [1] Chen M, 2009, MM&SEC'09: PROCEEDINGS OF THE 2009 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, P19
  • [2] Improved Embedding for Prediction-Based Reversible Watermarking
    Coltuc, Dinu
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) : 873 - 882
  • [3] Local-Prediction-Based Difference Expansion Reversible Watermarking
    Dragoi, Ioan-Catalin
    Coltuc, Dinu
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2014, 23 (04) : 1779 - 1790
  • [4] Reversible image data hiding based on gradient adjusted prediction
    Fallahpour, Mehdi
    [J]. IEICE ELECTRONICS EXPRESS, 2008, 5 (20): : 870 - 876
  • [5] Reversible data hiding for high quality images using modification of prediction errors
    Hong, Wien
    Chen, Tung-Shou
    Shiu, Chih-Wei
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2009, 82 (11) : 1833 - 1842
  • [6] Reversible data hiding using side-match predictions on steganographic images
    Hsu, Fu-Hau
    Wu, Min-Hao
    Wang, Shiuh-Jeng
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2013, 67 (03) : 571 - 591
  • [7] Reversible image watermarking based on integer-to-integer wavelet transform
    Lee, Sunil
    Yoo, Chang D.
    Kalker, Ton
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2007, 2 (03) : 321 - 330
  • [8] A Novel Reversible Data Hiding Scheme Based on Two-Dimensional Difference-Histogram Modification
    Li, Xiaolong
    Zhang, Weiming
    Gui, Xinlu
    Yang, Bin
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (07) : 1091 - 1100
  • [9] Efficient Reversible Watermarking Based on Adaptive Prediction-Error Expansion and Pixel Selection
    Li, Xiaolong
    Yang, Bin
    Zeng, Tieyong
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2011, 20 (12) : 3524 - 3533
  • [10] Reversible Image Watermarking Using Interpolation Technique
    Luo, Lixin
    Chen, Zhenyong
    Chen, Ming
    Zeng, Xiao
    Xiong, Zhang
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (01) : 187 - 193