Reversible data hiding with context modeling, generalized expansion and boundary map
- 199 Downloads
This paper proposes a reversible data hiding scheme with high capacity-distortion efficiency, which embeds data by expanding prediction-errors. Instead of using the MED predictor as did in other schemes, a predictor with context modeling, which refines prediction-errors through an error feedback mechanism, is adopted to work out prediction-errors. The context modeling can significantly sharpen the distribution of prediction-errors, and benefit the embedding capacity and the image quality. To expand prediction-errors, the proposed scheme utilizes a generalized expansion, which enables it to provide capacities larger than 1 bpp (bits per pixel) without resorting to multiple embedding. Besides, a novel boundary map is proposed to record overflow-potential pixels. The boundary map is much shorter compared with either a location map or an overflow map even though it is not compressed. The combination of the context modeling, the generalized expansion and the boundary map makes the overall scheme efficient in pursuing large embedding capacity and high image quality. Experimental results demonstrate that the proposed scheme provides competitive capacity compared with other state-of-the-art schemes when the image quality is kept at the same level.
KeywordsBoundary map Context modeling Generalized expansion Reversible data hiding Watermarking
This work is supported by the Fundamental Research Funds for the Central Universities, and Development Program of China and Beihang University Graduate Innovation Fund. The authors would like to thank the anonymous reviewers for their valuable comments to improve the quality of the paper.
- 2.Barton JM (1997) Method and apparatus for embedding authentication information within digital data. US patent 5 646 997Google Scholar
- 5.Chen M, Chen Z, Zeng X, Xiong Z (2009) Reversible data hiding using additive prediction-error expansion. In: ACM multimedia and security 09, pp 19–24. Princeton, NJGoogle Scholar
- 6.Chen M, Chen Z, Zeng X, Xiong Z (2009) Reversible image watermarking based on full context prediction. In: ICIP 2009, pp 4253–4256. Cairo, EgyptGoogle Scholar
- 11.Hwang J, Kim J, Choi J (2006) Reversible image watermarking based on histogram modification. In: IWDW 2006. LNCS, vol 4283, pp 348–361. Jeju Island, KoreaGoogle Scholar
- 12.Jiang J, Guo B, Yang SY (2000) Revisiting the JPEG-LS prediction scheme. In: Vision, image and signal processing, pp 575–580Google Scholar
- 14.Kim KS, Lee MJ, Lee HK, Suh YH (2008) Histogram-based reversible data hiding technique using subsampling. In: ACM multimedia and security 08, pp 69–75. Oxford, UKGoogle Scholar
- 19.Lin CC, Yang SP, Hsueh NL (2008) Lossless data hiding based on difference expansion without a location map. In: 2008 congress on image and signal processing, pp 8–12Google Scholar
- 22.Thodi DM, Rodriguez JJ (2004) Prediction-error based reversible watermarking. In: ICIP 2004, pp 1549–1552. SingaporeGoogle Scholar
- 27.Vasiliy S, Kim HJ, Xiang S, Nam J (2008) An improved reversible difference expansion watermarking algorithm. In: IWDW 2007. LNCS, vol 5041, pp 254–263. Guangzhou, ChinaGoogle Scholar