Next Article in Journal
A Hybrid Service Selection and Composition for Cloud Computing Using the Adaptive Penalty Function in Genetic and Artificial Bee Colony Algorithm
Next Article in Special Issue
Cost-Effective Fitting Model for Indoor Positioning Systems Based on Bluetooth Low Energy
Previous Article in Journal
Biogenic VOCs Emission Profiles Associated with Plant-Pest Interaction for Phenotyping Applications
Previous Article in Special Issue
Edge Computing of Online Bounded-Error Query for Energy-Efficient IoT Sensors
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Multilayer Reversible Information Hiding with Prediction-Error Expansion and Dynamic Threshold Analysis

1
Air Command and Staff College, National Defense University, Taoyuan 335, Taiwan
2
Department of Electronic Engineering, Ming Chuan University, Taoyuan 333, Taiwan
3
Department of Electrical and Electronic Engineering, Chung-Cheng Institute of Technology, National Defense University, Taoyuan 335, Taiwan
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(13), 4872; https://doi.org/10.3390/s22134872
Submission received: 6 May 2022 / Revised: 17 June 2022 / Accepted: 24 June 2022 / Published: 28 June 2022
(This article belongs to the Special Issue Data Engineering in the Internet of Things)

Abstract

:
The rapid development of internet and social media has driven the great requirement for information sharing and intelligent property protection. Therefore, reversible information embedding theory has marked some approaches for information security. Assuming reversibility, the original and embedded data must be completely restored. In this paper, a high-capacity and multilayer reversible information hiding technique for digital images was presented. First, the integer Haar wavelet transform scheme converted the cover image from the spatial into the frequency domain that was used. Furthermore, we applied dynamic threshold analysis, the parameters of the predicted model, the location map, and the multilayer embedding method to improve the quality of the stego image and restore the cover image. In comparison with current algorithms, the proposed algorithm often had better embedding capacity versus image quality performance.

1. Introduction

The development of the Internet of Things (IoT) has changed the physical world by overlaying digital information in different areas, including images, video, blockchain, etc. Visual data sources are enhanced greatly to improve visual data management efficiency. However, with communication across the public networks, the safety issue becomes critical [1]. Therefore, reversible information hiding becomes more and more important. It is also referred to as lossless data embedding, which embeds additional information and payload into digital images in a reversible manner [2]. The word “reversible” in this context indicates that one can remove the embedded data to restore the original image. In recent years, numerous principles of the reversible information hiding technology were proposed, such as the difference expansion method [3,4,5,6], histogram method [7,8,9,10,11], difference of the pixel value method [12,13,14], the least significant bit method (LSB) [15,16], dual-image-based schemes [17,18], other reversible information hiding schemes [19,20,21,22,23,24,25], and the prediction-error method [26,27,28,29,30,31,32]. A good information hiding theory provides a significant capacity for embedded secret data that cannot be detected [1,33,34]. For schemes in the transformation domain, the coefficients of the cover and stego images in the space domain are converted into coefficients in the frequency domain through a processing method, such as discrete cosine transform, discrete Fourier transform, or discrete wavelet transform [35,36,37].
The secret data are usually embedded in the LSB of each pixel for the cover image in the classic steganography. This approach is referred to as the LSBs substitution method [15], which slightly modifies initial values without causing obvious noticeable distortion. The difference expansion transform was invented by Tian who proposed the difference expansion (DE) scheme [3] for high embedding capacity. This is a unique reverse information concealment system in terms of high embedding capability and image quality. Alattar extended Tian’s scheme by generalizing the DE approach for all integer transformation [4]. Chang et al. [38] proposed a reversible method that aims to block the truncation coding (BTC) of compressed color images. Each block of a BTC-compressed color image needs three bitmaps and three pairs of quantitation levels for reconstruction. Recently, Chan et al. [39] proposed a method that transformed a coverage image into the frequency domain by using the Haar wavelet digital transformation (HDWT) method. The scheme compressed the high-frequency band coefficients by the Huffman (or arithmetic) coding method and then integrated the compression and secret data into the high-frequency band. Hsu et al. [40] obtained 12 prediction candidates from the neighboring pixels of the integration pixel based on the modelling hypothesis. The final predictive value was selected among those predictive candidates using both the predictive and the original pixel values. Consequently, a more precise final predictive value was achieved.
For large-capacity and multilayer reversible information, if the capacity of the two layers remains insufficient for the quantity of payloads, a third embedding layer is necessary. Therefore, the embedding process continues until there is enough embedding capability for the payload. However, multilayer embedding causes some unanticipated problems. First, the image quality (peak signal-to-noise ratio, PSNR) drops rapidly due to the differences in the embedding layers. Second, the new difference image has a lower integration capability compared to its previous layer [35]. Each embedding layer gradually diminishes the correlation. This condition will happen not only in the coating directions but also in the surrounding area of the pixel. As a result, multilayer embedding schemes may not be effectively exploited for the pixel neighbor’s inherent correlation [26]. Third, the algorithm cannot maintain its performance because the embedding capacity is limited for each layer. In order to achieve a larger embedding capacity to remove these limits, Tian et al. [3] suggested a multilayer embedding scheme. They split the image into pixel pairs and then incorporated some information into each pair. They divided the image into pairs of pixels, then embedded one bit of information into each pair based on the embedding capacity of the DE transform that can reach 0.5 bits per pixel (bpp) for each layer. Unfortunately, the location map itself required 0.5 bpp when it was not compressed. Hu et al. [35] used two embedding directions for the DE-based reversible data hiding. They established a dynamic mechanism that can search and select extensible differences. This mechanism offers equal chances to slight differences between two difference images and effectively avoids the situation of location map. The most differences in the first layer difference image are exhausted. Unfortunately, there is hardly any chance of embedding the slight differences in the second layer difference image. The location map shows if the pairs are developed. The embedding rate is approximately 0.5 bpp in the over- and under-flow location map for each layer. Khanam et al. [21] divided the encrypted image into four parts, and two parts could possess a significant data hiding rate, around 0.11 bpp.
In this paper, we try to deal with the above-mentioned issues. Based on the integer Haar wavelet transform (IHDWT), we calculated the differences in the mean and high-frequency coefficients between the predicted images and the cover images. In addition, we expanded the differences and embedded payload and ancillary information into the expandable differences. In our algorithm, we applied a location map, predicted model parameters, a dynamic threshold, and the multilayer embedding method for improving the stego image quality then restoring the cover image. The experimental results demonstrate the feasibility and validity of our proposed methodology for reversible information hiding. This paper is organized as follows. The prediction-error expansion and dynamic search for expandable difference methods are presented in Section 2. In Section 3, the proposed scheme is depicted in detail. Next, the experimental results are illustrated in Section 4. Finally, we draw conclusions in Section 5.

