Abstract
After conducting deep research on all existing reversible data hiding (RDH) methods based on Alattar’s integer transform, we discover that the frequently-used method in obtaining the difference value list of an image block may lead to high embedding distortion. To this end, we propose an improved Alattar’s transform-based-RDH-method. Firstly, the irregular block partition method which makes full use of high correlation between two neighboring pixels is proposed to increase the embedding performance. Specifically, each image block is composed of a center pixel and several pixels surrounding this center pixel. Thus, the difference value list is created by using the center pixel to predict each pixel surrounding it. Since the center pixel is highly related to each pixel surrounding it, a sharp difference value histogram is generated. Secondly, the mean value of an image block in Alattar’s integer transform has embedding invariance property, and therefore, it can be used for increasing the estimation performance of a block’s local complexity. Finally, two-layer embedding is combined into our scheme in order to optimize the embedding performance. Experimental results show that our method is effective.
1. Introduction
In the field of information security, a technique called data hiding has been developed widely to hide secret bits into cover images for copyright protection, image authentication, etc. However, most data hiding techniques only focus on correct extraction of hidden data, while neglect lossless recovery of cover images. It is known that lossless recovery of cover images is required in some applications like remote sensing, law enforcement, archive management, etc. Thus, reversible data hiding (RDH), a kind of special data hiding, is presented to satisfy the requirements of these applications. Its speciality lies in the fact that it enables the original image to be completely recovered without any distortion after the embedded bits are extracted.
In the past decade, RDH has been extensively studied and a large amount of RDH schemes have been proposed. Here, we categorize the existing RDH schemes into five main classes according to their used techniques: lossless compression [1], difference expansion (DE) [2], histogram shifting (HS) [3], prediction-error expansion (PEE) [4] and integer transform [5,6,7,8]. In the early stage of RDH development, lossless compression was the frequently-used technique, in which secret bits are embedded into the vacant embedding space generated by compressing the images. However, lossless compression cannot provide high embedding capacity. The demand for high embedding capacity was becoming more and more urgent. In 2003, Tian proposed an RDH method called DE to make a great improvement in embedding capacity [2]. The key idea of schemes based on DE is to expand the difference value between two adjacent pixels to create a vacant least significant bit (LSB), and then embed one data bit into this empty LSB. HS was firstly proposed by Ni et al. to select the maximum and minimum points in the histogram for embedding [9]. The maximum modification in HS is one grayscale unit. Afterwards, some improvements on HS were generated [10]. After studying DE deeply, Thodi et al. found that DE can be further improved to obtain a sharper difference histogram. To this end, Thodi et al. introduced the prediction in DE, and thus a sharper prediction-error histogram is generated, which helps to further improve embedding performance. Later, various research on how to improve the prediction accuracy has been carried out [11,12,13,14,15,16,17,18,19,20,21,22,23,24,25]. The schemes based on integer transform have a similar feature that more than two pixels are grouped into a unit, and then this unit is processed to carry data via an integer transform [5,6,7,8].
Compared with Alattar’s transform [5], Weng et al.’s method [8] selects previously the blocks located in smooth regions for data embedding. Therefore, the smoothness estimation of blocks is very important to the increase of embedding performance. Alattar’s method has a characteristic that the mean value of a block is kept unaltered after embedding. Weng et al. made full use of this characteristic and utilized the mean value of a block along with pixels surrounding this block to estimate a block’s smoothness. Thus, the application of the invariant mean value helps to increase embedding performance. In Weng et al.’s method, there is still room for improvement. They obtain the difference list by calculating the difference values between every two neighboring pixels in a block. Since two neighboring pixels are highly related, a sharp distribution of difference histogram is generated. However, in the process of calculating the watermarked pixels, they neglect that the accumulated sum of difference values is very large, and cannot be ignored, especially when most difference values within a block are positive integers or most difference values within a block are negative integers. More importantly, the accumulated sum results in large modifications to the original pixels. That is to say, the difference between the original and hidden pixels is very large. As an extension of Weng et al.’s method, we propose an improved Alattar’s transform-based-RDH-method. Firstly, the irregular block partition method which makes full use of high correlation between two neighboring pixels on the basis of reducing embedding distortion is proposed. Specifically, each image block is composed of a center pixel and its surrounding pixels. Thus, the difference value list is created by using the center pixel to predict each pixel surrounding it. Since the center pixel is highly related to its surrounding pixels, a sharp difference value histogram is generated. Secondly, the mean value of an image block in Alattar’s integer transform has embedding invariance property, and, therefore, it can be used for increasing the estimation performance of block’s local complexity. Finally, two-layer embedding is combined into our scheme in order to optimize the embedding performance. Extensive experimental results show that the proposed method has better embedding performance.
