Abstract
The high-fidelity reversible data hiding aims to reduce the embedding distortion as far as possible, especially when the embedding capacity is low. To improve the embedding performance, a novel high-fidelity reversible data hiding method based on double-layered predictor is proposed. At first, the cover image is divided into two sets. The one set is used to predict the pixels in the other set according to the rhombus prediction method. Then, the prediction errors are used to embed data using pixel value ordering method. At last, the marked pixels in the first set are used to implement the process of embedding in the other set. To the best of our knowledge, the proposed predictor is the first double-layered predictor in the field of reversible data hiding. Extensive experiments demonstrate that the proposed method can significantly improve the embedding performance of the existing high-fidelity reversible data hiding method methods, especially for the relatively smooth images.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Shi, Y.Q., Li, X.L., Zhang, X.P., et al.: Reversible data hiding: advances in the past two decades. IEEE Access 4, 3210–3237 (2016)
Boato, G., Carli, M., Battisti, F., et al.: Difference expansion and prediction for high bit-rate reversible data hiding. Electron. Imaging 21(3), 777–793 (2012)
Ma, B., Shi, Y.Q.: A reversible data hiding scheme based on code division multiplexing. IEEE Trans. Inf. Forensics Secur. 11(9), 1914–1927 (2016)
Qian, Z.X., Zhang, X.P.: Reversible data hiding in encrypted images with distributed source encoding. IEEE Trans. Circuits Syst. Video Technol. 26(4), 636–646 (2016)
Zhang, W., Wang, H., Hou, D., Yu, N.: Reversible data hiding in encrypted images by reversible image transformation. IEEE Trans. Multimedia 18(8), 1469–1479 (2016)
Liu, Y., Qu, X., Xin, G.: A ROI-based reversible data hiding scheme in encrypted medical images. J. Vis. Commun. Image R 39, 51–57 (2016)
Celik, M.U., Sharma, G., Tekalp, A.M.: Lossless watermarking for image authentication: a new framework and an implementation. IEEE Trans. Image Process. 15, 1042–1049 (2006)
Goljan, M., Fridrich, J.: Distortion-free data embedding for images. In: Proceedings of 4th Information Hiding Workshop, pp. 27–41 (2001)
Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890–896 (2003)
Thodi, D.M., Rodriguez, J.J.: Expansion embedding techniques for reversible watermarking. IEEE Trans. Image Process. 16, 721–730 (2007)
Sachnev, V., Kim, H.J., Nam, J., et al.: Reversible watermarking algorithm using sorting and prediction. IEEE Trans. Circuits Syst. Video Technol. 19, 989–999 (2009)
Li, X., Yang, B., Zeng, T.: Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Trans. Image Process. 20, 3524–3533 (2011)
Gui, X., Li, X., Yang, B.: A high capacity reversible data hiding scheme based on generalized prediction-error expansion and adaptive embedding. Signal Process. 98, 370–380 (2014)
Coltuc, D.: Low distortion transform for reversible watermarking. IEEE Trans. Image Process. 21, 412–417 (2012)
Coltuc, D.: Improved embedding for prediction-based reversible watermarking. IEEE Trans. Inf. Forensics Secur. 6, 873–882 (2011)
Ni, Z., Shi, Y.Q., Ansari, N., et al.: Reversible data hiding. IEEE Trans. Circ. Syst. Video Technol. 16, 354–362 (2006)
Luo, L., Chen, Z., Chen, M., et al.: Reversible image watermarking using interpolation technique. IEEE Trans. Inf. Forensics Secur. 5, 187–193 (2010)
Chen, X., Sun, X., Sun, H., et al.: Histogram shifting based reversible data hiding method using directed-prediction scheme. Multimedia Tools Appl. 1–19 (2014)
Li, X., Li, B., Yang, B., et al.: General framework to histogram-shifting-based reversible data hiding. IEEE Trans. Image Process. 22, 2181–2191 (2013)
Li, X., Zhang, W., Gui, X., et al.: A novel reversible data hiding scheme based on two-dimensional difference-histogram modification. IEEE Trans. Inf. Forensics Secur. 8, 1091–1100 (2013)
Ou, B., Li, J., Zhao, Y., et al.: Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans. Image Process. 22, 5010–5021 (2013)
Li, X.L., Li, J., Li, B., et al.: High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Process. 93(1), 198–205 (2013)
Peng, F., Li, X.L., Yang, B.: Improved PVO-based reversible data hiding. Digit. Signal Process. 25, 255–265 (2014)
Ou, B., Li, X.L., Zhao, Y., et al.: Reversible data hiding using invariant pixel-value-ordering and prediction-error expansion. Signal Process. Image Commun. 29(7), 760–772 (2014)
Qu, X.C., Kim, H.J.: Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding. Signal Process. 111, 249–260 (2015)
Weng, S.W., Liu, Y.J., Pan, J.S., et al.: Reversible data hiding based on flexible block-partition and adaptive block-modification strategy. J. Vis. Commun. Image R. 41, 185–199 (2016)
Wang, X., Ding, J., Pei, Q.Q.: A novel reversible image data hiding scheme based on pixel value ordering and dynamic pixel block partition. Inf. Sci. 310, 16–35 (2015)
Goatrieux, G., Guillou, C.L., Cauvin, J.M., et al.: Reversible watermarking for knowledge digest embedding and reliability control in medical images. IEEE Trans. Inf. Technol. Biomed. 13(2), 158–165 (2009)
Acknowledgments
This work is partially supported by National Natural Science Foundation of China (No. 6137915261403417 and 61402530), Shaanxi Provincial Natural Science Foundation (2014JQ8301).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Di, F., Duan, J., Liu, J., Su, G., Zhang, Y. (2017). Double-Layered Predictor for High-Fidelity Reversible Data Hiding. In: Xu, M., Qin, Z., Yan, F., Fu, S. (eds) Trusted Computing and Information Security. CTCIS 2017. Communications in Computer and Information Science, vol 704. Springer, Singapore. https://doi.org/10.1007/978-981-10-7080-8_5
Download citation
DOI: https://doi.org/10.1007/978-981-10-7080-8_5
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-7079-2
Online ISBN: 978-981-10-7080-8
eBook Packages: Computer ScienceComputer Science (R0)