2. Related Works

2.1. Prediction-Error Expansion

Thodi et al. [26] proposed the technique for improving distortion performance with low coating capacity and alleviating the problem of capacity control. The authors proposed a reversible data embedding approach, which was called prediction-error expansion. This enhanced technique exploits the inherent correlation of a pixel’s neighborhoods better than the DE scheme [3]. The prediction-error expansion combines the advantages of DE embedding with the better decorrelation abilities of a predictor. This results in a superior data integration capability compared to DE.
This represents a low-complexity algorithm with an inherent edge detection mechanism that is defined as a context of three neighbors. The pixels on the left side, top side, and top-left side of the present pixel are shown in Figure 1.
The output of the predicted value is
p = { if   c 1 min ( p 2 ,   p 3 ) ,   max ( p 2 ,   p 3 ) if   c 1 min ( p 2 ,   p 3 ) ,   min ( p 2 ,   p 3 ) otherwise ,   p 2 + p 3 p 1
where p is the present pixel, and p1, p2, and p3 are the context. The predicted intensity, p ^ , is set to the even integer less than or equal to p ˜ .
p ^ = 2 × p ˜ / 2
Then, the difference between the pixel intensity, p, and its predicted intensity, p ^ , is the prediction error, p e , as shown in Equation (3). Embedding a bit, k, in p e results in the modified prediction error, p e , as in Equation (4). The modified prediction errors, p e , are added to the predicted intensities to create the resulting pixel intensity, and the embedded information is b, as shown in Equation (5).
p e = p p ^
p e = 2 × p e + k
p = p e + p ^ = k + p e + b

2.2. Dynamic Search for Expandable Difference in Horizontal and Vertical Difference Image

Hu et al. [35] suggested a scheme of extensible locations in the horizontal and vertical difference images. The steps are described as follows and are shown in Figure 2.
  • For a cover image, the integer Haar wavelet transform (IHWT) is just performed in the row direction, and the horizontal difference image, I H H , can be obtained. In addition, the histogram of I H H is calculated.
  • Supposing the payload is P, and the payload in the row direction is P H , the selection of all extendable differences provides spare space for the payload. In addition, there are sufficient locations for the auxiliary data, which consists of the header file, Q H , and the location map, M H , in the horizontal direction. Assuming the present threshold and the horizontal embedding capacity are T H and C H , respectively, then the initial difference selection threshold is zero. If P H P > 0 , the horizontal capacity under T H is sufficiently large for P, and no more locations are required. If P H P 0 , the horizontal capacity under T H is not sufficiently large for P. Therefore, only the partial payload, i.e., P H = C H Q H M H , will be embedded in the horizontal direction. Thus, they need the additional embedding capacity and must look into the image of the vertical difference.
  • In Figure 2, the horizontal embedded image, I , is obtained by synthesizing I H H and the average image, I H L .The integer Haar wavelet transform is performed on I in the column direction to obtain the vertical difference image, I V H . In this way, the difference histogram of I V H is calculated.
  • In the vertical direction, supposing the current threshold and the vertical embedding capacity are defined as T V and C V , respectively, then C V = Q V + M V + P P H . The authors use another inner search loop to test whether C V Q V + M V + P P H . Once C V < 0 , it means that the vertical difference image can provide enough embedding capability for the remainder of the payload. As a result, one can hide the data and obtain the embedded vertical difference image, I V H . If the final embedding capacity is larger than zero ( C V > 0 ), the search round under the current T V fails. We have to increase T V by 1 and repeat Steps (2)–(4) again. Note that, no matter how we increase T V , the vertical selection threshold should not be higher than the horizontal threshold, defined as T V T H .
  • By converting the Haar wavelet transform, the embedded vertical difference image, I V H , can be synthesized, as well as the average image, I V L , in Figure 2, to obtain the output image, I .

3. Proposed Scheme

The algorithm of the proposed scheme for information embedding is shown in Figure 3. Based on the prediction-error expansion and dynamic threshold analysis, we use the integer Haar wavelet transform method to convert the cover image from the spatial domain to the frequency domain. In the first step, we establish a predictive model that uses low-frequency coefficients that retain the most important information.
In the second step, the differences between the medium- and high-frequency coefficients between the predictive image and the original image are calculated. In the third step, we expand the differences and integrate the secret data with evolving expandable differences. In our algorithm, we use the dynamic threshold, predictive parameters of the model, location map, and multilayer embedding method to enhance the quality of the stego image and recover the original cover image. In Section 3.1 and Section 3.2, the proposed schemes for predicted model construction and dynamic threshold analysis are depicted in detail. Subsequently, the adjustment of the predicted parameters for the multiple layers is illustrated in Section 3.3. Finally, details on the proposed information embedding and extraction techniques are described in the Section 3.4.

3.1. Predicted Model Construction

The traditional multilayer methods must record the features of each layer for another application or data extraction. In our algorithm, we suggest the identical predicted model for each layer to avoid building large amounts of extra information. However, image quality decreases considerably after the embedding of the first layer because of the use of great differences. Therefore, we present a novel technique for predicted parameter adjustment to construct predictive images for each layer that improve the quality (PSNR) of the stego image.
After the integer Haar wavelet transform, low-frequency coefficients contain the most important data from the original image. For this reason, we build the predictive image from low-frequency coefficients (LL), as shown in Figure 4. The steps of the predicted model construction are described as follows:
  • The edge coefficients of the low-frequency coefficients (LL) in the cover image are duplicated.
  • Equations (6)–(9) are used to produce the predictive image PI. In Figure 5, from each low-frequency coefficient, PI (2i, 2j), PI (2i−1, 2j), PI (2i, 2j−1), and PI (2i−1, 2j−1) denote the four neighboring pixels. For example, the original and predictive images of the “Airplane” image are shown in Figure 4, where PSNR is approximately 30 dB.
PI ( 2 i ,   2 j ) = LL ( i ,   j ) ,       for   i { 1 ,   2 ,   ... ,   m } , j { 1 ,   2 ,   ... ,   n }
PI ( 2 i 1 ,   2 j ) = LL ( i 1 ,   j 1 ) + LL ( i ,   j 1 ) + LL ( i 1 ,   i + 1 ) 16 + LL ( i ,   j + 1 ) 16 + 3 ( LL ( i 1 ,   j ) + LL ( i ,   j ) ) 8 ,       for   i { 1 ,   2 ,   ,   m } ,   j { 1 ,   2 ,   ,   n }
PI ( 2 i ,   2 j 1 ) = LL ( i 1 ,   j 1 ) + LL ( i 1 ,   j ) + LL ( i + 1 ,   i 1 ) 16 + LL ( i + 1 ,   j ) 16 + 3 ( LL ( i ,   j 1 ) + LL ( i , j ) ) 8 ,       for   i { 1 ,   2 ,   ,   m } ,   j { 1 ,   2   ,   ,   n }
PI ( 2 i 1 ,   2 j 1 ) = { 1 4 [ LL ( i 1 ,   j 1 ) + LL ( i 1 ,   j ) + LL ( i ,   j 1 ) + LL ( i ,   j ) ] ,   ............ for   i { 1 ,   m }   or   j { 1 ,   n } 15 64 ( LL ( i 1 ,   j 1 ) + LL ( i 1 ,   j ) + LL ( i ,   j 1 ) + LL ( i ,   j ) ) + 1 128 [ LL ( i 2 ,   j 1 ) + LL ( i 2 ,   j ) + LL ( i + 1 ,   j 1 ) + LL ( i + 1 ,   j ) + LL ( i 1 ,   j 2 ) + LL ( i ,   j 2 ) + LL ( i 1 ,   j + 1 ) + LL ( i ,   j + 1 ) ] ,   for   i { 2 ,   3 ,   ,   m 1 }   and   j { 2 ,   3 ,   ,   n 1 }