2. Related Works
2.1. Weng et al.’s Method
Here, we will give a simple introduction for Weng et al.’s method. In their method, the original image I is partitioned into non-overlapped image blocks with size n. All the pixels in a block are arranged into a one-dimensional pixel list according to odd rows from left to right, even rows from right to left (see Figure 1). The mean value of and the difference values can be calculated as Equation (1):
where are n pixels of the pixel list , and is the mean value of .
Figure 1.
Taking a -sized block for example, a two-dimensional image block is arranged into a one-dimensional pixel list according to the arrow direction.
The inverse transform of Equation (1) is formulated in Equation (2):
where represents the watermarked pixel list. From Equation (2), we know the difference value , , is magnified by times in the process of calculating when is generated by two neighboring pixels. This is also the reason that the difference values calculated by every two neighboring pixels would result in high embedding distortion. The rest of this section will explain it.
If each of difference values is expanded to carry one-bit data, then Equation (2) can be converted into Equation (3):
In order to illustrate the effect of difference expansion on embedding distortion, Equation (3) needs to be further simplified. To this end, suppose ; then, we know . is replaced by to simplify Equation (3) as below:
where the notation is used to denote an additional term, i.e., .
After simplicity, it can be seen clearly that Equation (4) is composed of two parts: an embedding process and an additional term . In the embedding process, is regarded as a prediction value to predict each pixel within a block. The value of is related to the distortion (i.e., the modified magnitude of each pixel in . From the formula of calculating , we know is mainly determined by and , where . In the rest of this paper, for simplicity of description, the range of the value i will be no longer rementioned. Specifically, since and , . The maximum is obtained when is and all to-be-embedded bits are 1. Even if does not reach this maximum, is also very large because the is magnified by times. This maximum is determined predominantly by the block size n. In a word, the bigger the block size n is, the larger is, and the higher the distortion becomes.
According to the description above, blocks with large size n cannot be used in Weng et al.’s method. Therefore, the blocks with size 4 are utilized in their method. However, even if n is set 4, this maximum of is 3, which would still lead to large decline in PSNR value. In addition, when n is 4, the maximum embedding rate only reaches 0.75 bpp (bit per pixel). In other words, there is still much room for improvement in Weng et al.’s method. To this end, our method focuses on increasing block size on the basis of reducing embedding distortion as much as possible by adopting a different way of obtaining the difference values.
2.2. Alattar’s Method
Alattar’s integer transform can be formulated in Equation (5):
where the notation l is used to represent the average value of an n-sized image block, and are difference values of this block.
In the data embedding process, the watermarked is obtained by expanding to carry 1-bit data, i.e., = 2+, where . The watermarked pixels are calculated via Equation (6):
On the decoding side, the original difference is retrieved and the is extracted by Equation (7):
where .
3. The Proposed Scheme
According to the description in Section 2, the difference values created by two neighboring pixels would result in large embedding distortion. To resolve this problem, we need to change the way of obtaining difference values. However, in order to remain high visual quality, high correlation between two adjacent pixels needs to be preserved. To achieve this goal, an irregular block partition strategy is proposed in our method, in which each block is composed of a center pixel and its neighboring pixels. With the adoption of the irregular block partition strategy, the center pixel is adjacent to each pixel surrounding it. After block partition, the center pixel is utilized to predict each pixel surrounding it, so that a sharp prediction-error histogram is generated. Finally, two-layer embedding is utilized to further increase embedding performance. Here, we will give a detailed description for each part of the proposed method (i.e., irregular block partition, block selection and two-layer embedding), and, meanwhile, performance analysis in Section 3.2 is used to explain the reason that our method can achieve better performance than Weng et al.’s.