3.2. Dynamic Threshold Analysis

Numerous studies have been conducted on dynamic threshold analyses [26,30,35,41,42]. The block diagram of dynamic threshold analysis is shown in Figure 6. During data embedding, the steps of the proposed dynamic threshold analysis are described as follows.
1.
The multilayer embedding algorithm calculates the prediction error and difference histogram for the coefficients of the medium and high frequencies in the L layer. The initial difference selection threshold is zero. We use a difference histogram to describe the statistical distribution of the expandable differences.
2.
To avoid unexpected shift, we apply a dynamic threshold analysis. The dynamic threshold, T(k), is shown in Equation (10). The initial value, T(0), is zero, and k is the number of the threshold analysis. To achieve a higher image quality, we define the marginal value, kE. During the experiment, we initially assume eight numbers of the dynamic threshold T(1) to T(16), as shown in Table 1. Each threshold indicates the value of the prediction error for each layer. We apply the value of initial prediction error, which is zero. Then, we expand both sides starting from the origin. Supposing the payload is P, the current selection threshold and the embedding capacity are T(k) and C, respectively. Then, if CP and k < kE, the capacity under T(k) is sufficiently large for P. We do not require any more locations. If C < P and k < kE, this implies that the difference image cannot provide sufficient embedding capacity for the rest of the payload ( P = P C ). We increase the parameter of threshold, k, by 1 and repeat the previous steps. If we find C < P and k < kE, we must calculate the prediction error and histogram of the medium- and high-frequency coefficients in the next layer.
T ( k ) = ( 1 ) k 1 × ( k 1 ) + T ( k 1 ) ,   k { 1 ,   2 ,   ,   k E }
3.
If the payload size continues to increase, this method cannot satisfy the capacity requirement in the single-layer embedding, whereas the multilayer embedding method is able to do so.

3.3. Predicted Parameter Adjustment of Multiple Layers

To obtain a higher image quality, we not only perform dynamic threshold analysis but also define the predicted parameter adjustments of the multiple layers, as shown in Equation (11). Hence, we adjust the amount of difference image pixels as little as possible to maintain the embedding distortion to the lowest degree. We use the one-level integer Haar wavelet transform to discover the medium-frequency coefficients and high-frequency coefficients, PIH ( i ) , of the predictive image. We define i as the number of the predicted parameter, a is the scaling, T E is the value of the marginal threshold, and b is the shift of the original predicted parameter. The parameter new _ PIH ( i ) is the novel predicted parameter after performing the adjustment.
new _ PIH ( i ) = { a × PIH ( i ) + b × T E ,   for   PIH ( i ) 0 a × PIH ( i ) b × T E ,   for   PIH ( i ) < 0
For example, in the “Lena” image, we assume the marginal threshold, T E , is four. We use two layers for data embedding. As we select different values of a and b, different PSNRs are obtained. If we select smaller values of a and b, larger PSNRs are obtained; however, fewer secret data are embedded. Considering more data for the embedding, the range of a is from –1 to +1, and the range of b is from –0.5 to +0.5; however, the value of PSNR is not optimal. While a –0.5 and b –3, a higher PSNR can be generated; however, the embedding rate falls gradually. To obtain a better embedding rate or image quality, we adjust the predicted parameters to achieve our goal.

3.4. Secret Data Embedding and Extraction

The embedding process involves calculating the prediction error (PE) from the vicinity of a pixel and embedding the information with the expanded prediction error. We utilize the one-level integer Haar wavelet transform to discover the medium-frequency coefficients and high-frequency coefficients, x, of the original image. After the construction of the predictive image, we perform the one-level integer Haar wavelet transform from the spatial domain into the frequency domain and find the medium-and high-frequency coefficients, x ^ (HL, LH, and HH). We apply Equations (3)–(5) and find the prediction error ( p e = x x ^ ) and the resulting pixel intensity ( x = p e + x ^ ). During the secret data extraction, we compute the difference between the intensity of the pixels, x , and the predicted intensity, x ^ , of the stego image to obtain the modified p e . Based on Equation (12), we find the number of values of the prediction error, p e , and embedded information, b. Finally, we complete the procedures of reversible data hiding.
p e = p e 2 ,   b = p e 2 × p e 2

3.4.1. Secret Data Embedding

For blind data extraction and the loss-free retrieval of the original image, we use the header file to save all embedding parameters for the reversibility of the calibration process. While hiding secret data, we should build the header file and the over- and under-flow location map. The total bits of header file are shown in Table 2. The header file includes the number of layers, L, the predicted parameters, PIH ( i ) , the marginal value, kE, information on applying the location map, the length of the location map, and the number of embedded payloads in the last layer. If the localization map application information reads “0”, it shows that the header file will not include the length of the location map and the over- or under-flow location map. However, at the decoder, we are unable to extract the hidden data if we assume such an embedding scheme. Actually, without the location map and embedding settings, we cannot know where the selected differences are. This means that even if we have determined the binary flow along with the extensible locations to hide the secret data we need to make this kind of hiding process easy for extracting data blindly.
The block diagram of data embedding is shown in Figure 7. During secret data embedding, we propose the dynamic threshold analysis. We utilize the one-level integer Haar wavelet transform to find the medium- and high-frequency coefficients, x of the cover image and x ^ of the predicted image. If the prediction error, p e = x x ^ , and the dynamic threshold T(k) are equal, we perform data embedding, which results in the new value, x = x + p e + p , of the medium- and high-frequency coefficients. If the prediction error, p e , and the dynamic threshold, T(k), are not equal, we perform PE shifting, as shown in Equation (13).
x = { x + T ( 2 × ( k 1 ) / 2 + 1 ) + 1 ,   ..... if   p e > T ( 2 × ( k 1 ) / 2 + 1 ) x + T ( 2 × k / 2 ) ,   ................... ..... if   p e < T ( 2 × ( k ) / 2 )

3.4.2. Information Extraction

The flow chart for extracting information is presented in Figure 8. During information extraction, we also perform the dynamic threshold analysis and use the one-level integer Haar wavelet transform to find the medium-frequency coefficients and high-frequency coefficients, x , of the stego image. After decomposing the integer Haar wavelet transform, we construct the predictive image from the low-frequency (LL) coefficients. At this time, the same dynamic threshold is used for extracting the header file to decide how to extract the secret data and their length. Then, we employ the inverse integer Haar wavelet transform to restore the cover image. The pixels of an image must be in the range of gray levels to avoid the scenarios of under- and overflow. The algorithms for restoring the cover image are described in Equations (14)–(17).
0 f ( 2 i ,   2 j ) = LL ( i ,   j ) LH ( i ,   j ) 2 HL ( i ,   j ) HH ( i ,   j ) / 2 2 255
0 f ( 2 i ,   2 j 1 ) = f ( 2 i ,   2 j ) + HL ( i ,   j ) HH ( i ,   j ) 2 255
0 f ( 2 i 1 ,   2 j ) = LL ( i ,   j ) + LH ( i ,   j ) LH ( i ,   j ) 2 HL ( i ,   j ) + HH ( i ,   j ) HH ( i ,   j ) / 2 2 255
0 f ( 2 i 1 ,   2 j 1 ) = f ( 2 i 1 ,   2 j ) + HL ( i ,   j ) + HH ( i ,   j ) HH ( i ,   j ) 2 255