3.1. Irregular Block Partition
The key idea of constructing the irregular block partition is to design different partition methods for different sized blocks to increase the correlation between the center pixel and its neighbors. In our scheme, an n-sized block has its own particular partition strategy, and each block has a center pixel and its surrounding pixels, as shown in Figure 2. For a 4-sized image block, is the center pixel, and , and are the three surrounding pixels of (Figure 2a). The blocks can also be a combination of 5-sized and 7-sized blocks (Figure 2b). In the rest of this paper, for simplicity, we utilize to indicate the block partition in Figure 2b. For a 9-sized block, the center pixel is surrounded by eight neighboring pixels (Figure 2c).
Figure 2.
Various-sized image blocks.
In fact, our method can also be used for a generic block size n. However, the embedding performance may lead to an unsatisfactory result. To this end, we propose the irregular block partition. From Figure 2, one can observe that all three partition methods can make full use of high correlation between the center pixel and its neighboring pixels so that optimal embedding performance can be achieved. For an image I of a given size, it is partitioned into non-overlapped blocks according to one of three partition methods in Figure 2. Each partition method will yield a highest PSNR at a given payload. Therefore, there are three candidates of the PSNR. Among these three candidates, the highest PSNR is decided as the final PSNR. Meanwhile, the block partition method corresponding to the highest PSNR is selected as the optimal block size.
3.2. Performance Analysis
After block partition, for an n-sized (e.g., 4, 5 or 9) image block, the center pixel is used to predict each pixel surrounding so that the difference values are generated:
During the embedding process, each original difference value is compared with a predefined threshold value so as to determine its corresponding modification method. Specifically, if one difference value falls into , then it is suitable for expansion and it can be embedded with one-bit data. Otherwise, it is shifted by to reduce embedding distortion (see Equation (11)):
Substitute all modified difference values in Equation (11) into Equation (10), and a watermarked pixel array is obtained in Equation (12):
where is used to represent the modified center pixel.
Here, in order to clearly explain that the prediction method used in our scheme would introduce less distortion, all the difference values within a block are considered to be expanded to carry one-bit data, and then our transform can be reorganized into a new equation:
Since , Equation (13) can be simplified as follows:
In order to differentiate with , we utilize another notation to denote the additional term, i.e., .
It can be clearly seen that the difference between Equation (4) and Equation (13) is the additional term. Comparing with , is smaller than because in is not magnified by times. Since and , then the range of is calculated as follows: i.e., . As mentioned above, the in Equation (4) is dependent on the block size n. When n is set a large value, the distortion introduced by is very large. On the contrary, is not related with n. Whatever n is, the visual effect to host image is very small and fixed. Even if the same n is set in Weng et al.’s method and ours, the maximum of is larger than that of . Based on this advantage, n can be set to in our method. Therefore, a 9-sized block is able to carry at most 8 data bits and the maximal embedding rate approximates to 89%.
3.3. Block Selection
How to design accurate evaluation method of local smoothness is an important factor for improving embedding performance. In Alattar’s integer transform, although each pixel in a block may be changed in the data embedding process, the mean value remains unaltered. The mean value represents the average value of all pixels in a block. Therefore, it can help to increase evaluation accuracy of the local complexity. To this end, the mean value is utilized along with the neighborhood (see Figure 3) to evaluate the local complexity. The local complexity, denoted by , is computed in Equation (15):
where u denotes the mean value between and neighboring pixels.
Figure 3.
An -sized block is marked in black, and its neighborhood is composed of pixels marked in green, where .