4. Experiment and Discussion

We implemented the proposed reversible information hiding scheme using MATLAB software. In the experiments, we used 16 grayscale images with the size of 512 × 512 × 8 bits. To demonstrate the efficacy of the proposed scheme, we tested it on a variety of images. The images included “Airplane”, “Baboon”, “Boat”, “Bridge”, “Couple”, “Crowd”, “Elain”, “Martha”, “Lake”, “Flower”, “Girl”, “Goldhill”, “Peppers”, “Lena”, “Loco” and “Hat” images, which are are shown in Figure 9a–p, respectively. These images were obtained from open-source image databases (Image Processing Place, https://www.imageprocessingplace.com/root_files_V3/image_databases.htm, accessed on 18 March 2022). They indicated various textural complexities. The stego image quality was measured by PSNR.
In extracting the information, the existence of secret data may be determined by comparing the differences between the extracted data and the original data. The measure of the bit error rate (BER) is indicated by
BER = i = 1 m d i d i m
where d i and d i are the original information and the extracted information, respectively. The m means the data size, and is the XOR operation between the two datasets. For the imperceptible capability, a quantitative index, the mean square error (MSE), and PSNR, are employed to evaluate the differences between a cover image, p, and a stego image, p , and N is the total image size. The MSE and PSNR are defined by
MSE = 1 N i = 1 N ( p i p i ) 2
PSNR = 10 × log 10 ( 255 2 MSE )
We made 200,000 bits of secret data and stored them in each grayscale image. The secret data were generated by the MATLAB function r o u n d ( r a n d ( 1 , x ) ) , where x indicates the length of the secret dataset. The PSNRs with the different bpps of the 16 grayscale images are shown in Table 3. According to Table 1, there are 16 threshold numbers that can be extended and decided for use by T = 0, 1, −1, 2, −2, 3, −3, 4, −4, 5, −5, 6, −6, 7, −7, −8. Figure 10 shows the graph of PSNRs with 17 different bpps from 0.038 bpp to 0.649 bpp. The vertical axis indicates the PSNR values, and the horizontal axes shows the bpp values. Compared to the experimental data, the highest PSNR was “Couple” from 56.08 to 42.14. On the contrary, the lowest PSNR was “Baboon” from 56.08 to 22.69.
Almost all of them can be hidden with only two layers. Because “Baboon” and “Crowd” images have more high-frequency signals, even if four layers are used, the complete message cannot be hidden. In addition, the “Bridge” and “Lake” images used three layers to hide the secret message. The payloads (embedded data and additional information) with different layers and of 16 grayscale images are shown in Table 4.
It was difficult to distinguish between the stego images with human ees. The experiment demonstrates the better transparency of the proposed system. The extracted secret data from the 16 stego images with BER were zero. This means that the reversible data algorithm is a perfect embed and extraction process.
The information of data embedding is shown in Table 5. The parameter A is the half value of the variable a in Equation (12). It represents the scale of the original value of the predicted image, while B is the integer of the value b × T E , which represents the shifting of the original predicted parameter. The parameter k is the number of the threshold analysis. The phenomena of over- or under-flow were not generated after the data embedding, and the header file did not include the length of the location map on the “Lena” and “Airplane” images. On the “Boat” image, we only used 16 bits of the location map (8 bits of row direction and 8 bits of column direction) to present the underflow of one pixel. The experimental results demonstrate that the data can be extracted without any original image. It can be found that after the parameter revision between different levels, the PSNRs of different information embedding amounts oscillate. As a result, the better PSNR can be obtained under the selection of the better layers and parameters.
The payload and corresponding PSNR of the “Lena”, “Airplane”, and “Boat” images are shown in Figure 11. We performed 10,000 to 100,000 bits of data embedding. During the secret data embedding, if we wanted to embed the secret data with 60,000 bits, the PSNR of the “Airplane” and “Boat” images were 52.24 and 43.52 dB, respectively. Because the “Airplane” image had more texture complexity than the “Boat” image, the PSNR of the “Airplane” image was significantly better than the “Boat” image. Therefore, how to decrease prediction error and avoid under- and over-flow scenarios will be crucial in the future.
Chang et al. [43] suggested a reversible image approach based on the high payload rate. This performance could be obtained by transforming a spatial domain coverage image into a frequency domain using the HDWT method. It was followed by an adaptive arithmetical coding method for coding HDWT coefficients in a high-frequency band. The quantitative outcomes measured are presented in Table 6. As can see in Table 6, the payload (embedded data and additional information) and PSNR by the proposed method have shown significantly better performance compared to Chang’s method.
We directly used the data provided by Hung et al.’s [27], Hong et al.’s [44], Luo et al.’s [45], and Cai et al.’s [28] methods. Due to space limitation, only parts of the comparison results against their methods are shown. In Ref. [27], the authors offered reversible data hiding for the predictive-error expansion ability based on a multilayer perceptron. It was an artificial neuronal network widely used in numerous applications. They used the correlation between pixel values in the image and adjacent pixels to obtain a multilayer perceptron that could obtain more accurate pixel prediction results. In Ref. [44], Hong et al. proposed the reversible data hiding method using prediction and histogram shifting. A base set of pixels was used to improve predictive accuracy, which could increase the payload. In order to enhance image quality, a threshold was used to select only the low variance blocks to be integrated into the process. In Ref. [45], Luo et al. proposed a reversible watermarking scheme using an interpolation technique that could integrate a large amount of secret data in images with imperceptible editing. They applied the interpolation error and the difference between the interpolation value and the corresponding pixel value to integrate bit “1” or “0” by additively extending it or leaving it unaltered. In Ref. [28], a 3D error-prediction histogram was generated by calculating each overlapping error-prediction triple. Afterwards, the data embedding was counted with a specially designed reversible cartography.
By modifying the pixels slightly, a high image quality was maintained. Consequently, Table 7 shows that although the payload reached 100,040 bits, the corresponding PSNR of the “Lena” image did not drop significantly (49.85 dB). Luo’s method did not use the “Boat” image for testing. In our proposed scheme, the payload was up to 70,040 bits, and the corresponding PSNR of the “Boat” image was 49.62 dB. In the “Airplane” image, the PSNR was 49.70 dB while the payload was 70,042 bits, and the PSNR was 49.14 dB while the payload was 100,042 bits. The embedding capacity and image quality obtained by the proposed method have demonstrated better performance than those obtained by the above methods. Finally, the obtained results are described as follows.
  • Increasing the security of data embedding:
    We proposed the predicted model construction using integer Haar wavelet transform decomposition. Then, we constructed the predicted image from low-frequency coefficients (LL). If someone attempts to steal the embedding information, they must use the key of the predicted model and parameters to extract the perfect information. Otherwise, some imperfect information or random unrecognizable characters and numbers may be found.
  • Improving the payload of the location map:
    After the integer Haar wavelet transform decomposition, the low-frequency image is one quarter compared to the original image. For a 512 × 512 image, the location map size is 256 × 256. Hence, the embedding rate is 0.25 bits per pixel (bpp) when it is not compressed compared with Tian’s method [3] where the embedding rate is 0.5 bpp. Evidently, not all pairs can be used for data hiding. The location map indicates whether the pairs are expanded. Compared with Hu’s method [35], where the embedding rate is near 0.5 bpp with embedding the over- and under-flow location map for one layer, our proposed scheme can reach to 0.75 bpp, at best, in one layer.
  • To improve the quality (PSNR) of the stego image. There are some lists for our proposed method:
    First, the dynamic threshold analysis calculates the PE and histogram of the median and high-frequency coefficients in each layer. The initial difference selection threshold is zero. When the payload is completely embedded into the cover image, the dynamic threshold analysis and other unexpected shifts are stopped. Therefore, the quality of the stego image can be improved. Second, we constrict the predicted model to low-frequency coefficients (LL). The low-frequency coefficients contain the most important information of the original image. During the secret data embedding and extraction, we not only never change the predictive image but also perfectly reconstruct it. After constructing the predicted image, we only find the median and high-frequency coefficients to finish the reversible data hiding and increase the quality of the stego image. Third, we improve the location map size such that we not only can use significantly lower extra information during the same data embedding but can also embed more payload. As we can see in Table 6, Chang et al. [43] used a more significant amount of extra information for performing reversible data hiding. Fourth, to obtain a higher image quality, we not only perform the dynamic threshold analysis but also define the predicted parameters of the multiple layers.
  • After the integer Haar wavelet transform decomposition, we duplicate the edge coefficients of the low-frequency coefficients (LL) of the cover image to construct the predicted image. The detected features of the different texture complexities of the predicted image are important. For example, during the data embedding, we set the threshold to 8 and the predicted parameters to a = 1 and b = 0 with one layer embedding. Under the same conditions (the embedding rate is 0.38 bpp), the PSNRs of the “Baboon” and “Airplane” image were 32.24 and 44.52 dB, respectively. The PSNR of the “Airplane” image was significantly better than that of the “Baboon” image. Thus, a method that maintains the high-frequency coefficients, decreases prediction errors, and avoids under- and over-flow scenarios is crucial for future endeavors.
  • If we use different predicted parameters, sometimes we can obtain better PSNRs but worse embedding rates, and at times we may find better embedding rates along with worse PSNRs. In Figure 11, under the same conditions, the embedding rate was 0.4 bpp, and we used the fourth and sixth parameters to determine that the PSNRs were 48.378 and 40.393 dB, respectively. An algorithm capable of searching the best parameters will be a key research endeavor in the future. In addition, a quick decision method for the selection of predicted parameters may be the next step for our research. Finally, this approach can be applied to copyright protection and digital archives.

5. Conclusions

We present an improved high-capacity and multilayer reversible information hiding technique. The proposed scheme uses the predicted model to improve the payload of the location map. Because we improved the location map size, we can use a significantly lower amount of extra information during the same data embedding. However, we can also embed an increasing amount of secret data. Subsequently, in the proposed algorithm, we constructed the dynamic threshold analysis, the predicted parameters, the location map, and the multilayer embedding method for enhancing stego image quality and restoring the cover image. Depending on the experimental results, the proposed reversible scheme offers greater capacity and better image quality for stego images.

Author Contributions

Conceptualization and methodology, H.-H.C., I.-H.P. and P.-S.H.; software, H.-H.C. and I.-H.P.; validation, I.-H.P., T.-J.C., H.-H.C. and P.-S.H.; formal analysis, T.-J.C. and P.-S.H.; investigation, T.-J.C. and P.-S.H.; resources, H.-H.C.; data creation, P.-S.H.; writing—original draft preparation, I.-H.P. and P.-S.H.; writing—review and editing, I.-H.P. and T.-J.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Open-source image databases (Image Processing Place, https://www.imageprocessingplace.com/root_files_V3/image_databases.htm, accessed on 2 February 2022).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Lin, Y.-H.; Hsia, C.-H.; Chen, B.-Y.; Chen, Y.-Y. Visual IoT Security: Data Hiding in AMBTC Images Using Block-Wise Embedding Strategy. Sensors 2019, 19, 1974. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  2. Lin, C.C.; Tai, W.L.; Chang, C.C. Multilevel Reversible Data Hiding Based on Histogram Modification of Difference Images. Pattern Recognit. 2008, 41, 3582–3591. [Google Scholar] [CrossRef]
  3. Tian, J. Reversible Data Embedding Using a Difference Expansion. IEEE Trans. Circuits Syst. Video Technol. 2003, 13, 890–896. [Google Scholar] [CrossRef] [Green Version]
  4. Alattar, A.M. Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform. IEEE Trans. Image Process 2004, 13, 1147–1156. [Google Scholar] [CrossRef]
  5. Ke, Y.; Zhang, M.Q.; Liu, J.; Su, T.T.; Yang, X.Y. Fully Homomorphic Encryption Encapsulated Difference Expansion for Reversible Data Hiding in Encrypted Domain. IEEE Trans. Circuits Syst. Video Technol. 2020, 30, 2353–2365. [Google Scholar] [CrossRef] [Green Version]
  6. Arham, A.; Hanung, A.N.; Teguh, B.A. Multiple Layer Data Hiding Scheme Based on Difference Expansion of Quad. Signal Process. 2017, 137, 52–62. [Google Scholar] [CrossRef]
  7. Ni, Z.; Shi, Y.Q.; Ansari, N.; Su, W. Reversible Data Hiding. IEEE Trans. Circuits Syst. Video Technol. 2006, 16, 354–362. [Google Scholar]
  8. Huang, H.C.; Fang, W.C. Authenticity Preservation with Histogram-Based Reversible Data Hiding and Quadtree Concepts. Sensors 2011, 11, 9717–9731. [Google Scholar] [CrossRef]
  9. Yang, C.-Y.; Wu, J.-L. Two-Bit Embedding Histogram-Prediction-Error Based Reversible Data Hiding for Medical Images with Smooth Area. Computers 2021, 10, 152. [Google Scholar] [CrossRef]
  10. Hou, X.; Min, L.; Yang, H. A Reversible Watermarking Scheme for Vector Maps Based on Multilevel Histogram Modification. Symmetry 2018, 10, 397. [Google Scholar] [CrossRef] [Green Version]
  11. Liu, W.-L.; Leng, H.-S.; Huang, C.-K.; Chen, D.-C. A Block-Based Division Reversible Data Hiding Method in Encrypted Images. Symmetry 2017, 9, 308. [Google Scholar] [CrossRef] [Green Version]
  12. Lu, T.-C.; Tseng, C.-Y.; Huang, S.-W.; Nhan Vo, T. Pixel-Value-Ordering based Reversible Information Hiding Scheme with Self-Adaptive Threshold Strategy. Symmetry 2018, 10, 764. [Google Scholar] [CrossRef] [Green Version]
  13. Kaur, G.; Singh, S.; Rani, R.; Kumar, R. A comprehensive study of reversible data hiding (RDH) schemes based on pixel value ordering (PVO). Arch. Comput. Methods Eng. 2020, 28, 3517–3568. [Google Scholar] [CrossRef]
  14. Kaur, G.; Singh, S.; Rani, R. PVO based reversible data hiding technique for roughly textured images. Multidimens. Syst. Signal Process. 2021, 32, 533–558. [Google Scholar] [CrossRef]
  15. Celik, M.U.; Sharma, G.; Tekalp, A.M.; Saber, E. Lossless Generalized-LSB Data Embedding. IEEE Trans. Image Process. 2005, 14, 253–266. [Google Scholar] [CrossRef] [PubMed]
  16. Faheem, Z.B.; Ali, M.; Raza, M.A.; Arslan, F.; Ali, J.; Masud, M.; Shorfuzzaman, M. Image Watermarking Scheme Using LSB and Image Gradient. Appl. Sci. 2022, 12, 4202. [Google Scholar] [CrossRef]
  17. Lin, J.-Y.; Horng, J.-H.; Chang, C.-C.; Li, Y.-H. Asymmetric Orientation Combination for Reversible and Authenticable Data Hiding of Dual Stego-images. Symmetry 2022, 14, 819. [Google Scholar] [CrossRef]
  18. Chang, C.-C.; Su, G.-D.; Lin, C.-C.; Li, Y.-H. Position-Aware Guided Hiding Data Scheme with Reversibility and Adaptivity for Dual Images. Symmetry 2022, 14, 509. [Google Scholar] [CrossRef]
  19. Yu, M.; Yao, H.; Qin, C. Reversible data hiding in encrypted images without additional information transmission. Signal Process. Image Commun. 2022, 105, 116696. [Google Scholar] [CrossRef]
  20. Motomura, R.; Imaizumi, S.; Kiya, H. A Reversible Data Hiding Method in Encrypted Images for Controlling Trade-Off between Hiding Capacity and Compression Efficiency. J. Imaging 2021, 7, 268. [Google Scholar] [CrossRef]
  21. Khanam, F.-T.-Z.; Kim, S. Enhanced Joint and Separable Reversible Data Hiding in Encrypted Images with High Payload. Symmetry 2017, 9, 50. [Google Scholar] [CrossRef] [Green Version]
  22. Fragoso-Navarro, E.; Cedillo-Hernandez, M.; Garcia-Ugalde, F.; Morelos-Zaragoza, R. Reversible Data Hiding with a New Local Contrast Enhancement Approach. Mathematics 2022, 10, 841. [Google Scholar] [CrossRef]
  23. Lin, C.-C.; Nguyen, T.-S.; Chang, C.-C. LRW-CRDB: Lossless Robust Watermarking Scheme for Categorical Relational Databases. Symmetry 2021, 13, 2191. [Google Scholar] [CrossRef]