If the block complexity is smaller than a predefined threshold , then this block is identified to be within a smooth region. Otherwise, it is estimated to be located in a rough region. It is well known that the advantage of smooth blocks lies in the fact that they introduce lower distortion than complex blocks at the same payload. In order to remain low embedding distortion, the blocks in complex regions are usually not used in the data embedding process. For smooth blocks, they cannot be used entirely for data embedding because of overflow or underflow problem. Specifically, after data embedding, each modified pixel in a smooth block must fall into the range of . Otherwise, overflow or underflow happens and this smooth block cannot be used for data embedding. In order to clearly identify these unused smooth blocks, a location map is created. Since the complex blocks can easily be identified by comparing with , it is not necessary for them to be recorded in this map. Therefore, this map is marked by 1 when , where , and . Otherwise, the map is marked by 0 when , where . After the location map is generated, it is losslessly compressed by an arithmetic encoder to create a compressed bitstream L, and its length is .
3.4. Two-Layer Embedding
The key idea of two-layer embedding is to perform the embedding process twice by adopting different embedding modes. Here, we will give an example to explain what the embedding mode is. In this example, the block size is set 4. That is to say, n is equal to . When n is 4, there exist four modes, in each of which some pixels are excluded from block partition, while the remaining ones are involved in block partition. From Figure 4, it can be seen that all the pixels marked in white circles are used for data embedding, while the pixels marked in black circles are excluded from data embedding in each mode. More specifically, the pixels used for data embedding are partitioned into n-sized image blocks. Therefore, in our method, a different mode is selected in each layer. The advantage of doing so is to further increase embedding performance.
Figure 4.
Four modes.
Virtually, our scheme benefits significantly from two-layer embedding. It can provide superior embedding performance in contrast to one-layer embedding. With the help of two-layer embedding, each layer is capable of carrying a part of the payload so that the thresholds, i.e., and , can be set smaller values. We utilize Lena and Barbara as test images to demonstrate the advantage of two-layer embedding. Table 1 gives comparison of the optimal thresholds, PSNR, payload size (bpp) between one-layer and two-layer embedding on Lena and Barbara.
Table 1.
Performance comparison between one-layer embedding and two-layer embedding on Lena and Barbara.
4. Embedding and Extraction Procedures
This section is used for describing the embedding and extraction procedures, respectively.
4.1. Embedding Procedure
According to the description above, some information, e.g., , and the compressed location map L, helps decoders to recover the host images and extract hidden data on the decoding side. Without them, the reversibility cannot be ensured. Therefore, this information needs be embedded into host images for blind extraction.
This information is composed of the compressed location map L ( bits), (8 bits), (8 bits), the block size (4 bits for r and 4 bits for s), E (23 bits) and end of symbol (EOS) (8 bits). Since the to-be-embedded image may not be completely embedded in each embedding layer, some additional information needs to be recorded, e.g., the location (i.e., row number and column number) where the embedding process is terminated in each embedding layer. E is created to contain these additional information, which is composed of nine bits (row number), nine bits (column number), four bits (representing the type of embedding modes) and one bit (differentiating one-layer and two-layers embedding. 0 and 1, respectively, denote one-layer and two-layer embedding). For example, for , nine embedding modes are provided by employing 9-sized blocks so that four bits are required. In addition, an end of symbol (EOS) is put at the end of the overhead information. Generally, the size of the overhead information .
The size of the overhead information largely depends on the size of the compressed location map . We utilize Table 2 to denote the size of the compressed location map under different payload size for Lena and Baboon. As illustrated in Table 2, the location map can be losslessly compressed into a very short bitstream whatever the payload is. Even if the required payload is large, is still very small. Therefore, the overhead information occupies a very small proportion of the payload.
Table 2.
Size of the compressed location map under different payload size for Lena and Baboon.
The detailed data embedding process is listed as follows.
Input: Host image I, block size , threshold , threshold , to-be-embedded watermark.
Output: Watermarked image .
- (1)
- One-layer embedding
- Data bits embeddingif=;elseifendFor the blocks without adjacent pixels, they are ignored in the embedding procedure to ensure reversibility. We employ to describe the number of data bits embedded into the host image, which is equivalent to the number of difference values belonging to .