  24. Lin, J.-Y.; Horng, J.-H.; Chang, C.-C. A Novel (2, 3)-Threshold Reversible Secret Image Sharing Scheme Based on Optimized Crystal-Lattice Matrix. Symmetry 2021, 13, 2063. [Google Scholar] [CrossRef]
  25. Aryal, A.; Imaizumi, S.; Horiuchi, T.; Kiya, H. Integrated Model of Image Protection Techniques. J. Imaging. 2018, 4, 1. [Google Scholar] [CrossRef] [Green Version]
  26. Thodi, D.M.; Rodriguez, J.J. Expansion Embedding Techniques for Reversible Watermarking. IEEE Trans. Image Process. 2007, 16, 721–730. [Google Scholar] [CrossRef]
  27. Hung, C.-C.; Lin, C.-C.; Wu, H.-C.; Lin, C.-W. A Study on Reversible Data Hiding Technique Based on Three-Dimensional Prediction-Error Histogram Modification and a Multilayer Perceptron. Appl. Sci. 2022, 12, 2502. [Google Scholar] [CrossRef]
  28. Cai, S.; Li, X.; Liu, J.; Guo, Z. A new reversible data hiding scheme exploiting high-dimensional prediction-error histogram. In Proceedings of the IEEE International Conference on Image Processing (ICIP’16), Phoenix, AZ, USA, 25–28 September 2016; pp. 2732–2736. [Google Scholar]
  29. Ou, B.; Li, X.; Zhao, Y.; Ni, R.; Shi, Y.Q. Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans. Image Process. 2013, 22, 5010–5021. [Google Scholar] [CrossRef]
  30. Zhan, Y.; Su, Y.; Wang, X.; Pei, Q. Three-dimensional prediction-error histograms based reversible data hiding algorithm for color images. Multimed. Tools Appl. 2019, 78, 35289–35311. [Google Scholar] [CrossRef]
  31. Jiang, R.; Zhang, W.; Hou, D.; Wang, H.; Yu, N. Reversible data hiding for 3D mesh models with three-dimensional prediction-error histogram modification. Multimed. Tools Appl. 2018, 77, 5263–5280. [Google Scholar] [CrossRef]
  32. Li, X.; Li, J.; Li, B.; Yang, B. High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Process. 2013, 93, 198–205. [Google Scholar] [CrossRef]
  33. Aljuaid, H.; Parah, S.A. Secure Patient Data Transfer Using Information Embedding and Hyperchaos. Sensors 2021, 21, 282. [Google Scholar] [CrossRef] [PubMed]
  34. Kaw, J.A.; Gull, S.; Parah, S.A. SVIoT: A Secure Visual-IoT Framework for Smart Healthcare. Sensors 2022, 22, 1773. [Google Scholar] [CrossRef] [PubMed]
  35. Hu, Y.; Lee, H.; Chen, K.; Li, J. Difference Expansion Based Reversible Data Hiding Using Two Embedding Directions. IEEE Trans. Multimed. 2008, 10, 1500–1512. [Google Scholar] [CrossRef]
  36. Kamstra, L.; Heijmans, H.J.A.M. Reversible data embedding into images using wavelet techniques and sorting. IEEE Trans. Image Process. 2005, 14, 2082–2090. [Google Scholar] [CrossRef] [PubMed]
  37. Wang, X.; Chang, C.C.; Lin, C.C.; Chang, C.C. Privacy-preserving Reversible Data Hiding Based on Quad-tree Block Encoding and Integer Wavelet Transform. J. Vis. Commun. Image Represent. 2021, 79, 103203. [Google Scholar] [CrossRef]
  38. Chang, C.C.; Lin, C.Y.; Fan, Y.H. Lossless data hiding for color images based on block truncation coding. Pattern Recognit. 2008, 41, 2347–2357. [Google Scholar] [CrossRef]
  39. Chan, Y.K.; Chen, W.T.; Yu, S.S.; Ho, Y.A.; Tsai, C.S.; Chu, Y.P. A HDWT-based Reversible Data Hiding Method. J. Syst. Softw. 2009, 82, 411–421. [Google Scholar] [CrossRef]
  40. Hsu, T.C.; Yein, A.D.; Hsieh, W.S.; Chen, N.T.; Chiang, J.Y.; Su, T.S. Reversible Watermarking Algorithm Based on Embedding Pixel Dependence. J. Internet Technol. 2012, 13, 571–580. [Google Scholar]
  41. Kim, H.J.; Sachnev, V.; Shi, Y.Q.; Nam, J.; Choo, H.G. A Novel Difference Expansion Transform for Reversible Data Embedding. IEEE Trans. Inf. Forensics Secur. 2008, 3, 456–465. [Google Scholar]
  42. Hu, Y.; Lee, H.; Li, J. DE-Based Reversible Data Hiding with Improved Overflow Location Map. IEEE Trans. Circuits Syst. Video Technol. 2009, 2, 250–260. [Google Scholar]
  43. Chang, C.C.; Pai, P.Y.; Yeh, C.M.; Chan, Y.K. A High Payload Frequency-based Reversible Image Hiding Method. Inf. Sci. 2009, 180, 2286–2298. [Google Scholar] [CrossRef]
  44. Hong, W.; Chen, T.S. A Local Variance-controlled Reversible Data Hiding Method Using Prediction and Histogram-shifting. J. Syst. Softw. 2010, 83, 2653–2663. [Google Scholar] [CrossRef]
  45. Luo, L.; Chen, Z.; Chen, M.; Zeng, X.; Xiong, Z. Reversible Image Watermarking Using Interpolation Technique. IEEE Trans. Inf. Forensics Secur. 2010, 5, 187–193. [Google Scholar]
Figure 1. The context of pixel p.
Figure 1. The context of pixel p.
Sensors 22 04872 g001
Figure 2. Block diagram of dynamic threshold analysis.
Figure 2. Block diagram of dynamic threshold analysis.
Sensors 22 04872 g002
Figure 3. Algorithm of proposed scheme for information embedding.
Figure 3. Algorithm of proposed scheme for information embedding.
Sensors 22 04872 g003
Figure 4. The original and predictive image of “Airplane”; (a) original image; (b) predictive image.
Figure 4. The original and predictive image of “Airplane”; (a) original image; (b) predictive image.
Sensors 22 04872 g004
Figure 5. Predicted model construction.
Figure 5. Predicted model construction.
Sensors 22 04872 g005
Figure 6. Block diagram of the proposed dynamic threshold analysis.
Figure 6. Block diagram of the proposed dynamic threshold analysis.
Sensors 22 04872 g006
Figure 7. Block diagram of secret data embedding.
Figure 7. Block diagram of secret data embedding.
Sensors 22 04872 g007
Figure 8. Block diagram of information extraction.
Figure 8. Block diagram of information extraction.