- Overhead information embeddingThe overhead information is obtained according to the description above. Suppose denotes the required payload, and it is partitioned into two parts which correspond to the first and second embedding layers, respectively. stands for the to-be-embedded payload of the current layer, while represents the maximal embedding capacity. Firstly, is embedded into the blocks in according to the step of data bits embedding. Secondly, for the first modified pixels, we collect their LSBs (least significant binary) and append them to the payload . In this way, the locations of their LSBs are vacant so that they can be occupied by the overhead information. Finally, the rest of the payload along with LSBs are embedded into the remaining blocks in according to the step of data bits embedding.
- (2)
- Watermarked image obtaining
- IfThe payload can be satisfied by one-layer embedding. Therefore, a watermarked image is created after (1) is performed.elseifTwo-layer embedding is adopted to achieve required payload . The remaining payload is defined as . Suppose , then we repeat (1) for the second-layer embedding.end
4.2. Extraction Procedure
Input: Watermarked image .
Output: Host image I, extracted watermark.
Step 1: Overhead information extraction
The LSBs of the watermarked pixels are collected into a binary sequence . The EOS symbol is obtained from the . All the bits before EOS are decompressed by an arithmetic decoder so as to retrieve the original location map. The location map is recompressed to obtain . The additional information after are extracted one by one according to their own lengths.
Step 2: Data extraction and original image recovery
After the row and column numbers where the embedding procedure are terminated is gained, the last modified block is determined. To ensure reversibility, the data extraction process must be performed according to the inverse order of data embedding. That is to say, the last modified block is firstly extracted while the first modified block is last extracted.
For the blocks whose local variance belongs to , they are kept invariant. As for the blocks whose local variance falls into the range of and their corresponding locations in location map are assigned by 0, they remain unchanged. When the locations of the blocks located in are recorded as 1, these blocks can be completely restored according to Equations (10) and (16). In addition, the blocks without neighbors are skipped during the extraction process:
After the original LSBs are fully extracted in each embedding layer, they are used for replacing the LSBs of the first modified pixels in the data embedding process so as to ensure payload extraction. If the extracted bit used for identifying one-layer or two-layer embedding is 0, then the original image is able to be correctly recovered after Steps 1 to 2 are performed. Otherwise, we repeat Steps 1 and 2 for the second-layer extraction.
5. Experimental Results
In the experiments, we compare our method with five RDH schemes proposed by Alattar [5], Wang et al. [6], Peng et al. [7], Weng et al. [8] and Luo et al. [16] so as to demonstrate our method is effective. Figure 5 illustrates comparisons of capacity-distortion performance among six RDH schemes on six images: Airplane, Baboon, Barbara, Goldhill, Sailboat and Lena.


Figure 5.
Comparison of capacity-distortion performance among six reversible data hiding (RDH) schemes on six images: Airplane, Baboon, Barbara, Goldhill, Sailboat and Lena.
Our method achieves better performance compared with Alattar’s method by introducing block selection and irregular block partition. The experimental result also shows that the proposed method outperforms Alattar’s method. The integer transform proposed by Wang et al. can be thought to be a prediction process, in which the mean value of a block is used for predicting each pixel in this block. Their method is able to achieve high visual quality because there is not an additional term in Wang et al.’s scheme. However, when a block is used for data embedding, all the pixels must be expanded to carry data bits even if the distortion introduced by modified pixels is huge. In addition, it is very difficult to compress the location map which aims at differentiating the available blocks with unused ones in their method. In our method, the differences between every two pixels can be controlled by so as to keep high visual quality. In the light of the invariant mean value, only the locations of the blocks identified to be within smooth regions are necessary to be recorded. To this end, in comparison to Wang et al.’s method, a location map with reduced size is required in our scheme and it is able to be remarkably compressed. In a word, our method achieves higher performance than Wang et al.’s. As an extension of Wang et al.’s method, Peng et al.’s method embeds more than one bit into each pixel in a block. Therefore, the problems in Wang et al.’s method are extended to Peng et al.’s. Thus, our method is superior to Peng et al.’s.
As for Airplane, Barbara, Goldhill and Sailboat in Figure 5, superior capacity-distortion performance can be obtained in our method at all embedding rates in contrast to Weng et al.’s. More specifically, slight increase in PSNR is introduced in our algorithm when low capacity is required, especially at the embedding rates smaller than 0.3 bpp. However, the proposed scheme provides significantly preferable performance at high embedding rates larger than 0.3 bpp. Experimental results in Baboon and Lena demonstrate that the distortion generated in our method is slightly higher than Weng et al.’s at low embedding rates. In contrast, when it comes to higher embedding rates (0.3 bpp for Baboon and 0.5 bpp for Lena), the performance is capable of exceeding that of Weng et al.’s method. In brief, the new algorithm is able to achieve more effective embedding performance, especially when larger embedding capacity is required. This is because the additional term provided in our method is smaller, which enables less distortion and better visual quality at the given embedding rates. Apart from small sized blocks, larger sized ones are also adopted in this paper. In this way, the embedding capacity increases dramatically while distortions produced by modification are low for the pixels located in smooth regions. In addition, unique prediction patterns employed in our method compensate for the shortage existing in large sized blocks i.e., weak intra-block correlation. In other words, more accurate prediction is achieved and a sharper difference histogram is formed.
6. Conclusions
In this paper, we propose a RDH method based on Alattar’s integer transform. The irregular block partition is adopted to increase the correlation between two pixels within a block. Since the mean value remains unchanged before and after data hiding, it is utilized to improve the prediction accuracy of block complexity. In addition, two-layer embedding is also introduced to enhance the embedding performance. The experimental results show that the proposed method achieves better embedding performance compared with prior state-of-the-art works.
Author Contributions
S.W. conceived the overall idea of the article and wrote the paper, Y.C. carried out the experiments, analyzed the data, and contributed to the revisions. W.H., J.-S.P., C.-C.C. and Y.L. were the research advisors, who provided methodology suggestions and contributed to the revisions.
Acknowledgments
This work was supported in part by National NSF of China (Nos. 61872095, 61872128, 61571139, 61201393), the New Star of Pearl River on Science and Technology of Guangzhou (No. 2014J2200085), Natural Science Foundation of Xizang (No. 2016ZR-MZ-01), Department of Science and Technology at Guangdong Province and Dongguan City (Nos. 2016B090903001, 2016B090904001, 2016B090918126, 2015B090901060, 2017215102009).
Conflicts of Interest
The authors declare no conflict of interest.
References
- Celik, M.U.; Sharma, G.; Tekalp, A.M.; Saber, E. Lossless generalized-LSB data embedding. IEEE Trans. Image Process. 2005, 12, 157–160. [Google Scholar] [CrossRef]
- Tian, J. Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 2003, 13, 890–896. [Google Scholar] [CrossRef]
- Shi, Y.Q.; Ni, Z.C.; Zou, D.; Liang, C.Y.; Xuan, G.R. Lossless Data Hiding: Fundamentals, Algorithms and Applications. In Proceedings of the 2004 IEEE International Symposium on Circuits and Systems, Vancouver, BC, Canada, 23–26 May 2004; Volume 2, pp. 33–36. [Google Scholar]
- Thodi, M.; Rodriguez, J.J. Prediction-error based reversible watermarking. In Proceedings of the 2004 International Conference on Image Processing, Singapore, 24–27 October 2004; Volume 3, pp. 1549–1552. [Google Scholar]
- Alattar, A.M. Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans. Image Process. 2004, 13, 1147–1156. [Google Scholar] [CrossRef] [PubMed]
- Wang, X.; Li, X.L.; Yang, B.; Guo, Z.M. Efficient Generalized Integer Transform for Reversible Watermarking. IEEE Signal Process. Lett. 2010, 17, 567–570. [Google Scholar] [CrossRef]
- Peng, F.; Li, X.; Yang, B. Adaptive reversible data hiding scheme based on integer transform. Signal Process. 2012, 92, 54–62. [Google Scholar] [CrossRef]
- Weng, S.W.; Pan, J.S. Integer transform based reversible watermarking incorporating block selection. J. Vis. Commun. Image Represent. 2016, 35, 25–35. [Google Scholar] [CrossRef]
- Ni, Z.; Shi, Y.Q.; Ansari, N.; Su, W. Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 2006, 16, 354–362. [Google Scholar]
- Li, X.L.; Li, B.; Yang, B.; Zeng, T.Y. General Framework to Histogram-Shifting-Based Reversible Data Hiding. IEEE Trans. Image Process. 2013, 22, 2181–2191. [Google Scholar] [CrossRef] [PubMed]
- Hu, Y.; Lee, H.K.; Li, J. DE-based reversible data hiding with improved overflow location map. IEEE Trans. Circuits Syst. Video Technol. 2009, 19, 250–260. [Google Scholar]
- Sachnev, V.; Kim, H.J.; Nam, J.; Suresh, S.; Shi, Y.Q. Reversible Watermarking Algorithm Using Sorting and Prediction. IEEE Trans. Circuits Syst. Video Technol. 2009, 19, 989–999. [Google Scholar] [CrossRef]
- Tsai, P.Y.; Hu, Y.C.; Yeh, H.L. Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process. 2009, 89, 1129–1143. [Google Scholar] [CrossRef]
- Tai, W.L.; Yeh, C.M.; Chang, C.C. Reversible data hiding based on histogram modification of pixel differences. IEEE Trans. Circuits Syst. Video Technol. 2009, 19, 906–910. [Google Scholar]
- Hong, W.; Chen, T.S.; Shiu, C.W. Reversible data hiding for high quality images using modification of prediction errors. J. Syst. Softw. 2009, 82, 1833–1842. [Google Scholar] [CrossRef]
- Luo, L.; Chen, Z.; Chen, M.; Zeng, X.; Xiong, Z. Reversible image watermarking using interpolation technique. IEEE Trans. Inf. Forensic Secur. 2010, 5, 187–193. [Google Scholar]
- Hong, W. An efficient prediction-and-shifting embedding technique for high quality reversible data hiding. EURASIP J. Adv. Signal Process. 2010, 2010. [Google Scholar] [CrossRef]
- Coltuc, D. Improved embedding for prediction-based reversible watermarking. IEEE Trans. Inf. Forensic Secur. 2011, 6, 873–882. [Google Scholar] [CrossRef]
- Gao, X.; An, L.; Yuan, Y.; Tao, D.; Li, X. Lossless data embedding using eneralized statistical quantity histogram. IEEE Trans. Circuits Syst. Video Technol. 2011, 21, 1061–1070. [Google Scholar]
- Li, X.L.; Yang, B.; Zeng, T.Y. Efficient Reversible Watermarking Based on Adaptive Prediction-ErrorExpansion and Pixel Selection. IEEE Trans. Image Process. 2011, 20, 3524–3533. [Google Scholar]
- Wu, H.T.; Huang, J.W. Reversible image watermarking on prediction errors by efficient histogram modification. Signal Process. 2012, 92, 3000–3009. [Google Scholar] [CrossRef]
- Coatrieux, G.; Pan, W.; Cuppens-Boulahia, N.; Cuppens, F.; Roux, C. Reversible watermarking based on invariant image classification and dynamic histogram shifting. IEEE Trans. Inf. Forensic Secur. 2013, 8, 111–120. [Google Scholar] [CrossRef]
- Jung, S.; Ha, L.; Ko, S. A new histogram modification based reversible data hiding algorithm considering the human visual system. IEEE Signal Process. Lett. 2011, 18, 95–98. [Google Scholar] [CrossRef]
- Hong, W.; Chen, T.; Wu, M. An improved human visual system based reversible data hiding method using adaptive histogram modification. Opt. Commun. 2013, 291, 87–97. [Google Scholar] [CrossRef]
- Weng, S.W.; Pan, J.S. Reversible watermarking based on multiple predictionmodes and adaptive watermark embedding. Multimed. Tools Appl. 2013, 72, 3063–3083. [Google Scholar] [CrossRef]
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).