Sensors 22 04872 g008
Figure 9. Cover images are shown in (ap).
Figure 9. Cover images are shown in (ap).
Sensors 22 04872 g009aSensors 22 04872 g009b
Figure 10. The PSNRs with different bpps.
Figure 10. The PSNRs with different bpps.
Sensors 22 04872 g010
Figure 11. Payload and corresponding PSNR of the “Lena”, “Airplane”, and “Boat” images.
Figure 11. Payload and corresponding PSNR of the “Lena”, “Airplane”, and “Boat” images.
Sensors 22 04872 g011
Table 1. Dynamic threshold T(1) to T(8).
Table 1. Dynamic threshold T(1) to T(8).
T(1)T(2)T(3)T(4)T(5)T(6)T(7)T(8)
0−11−22−33−4
Table 2. Total bits of header file.
Table 2. Total bits of header file.
LPredicted ParameterskEApply Location MapThe Length of Location MapThe Number of Embedded Payloads in the Last LayerTotal
Bits
Does the last layer apply location map?Yes416121161665
No41612101649
Other Layer----1612------------28
Table 3. The PSNRs with different bpps.
Table 3. The PSNRs with different bpps.
bppPeppersAirplaneBaboonBoatBridgeCoupleCrowdElain
0.03852.8954.0948.8552.9949.6256.0849.6951.06
0.07650.6451.1145.8450.6647.0253.0546.1948.83
0.11549.2750.2843.1449.1845.0651.2443.8447.01
0.15348.4349.1540.9148.4343.1650.4141.0945.62
0.19147.0448.5039.3846.9941.3550.0939.1644.49
0.22946.5047.4137.6346.4539.8349.4137.2042.91
0.26745.4846.7336.3745.4038.5548.6435.6941.69
0.30544.7446.1235.1744.5037.2448.2734.3540.72
0.34343.7445.5733.8843.5336.1347.4032.9039.87
0.38242.8744.5332.2442.5635.1146.9331.5938.86
0.42042.0343.7530.8441.6733.9746.6730.3438.14
0.45841.4242.8229.7040.6132.7546.1029.0537.39
0.49640.2942.0128.6539.6931.6345.2827.9036.69
0.53439.2841.0228.8038.6830.6744.6326.5035.93
0.57238.2940.0025.9037.4929.6943.7825.1834.85
0.61137.5038.8524.5536.5928.8043.0426.3133.86
0.64936.7337.7722.6935.9429.3542.1422.0533.00
bppFlowerGirlGoldhillHatLakeLenaLocoMartha
0.03854.8354.9751.4453.9751.9852.8954.9553.00
0.07651.9851.6249.5350.8749.3550.6451.5550.71
0.11550.7050.5347.9949.9147.6949.2750.5149.48
0.15350.1649.6046.3748.5746.3548.4348.7648.47
0.19147.9048.5445.2148.0245.0247.0447.4347.56
0.22945.8747.8144.1246.9343.4146.5046.0046.64
0.26743.9846.9042.8446.5242.1345.4844.6946.19
0.30542.2946.5941.6945.6141.0344.7443.0045.46
0.34340.7245.8440.7945.0939.9643.7441.4444.65
0.38239.2645.3439.8944.0238.8142.8740.3843.83
0.42037.9744.3238.9543.2937.8042.0339.0643.05
0.45836.7543.5638.2242.5636.8441.4237.8042.30
0.49635.7142.7937.4141.9536.0240.6636.5441.81
0.53435.2942.1736.6441.2435.9740.0235.8241.15
0.57234.8641.4235.7140.4634.1339.2235.4540.42
0.61134.2740.5334.9439.7133.4038.4434.6839.81
0.64934.0539.5334.0938.8832.5537.5034.3239.00
Table 4. The payloads with different layers and images.
Table 4. The payloads with different layers and images.
PeppersAirplaneBaboonBoatBridgeCoupleCrowdElain
Layer 1155,489166,20688,028153,938104,043185,21481,730137,341
Layer 246,55733,83649,93547,87263,10117,15549,23363,037
Layer 3 25,799 33,515 28,111
Layer 4 13,002 15,029
payload202,046200,042176,764201,810200,659202,369174,103200,378
FlowerGirlGoldhillHatLakeLenaLocoMartha
Layer 1127,797174,779145,195174,660130,152166,059133,218177,391
Layer 272,60527,18555,13128,36670,13134,37567,39622,741
Layer 3 1,592
Layer 4
payload200,402201,964200,326203,026201,875200,434200,614200,132
Table 5. Parameters of each layer.
Table 5. Parameters of each layer.
Images and ParametersParameters of Each Layer
123456789
LenaA1−23−23−343−4
B0−28−2306−410
k121111111
AirplaneA1−1−11-----
B00−36-----
k1311-----
BoatA1−2−2−22−4−3−2−2
B00842−6−888
k111111111
Table 6. Experiment compared with Chang’s method.
Table 6. Experiment compared with Chang’s method.
ImagesChang’s
Method
Proposed
Method
Compare
LenaEmbedded Data62,78499,767+36,983
Extra Information68,288273−68,015
PSNR (dB)43.7349.85+6.12
AirplaneEmbedded Data74,65699,909+25,253
Extra Information56,416133−56,283
PSNR (dB)43.7149.14+5.43
BoatEmbedded Data48,88869,763+20,875
Extra Information82,184277−81,907
PSNR (dB)43.2249.61+6.39
Table 7. Performance comparison among different reversible information hiding methods.
Table 7. Performance comparison among different reversible information hiding methods.
Image Hung’s
Method
Hong’s
Method
Luo’s
Method
Cai’s
Method
Proposed
Method
LenaPayload59,75146,83971,6747964100,040
PSNR (dB)48.6449.1948.8262.1649.85
Airplane
(F-16)
Payload66,46564,86384,05021,30070,042
100,042
PSNR (dB)48.7549.3948.9458.2749.70
49.14
BoatPayload37,93829,824-292370,040
PSNR (dB)48.4149.02-66.2649.62
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Pan, I.-H.; Huang, P.-S.; Chang, T.-J.; Chen, H.-H. Multilayer Reversible Information Hiding with Prediction-Error Expansion and Dynamic Threshold Analysis. Sensors 2022, 22, 4872. https://doi.org/10.3390/s22134872

AMA Style

Pan I-H, Huang P-S, Chang T-J, Chen H-H. Multilayer Reversible Information Hiding with Prediction-Error Expansion and Dynamic Threshold Analysis. Sensors. 2022; 22(13):4872. https://doi.org/10.3390/s22134872

Chicago/Turabian Style

Pan, I-Hui, Ping-Sheng Huang, Te-Jen Chang, and Hsiang-Hsiung Chen. 2022. "Multilayer Reversible Information Hiding with Prediction-Error Expansion and Dynamic Threshold Analysis" Sensors 22, no. 13: 4872. https://doi.org/10.3390/s22134872

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop