Next Article in Journal
On Finite Quasi-Core-p p-Groups
Previous Article in Journal
On the Effectiveness of Using Elitist Genetic Algorithm in Mutation Testing
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Implementation of Block-Based Hierarchical Prediction for Developing an Error-Propagation-Free Reversible Data Hiding Scheme

1
Department of Computer Science and Information Management, Providence University, Taichung 43301, Taiwan
2
Department of Electrical Engineering, Ming Chi University of Technology, New Taipei 24301, Taiwan
3
Department of Computer Science and Information Engineering, Providence University, Taichung 43301, Taiwan
4
Department of Electronic Engineering, Chung Yuan University, Taoyuan 32023, Taiwan
*
Author to whom correspondence should be addressed.
Symmetry 2019, 11(9), 1146; https://doi.org/10.3390/sym11091146
Submission received: 21 August 2019 / Revised: 3 September 2019 / Accepted: 5 September 2019 / Published: 9 September 2019

Abstract

:
This paper proposes a reversible data hiding technique based on the residual histogram shifting technique. To improve the hiding capacity, this study proposes a multiple-round hierarchical prediction mechanism that generates the prediction errors of each image block. The prediction errors of each block are collected to produce the residual histogram and the secret data are then embedded into the residual histogram to obtain the embedded image. Experimental results demonstrate that the proposed technique not only provides good hiding capacity, but also maintains good image quality of the embedded image. In addition, this technique can be easily extended for image integrity protection as it is capable of resisting error propagation.

Graphical Abstract

1. Introduction

The data hiding techniques are generally classified into two categories: irreversible data hiding techniques [1,2,3,4,5,6,7] and reversible data hiding techniques [8,9,10,11,12]. In the reversible data hiding technique, secret data can be extracted and the original cover image can be recovered simultaneously. That is why the reversible data hiding techniques are often called the lossless data hiding techniques. Two main approaches for developing reversible data hiding techniques are the difference expansion (DE) [13,14,15,16] and the histogram shifting (HS) [17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32] approaches. Boato et al. proposed a reversible data hiding scheme that combined the above two approaches in 2012 [15].
In 2006, Ni et al. introduced the concept of the histogram shifting for reversible data hiding [17]. The occurrences of all the possible pixel values in a cover image are calculated to generate the image histogram. Secret data are embedded into the pixels located at the peak points. Basically, the hiding capacity of HS equals the number of the pixels in the peak points used. More pairs of the peak and zero points are required in order to obtain a better hiding capacity while the maximum numbers of the pairs of the peak and zero points are less than or equal to 2 in most of the nature images.
To increase the hiding capacity of HS, several residual histogram shifting (RHS) techniques had been proposed [18,19,20,21,22,23,24]. Different prediction strategies were introduced in these RHS techniques to increase the occurrences of the peak points in the residual image histogram. Among these RHS techniques, the block-based prediction residual histogram shifting (BPRHS) technique proposed by Tsai et al. increases the hiding capacity and resists against the error propagation by using the block-based linear prediction [18]. The reversible data hiding techniques can be improved in order to protect the image integrity. The basic function of the image integrity protection technique is to detect the tamper areas of an image. Lo and Hu extended the BPRHS technique to protect the image integrity for image tamper detection [25]. In addition to detecting the tamper areas, some image integrity protection techniques are capable of roughly recovering the tamper areas.
Those reversible data hiding techniques mentioned above focused on the digital images in raw data format [17,18,19,20,21,22,23,24]. With the increasing demand of privacy protection, the ability to embed information in an encrypted image is desired. In the literature, some reversible data hiding techniques for the encrypted images had been introduced [26,27,28]. Some reversible data hiding techniques for the block truncation coding had been proposed [29,30,31]. An HS-based technique for the compressed images of block truncation coding had been proposed [29]; an RHS-based data hiding scheme had been introduced for the compressed images of the block truncation coding (BTC) [30]. Furthermore, an edge-based quantization approach had been designed for adaptive block truncation coding [31].
To improve the hiding capacity of BPRHS, Hu et al. proposed a cascading prediction approach, which utilizes a two-stage prediction mechanism with a fixed block size of 4 × 4 pixels [32]. In the first stage prediction, a fixed reference pixel is used, and the other pixels are predicted based on the nearest neighbor rule (NNR). To improve the hiding capacity of BPRHS further and to maintain good image quality of the embedded image, this paper proposes an efficient residual histogram shifting technique. The proposed technique extends the previous work [32] by using the multiple-round hierarchical prediction mechanism so that it can work on the images of various block sizes. Furthermore, the reference pixel of a block of n × n pixels where n is even can be selected adaptively to provide more flexibility. One of the four center pixels in each block can be selected to act as the reference pixel. According to the results, the hiding capacity and the embedded image quality are approximately the same when different reference pixels are used. The selection of reference pixel can provide additional security protection for data embedding. This paper is organized as follows. The review of the BPRHS technique is given in Section 2. Section 3 presents the proposed technique. Experimentation is conducted in Section 4. Finally, Section 5 concludes this paper.

2. Review on the BPRHS Technique

The BPRHS technique was proposed to increase the hiding capacity of the HS scheme [18]. In the HS scheme, the image histogram is generated and used to embed the secret data. The hiding capacity of HS is limited by the occurrences of pixels located at the peak points of the image histogram. To improve the hiding capacity of HS, the residual image histogram of the prediction errors will be generated and used to hide the secret data in BPRHS.
First, the cover image is partitioned into non-overlapped image blocks of n × n pixels. The center pixel in each block is selected as the reference pixel for block-based prediction. Except for the reference pixel, there are n × n−1 pixels in each n × n block. The prediction error (pe) of each remaining pixel can be computed by Equation (1):
p e = r d p r e f p .
where, rdp and refp denote the remaining pixel and the reference pixel, respectively.
By sequentially executing the block-based prediction process of each image block, all the prediction errors are computed to generate the residual image histogram. Let pno denote the number of pairs for peak and zero points used for secret data embedding. These pno pairs of peak and zero points are searched from the residual image histogram. Then, secret data is embedded into the prediction errors located at the peak points, and the prediction errors between the peak and zero points are shifted accordingly. Finally, the reverse block-based prediction process is executed to generate the embedded image.
An example of block-based prediction for the 4 × 4 image block by using BPRHS with pno = 2 is described as below. The position diagram of the pixels is given in Figure 1a. In BPRHS, p10 is taken as the reference pixel. The test image block of 4 × 4 pixels is listed in Figure 1b. A total of 15 prediction errors of the test block using BPRHS are shown in Figure 1c. Since there is no prediction error for the center pixel p10, the corresponding prediction error of p10 is marked as not available (N/A). The resultant residual image histogram of BPRHS is shown in Figure 2. Two pairs of peak and zero points (0,−4) and (2,5) are searched from this residual image histogram. These two pairs of peak and zero points are used in the residual histogram shifting process to embed the secret data. The hiding capacity of the BPRHS is 7 bits when the pno value is set to 2.

3. Proposed Technique

The goal of the proposed technique is to extend the hiding capacity of the BPRHS scheme when the block size is greater than 4 × 4. The proposed technique extends Hu’s scheme [32] by using the multiple-round hierarchical prediction mechanism. In Hu’s scheme, a two-stage prediction mechanism with a fixed block size of 4 × 4 pixels was introduced. In the first stage prediction, a fixed reference pixel is used, and the other pixels are predicted based on the nearest neighbor rule (NNR). It is obvious that the reference pixel usually has a lower degree of similarity to the pixels which are far away from it when the block size increases. To increase the occurrences of the peak points in the residual image histogram, the hierarchical prediction mechanism is designed in the proposed technique. Two prediction models are designed in the multiple-round prediction mechanism.

3.1. Data Embedding

In the proposed technique, the cover image is partitioned into non-overlapping image blocks of n × n pixels. Let pno denote the number of pairs of peak and zero points used for secrete data embedding. The value of pno is usually determined according to user’s requirement or the size of the embedded secret data. The multiple-round prediction mechanism is employed to sequentially process the image blocks in the order of left-to-right and top-to-bottom. For each block to be processed, the number of rounds (rno) that will be used in the hierarchical prediction mechanism should be determined first. The number of rounds needed for an n × n image block can be computed by Equation (2):
r n o = n 1 2 .
In case of the block size of 3 × 3, only one round of prediction is needed; two rounds are required for the block sizes of 4 × 4 and 5 × 5; three rounds are required in case of the block sizes of 6 × 6 and 7 × 7.
For each n × n block to be processed, the reference pixel in each block is to be determined. The value of n may be either odd or even so two possible cases can be found in determining the reference pixel of each block. First, the center pixel in the image block is taken as the reference pixel when n is odd. The same rule cannot be employed when n is even because four center pixels are found in each block. Only one of these four candidates can be selected as the reference pixel in the proposed technique. Recall that a fixed center pixel is selected as the reference pixel in BPRHS. In the proposed technique, the reference pixel can be adaptively selected by the user.
The index/indices idx of the center pixel for an n × n image block can be computed by Equation (3):
i d x = { n × n 2 if   n   is   odd n 2 ( n + 1 ) n 1 , n 2 ( n + 1 ) n , n 2 ( n + 1 ) 1 , n 2 ( n + 1 ) if   n   is   even .
According to the above Equation, the index of the center pixel equals 12 when the block size is 5 × 5. The indices of the center pixels are 5, 6, 9, and 10 when the block size is set to 4 × 4. Among these four center pixels, one will be selected as the reference pixel in the prediction process.
This study proposes two models of error prediction. The first round of the prediction process is the same for both of the two prediction models. Once the reference pixel is determined, the first round is executed. The prediction error (pe) of each directly adjacent pixel (dap) to the reference pixel (rp) is computed according to Equation (4):
p e = d a p r p .
where dap and rp denote the directly adjacent pixel and the reference pixel, respectively.
Let crno denote the current round number for block-based prediction. Initially, crno is set to 1. The first round of prediction mentioned above is first executed. Only 8 directly adjacent pixels of the reference pixel are processed. If rno is greater than 1, the succeeding rounds of the prediction process are executed. Otherwise, the prediction process stops.
In each succeeding round of the prediction, crno is increased by 1. The remaining pixels adjacent to the pixels processed in the previous round are selected. The closest adjacent pixel of each selected pixel is taken as the reference pixel. Here, the reference pixel is adaptively determined for each selected pixel based on NNR. The prediction error of each selected pixel (sp) to its nearest neighboring pixel (nnp) can be computed according to Equation (5):
p e = s p n n p .
If crno is less than rno, the above process can be extended round by round until all the pixels in this block are processed.
The above process is also called the first prediction model. Figure 3 depicts the first prediction model for 4 × 4 blocks. Here, the center pixel p10 is taken as the reference pixel of the image block. In the first round of prediction, eight prediction errors shown in Figure 3a of these directly adjacent pixels to the center pixel are computed. In the second round of the prediction process, the remaining seven prediction errors are computed as shown in Figure 3b. Here, p5 is taken as the reference pixel for p0, p1, and p4. Besides, p6, p7, p9, and p13 are taken as the reference pixels for p2, p3, p8, and p12, respectively. The prediction errors of this block are shown in Figure 3c.
Taking the test image block in Figure 1b as an example, the prediction errors of this block by the proposed multiple-round prediction mechanism are shown in Figure 4. A total of 15 prediction errors are generated by the proposed prediction mechanism for this 4 × 4 image block. The resultant residual image histogram of the prediction errors is shown in Figure 5.
Following this example, two pairs of peak and zero points are searched by this residual image histogram. They are (−1,−3) and (1,3). The maximal value of pno equals 2 in this example. The hiding capacities of the proposed technique are 5 and 9 bits when pno values are set to 1 and 2, respectively.
In addition to the first prediction model, we design the second prediction model based on the first one. The first round of the prediction process for the second prediction model is the same as that of the first prediction one. The prediction error of each directly adjacent pixel to the reference pixel can be computed according to Equation (3).
If there exist some remaining pixels to be processed in the succeeding rounds, the prediction error of each selected pixel (sp) to its nearest neighboring pixel (nnp) is computed according to Equation (6):
p e = ( 1 ) ( c r n o + 1 ) ×   ( s p n n p ) .
Figure 6 depicts the second prediction model for the 4 × 4 block. Similarly, the center pixel p10 is taken as the reference pixel of the image block. In the first round of the prediction process, eight prediction errors shown in Figure 6a of these directly adjacent pixels to the center pixel are computed. In the second round of the prediction process, the remaining seven prediction errors are computed as shown in Figure 6b. The prediction errors of this block are shown in Figure 6c.
In Figure 7 and Figure 8, the two prediction models for the 5 × 5 image block are depicted, respectively. Two rounds of the prediction process are performed to generate the prediction errors for the pixels in the image block of 5 × 5 pixels. A total of 24 prediction errors are generated after the multiple-round prediction mechanism is executed. In fact, the proposed hierarchical prediction mechanism can be extended for the image blocks of n × n pixels where n is greater than 5.
When the prediction errors of each n × n image block are computed by using the multiple-round prediction mechanism, the occurrences of all the possible residual values are calculated to generate the residual image histogram. After the residual image histogram is constructed, pno pairs of peak and zero points are then searched from the residual image histogram. The hiding capacity of the image equals the sum of the occurrences of the residual values located at these peak points.
Secret data are then embedded into the residual values in the peak points and the prediction errors between the peak and zero points will be shifted accordingly. After the secret data are embedded into the residual values, the embedded image can be generated by performing the reverse multiple-round prediction mechanism.

3.2. Data Extraction

The goal of the data extraction procedure is to extract secret data from the embedded image. In addition, the original cover image will be recovered after the secret data is extracted. Before the data extraction procedure is performed, the values of some system parameters, such as W, H, n, pno, the pairs of peak and zero points, and the prediction model used should be available.
First, the selected linear prediction model used in the data embedding procedure is applied on the embedded image to generate the residual embedded-image. The prediction errors of the residual embedded-image are examined to extract the embedded secret data and to recover the original cover image.
To extract the secret data, the prediction errors in each n × n block is sequentially processed in the raster scanning order. If the prediction error pe is not within any pair of the peak and zero points, pe is kept unchanged. Otherwise, three cases are discussed for pe that is within one specific pair of peak point and zero point. In the first case, if pe is located at the peak point, 1-bit secret data valued at 1 is extracted and the value of pe is unchanged. In the second case, if the zero point is smaller than the peak point and pe is smaller than the peak point by 1, 1-bit secret data value 0 is extracted and the value of pe is replaced by the value of the peak point. If the zero point is greater than the peak point and pe is greater than the peak point by 1, 1-bit secret data value 0 is extracted and the value of pe is replaced by the value of the peak point. Lastly, the remaining prediction errors are shifted close to peak point by 1 and no secret data is extracted. By sequentially processing the residual blocks in the rater scanning order, the embedded secret data is extracted from the residual embedded-image. Meanwhile, the original cover image is recovered by performing reverse linear prediction of the selected prediction model on the reconstructed embedded-image.

4. Results

Our experiments are performed on a Window 10 computer with Intel Core i7 3.6 GHz CPU and 16 GB random access memory (RAM). The testing programs are implemented in Bloodshed Dev C++. In our experiments, eight grayscale images of 512 × 512 pixels, “Airplane”, “Boat’, “Girl”, “Goldhill”, “Lenna”, “Pepper”, “Tiffany”, and “Zelda” in Figure 9, are used. These testing images are downloaded from the USC SIPI image database.
To measure the image quality of the embedded image, the mean square error (MSE) among the cover image and the embedded image of W × H pixels is defined as Equation (7):
M S E = 1 W × H i = 1 W j H ( o i j r i j ) 2 .
where oij and eij denote the grayscale pixels in the cover image and the embedded image, respectively.
Besides, the peak signal-to-noise ratio (PSNR) between the cover image and the embedded image is calculated by Equation (8):
P S N R = 10 × log 10 255 2 M S E d B .
Generally, PSNR is considered as an indication of image quality rather than a definitive computation. It is a common measure for evaluating image quality. A large PSNR value indicates that the difference between two given images is quite small.
The results of the hiding capacity of the proposed technique with the two prediction models when the block size is 4 × 4 are listed in Table 1 and Table 2, respectively. In the simulations, one of these four center pixels is selected as the reference pixel (refp). The same hiding capacities are obtained in these two prediction models when pno is set to 1. The average hiding capacities of 274,47.125, 273,41.125, 273,92, and 272,64 bits are achieved with pno is set to 1 when the reference pixels are p5, p6, p9, and p10, respectively.
The second prediction model performs slightly better hiding capacity than the first one when pno is set to 2. The average hiding capacities of 511,55.25, 509,43.13, 509,57.75, and 510,05.875 bits are achieved when pno to 2 in the second prediction model, and the reference pixels are p5, p6, p9, and p10, respectively. The results indicate the best hiding capacity is achieved in the proposed technique when the reference pixel is p5.
Table 3 and Table 4 list the results of the image quality of the first and second prediction models of the proposed technique when the block size is set to 4 × 4, respectively. Compared to the first prediction model, the second prediction model provides much better image quality when pno is set to 1. According to the results in Table 3, average PSNR values of 49.230, 49.217, 49.298, and 49.268 dB are achieved by using the first prediction model when pno is set to 1, and the reference pixels are p5, p6, p9, and p10, respectively. Compared to the first prediction model, average image quality gains of 2.291 dB, 2.307 dB, 2.229 dB, and 2.245 dB are achieved by using the second prediction model when pno is set to 1, and the reference pixels are p5, p6, p9, and p10, respectively.
Compared to the first prediction model, slightly worse PSNR values are obtained using the second prediction model when pno is set to 2. Average PSNR values of 47.772 dB, 47.769 dB, 47.760 dB, and 47.755 dB are achieved by using the first prediction model when pno is set to 2, and the reference pixels are p5, p6, p9, and p10, respectively. According to the results in Table 3 to Table 4, it is shown that the best image quality is achieved in the proposed technique when the reference pixel is set to p5.
Results of these two prediction models proposed in this paper when the block size is set to 5 × 5 are listed in Table 5 and Table 6, respectively. These two prediction models provide similar hiding capacities. Average hiding capacities of 287,00.875, 535,35.375, and 535,42.75 bits are achieved by the first prediction model when the pno values are 1, 2, and 3, respectively.
Compared to the first prediction model, the second prediction model provides much higher PSNR values. Average PSNR values of 51.550 dB, 46.523 dB, and 46.523 dB are achieved by the second prediction model when the pno values are 1, 2, and 3, respectively. Compared to the result by first prediction model, average image quality gains of 3.227 dB, 0.056 dB, 0.056 dB are achieved by the second prediction model when the pno values are 1, 2, and 3, respectively.
The comparative techniques and the proposed technique are analyzed and shown in Table 7. The average results of these techniques examined by eight test images are listed. HS and CM represent the histogram shifting technique [17] and the comparative method [32], respectively. BPRHS-4 × 4 and BPRHS-5 × 5 stand for the BPRHS with the block sizes of 4 × 4 and 5 × 5, respectively. PT1-4 × 4 and PT1-5 × 5 denote the proposed technique with the first prediction model when the block sizes are 4 × 4 and 5 × 5, respectively. PT2-4 × 4 and PT2-5 × 5 denote the proposed technique with the second prediction model when the block sizes are 4 × 4 and 5 × 5, respectively. It is shown that the hiding capacities of BPRHS-5 × 5 is less than those of BPRHS-4 × 4. This is because a fixed reference pixel in each block is used by BPRHS. The prediction error becomes inaccurate when the processed pixel is far away from the reference pixel.
However, this problem is not found in the proposed technique. According to the results reported in Table 3, Table 4, Table 5 and Table 6, it is shown that the hiding capacity of the proposed technique increases with the increments of the block size. This result indicates that the proposed multiple-round prediction mechanism indeed solves the problem that may occur when using BPRHS. Among these schemes, PS2-5 × 5 outperforms these comparative schemes.
According to the results, the proposed technique provides a better hiding capacity than HS and BPRHS. Compared to the results by HS and BPRHS, average hiding capacity gains of 427,78.125 and 4699.875 bits are achieved by the proposed technique when pno is set to 2, and the block size is set to 4 × 4, respectively. Good image quality of the embedded images is achieved by the proposed technique. From the results, average PSNR values of 51.768 dB and 47.772 dB are achieved by the proposed technique when the block size of 4 × 4, and the values of pno are set to 1 and 2, respectively.
In the data hiding techniques based on the histogram shifting technique, the value of pno and the pairs of peak and zero points should be stored additionally. If the overflow/underflow problem occurs, additional information is recorded so that the reversible property can be preserved. In the simulations demonstrated for comparative studies in this section, no overflow/underflow problem is encountered. That is due to the fact that the max number of pairs is set to 3.
A major problem of BPRHS is that the hiding capacity decreases with the increase of the block size. That is because a fixed reference pixel is used to generate the prediction for all the other pixels in BPRHS. This problem is solved by the multiple-round prediction mechanism in the proposed technique. The reference pixel is adaptively determined for each selected pixel based on the NNR in the multiple-round prediction mechanism. From the results, it is obvious that the use of the multiple-round prediction in the proposed technique compared to BPRHS achieves higher occurrences of the peak points in the residual histogram. Moreover, good visual quality of the embedded image is achieved by the proposed technique, as demonstrated from the experimental results.

5. Conclusions

An efficient residual histogram shifting technique based on the block-based prediction histogram shifting technique had been proposed in this paper. The multiple-round prediction mechanism was designed in this paper to generate the prediction errors for each image block. Two prediction models were employed in the prediction mechanism. Experimental results verify that the proposed technique outperforms the comparative methods in terms of the hiding capacity. Meanwhile, good image quality of the embedded image is obtained in the proposed technique.
The proposed technique generates the prediction errors in the block-by-block manner in the same way as BPRHS [18] and the comparative method [32]. Therefore, these three schemes have the error-propagation-free property. The grayscale image integrity protection scheme based on BPRHS had been proposed [25] for image tamper detection. Since the hiding capacity of the proposed technique is higher than that of BPRHS, we will exploit the possibility to extend the proposed technique for grayscale image tamper detection in the future.

Author Contributions

Conceptualization, Y.C.H.; methodology, Y.C.H. and Y.S.L.; Software, Y.C.H.; validation, Y.H.L., C.C.L. and C.M.W.; formal analysis, C.C.L. and C.M.W.; investigation, C.C.L. and C.M.W.; resources, Y.C.H. and Y.S.L.; data curation, Y.C.H. and Y.S.L.; writing—original draft preparation, Y.C.H.; writing—review and editing, Y.C.H. and Y.S.L.; visualization, C.C.L. and C.M.W.; supervision, Y.C.H.; project administration, Y.C.H.; funding acquisition, Y.C.H. and Y.S.L.

Funding

This research received no external funding.

Acknowledgments

This paper was supported in part by the Ministry of Science and Technology, TAIWAN, under Grant No. MOST 106-2410-H-126-006-MY2 and 108-2410-H-020-MY2. The authors would also like to thank the reviewers for their valuable suggestions on improving the quality of this paper to this professional international journal.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Bender, W.; Gruhl, D.; Morimoto, N.; Lu, A. Techniques for data hiding. IBM Syst. J. 1996, 35, 313–336. [Google Scholar] [CrossRef]
  2. Petitcolas, F.A.P.; Anderson, R.J.; Kuhn, M.G. Information hiding—A survey. Proc. IEEE 1999, 87, 1062–1078. [Google Scholar] [CrossRef]
  3. Chang, C.C.; Lin, M.H.; Hu, Y.C. A fast and secure image hiding scheme based on LSB substitution. Int. J. Pattern Recognit. 2002, 16, 399–416. [Google Scholar] [CrossRef]
  4. Hu, Y.C. High capacity image hiding scheme based on vector quantization. Pattern Recognit. 2006, 39, 1715–1724. [Google Scholar] [CrossRef]
  5. Hussain, M.; Wahab, A.W.A.; Javed, N.; Jung, K.H. Hybrid data hiding scheme using right-most digit replacement and adaptive least significant bit for digital images. Symmetry 2016, 8, 41. [Google Scholar] [CrossRef]
  6. Xie, X.Z.; Lin, C.C.; Chang, C.C. Data hiding based on a two-layer turtle shell matrix. Symmetry 2018, 10, 47. [Google Scholar] [CrossRef]
  7. Leng, H.S. Generalized scheme based on Octagon-shaped shell for data hiding in steganographic applications. Symmetry 2019, 11, 760. [Google Scholar] [CrossRef]
  8. Hussain, M.; Wahab, A.W.A.; Ho, A.T.S.; Javed, N.; Jung, K.H. A data hiding scheme using parity-bit pixel value differencing and improved rightmost digital replacement. Signal Process. Image Commun. 2017, 50, 44–57. [Google Scholar] [CrossRef]
  9. Cheddad, A.; Condell, J.; Curran, K.; Kevitt, P.M. Digital image steganography: Survey and analysis of current methods. Signal Process. 2010, 90, 727–752. [Google Scholar] [CrossRef] [Green Version]
  10. Chang, C.C.; Yu, Y.H.; Hu, Y.C. Hiding secret data in images via predictive coding. Pattern Recognit. 2005, 38, 691–705. [Google Scholar]
  11. Chang, C.C.; Wu, W.C.; Hu, Y.C. Lossless recovery of a VQ index table with embedded secret data. J. Visual Commun. Image Represent. 2007, 18, 207–216. [Google Scholar] [CrossRef]
  12. Hong, W. Efficient data hiding based on block truncation coding using pixel pair matching technique. Symmetry 2018, 10, 36. [Google Scholar] [CrossRef]
  13. Tian, J. Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 2003, 13, 890–896. [Google Scholar] [CrossRef] [Green Version]
  14. Hsu, F.H.; Wu, M.H.; Wang, S.J.; Huang, C.L. Reversibility of image with balanced fidelity and capacity upon pixels differencing expansion. J. Supercomput. 2013, 66, 812–828. [Google Scholar] [CrossRef]
  15. Boato, G.; Azzoni, M.; Carli, M.; Battisti, F.; Egiazarian, K.O. Difference expansion and prediction for high bit-rate reversible data hiding. J. Electron. Imaging 2012, 21, 033013. [Google Scholar] [CrossRef]
  16. Arham, A.; Nugroho, H.A.; Adji, T.B. Multiple layer data hiding scheme based on difference expansion of quad. Signal Process. 2017, 137, 52–62. [Google Scholar] [CrossRef]
  17. Ni, Z.; Shi, Y.Q.; Ansari, N.; Su, W. Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 2006, 16, 354–362. [Google Scholar]
  18. Tsai, P.Y.; Hu, Y.C.; Yeh, H.L. Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process. 2009, 89, 1129–1143. [Google Scholar] [CrossRef]
  19. Hong, W.; Chen, T.S.; Chang, Y.P.; Shiu, C.W. A high capacity reversible data hiding scheme using orthogonal projection and prediction error modification. Signal Process. 2010, 10, 1016–1028. [Google Scholar] [CrossRef]
  20. Wu, H.C.; Wang, H.C.; Tsai, C.S.; Wang, C.M. Reversible image steganographic scheme via predictive coding. Displays 2010, 31, 35–43. [Google Scholar] [CrossRef]
  21. Chen, X.; Sun, X.; Sun, H.; Xiang, L.; Yang, B. Histogram shifting based reversible data hiding method using directed-prediction scheme. Multimed. Tools Appl. 2015, 74, 5747–5765. [Google Scholar] [CrossRef]
  22. Liu, L.; Chang, C.C.; Wang, A. Reversible data hiding scheme based on histogram shifting of n-bit planes. Multimed. Tools Appl. 2016, 75, 11311–11326. [Google Scholar] [CrossRef]
  23. He, W.; Xiong, G.; Zhou, K.; Cai, J. Reversible data hiding based on multilevel histogram modification and pixel value grouping. J. Vis. Commun. Image Represent. 2016, 40, 459–469. [Google Scholar] [CrossRef]
  24. Rad, R.M.; Wong, K.; Guo, J.M. Reversible data hiding by adaptive group modification on histogram of prediction errors. Signal Process. 2016, 125, 315–328. [Google Scholar] [CrossRef]
  25. Lo, C.C.; Hu, Y.C. A novel reversible image authentication scheme for digital images. Signal Process. 2014, 98, 174–185. [Google Scholar] [CrossRef]
  26. Li, M.; Li, Y. Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding. Signal Process. 2017, 130, 190–196. [Google Scholar] [CrossRef]
  27. Chen, K.; Chang, C.C. Real-time error-free reversible data hiding in encrypted images using (7,4) Hamming code and most significant bit prediction. Symmetry 2019, 11, 51. [Google Scholar] [CrossRef]
  28. Liu, L.; Wang, L.; Shi, Y.Q.; Chang, C.C. Separable data-hiding scheme for encrypted image to protect privacy of user in cloud. Symmetry 2019, 11, 82. [Google Scholar] [CrossRef]
  29. Lo, C.C.; Hu, Y.C.; Chen, W.L.; Wu, C.M. Reversible data hiding scheme for BTC-compressed images based on histogram shifting. Int. J. Secur. Appl. 2014, 8, 301–314. [Google Scholar] [CrossRef]
  30. Chang, I.C.; Hu, Y.C.; Chen, W.L.; Lo, C.C. High capacity reversible data hiding scheme based on residual histogram shifting for block truncation coding. Signal Process. 2015, 108, 376–388. [Google Scholar] [CrossRef]
  31. Lin, C.C.; Chang, C.C.; Wang, Z.M. Reversible data hiding scheme using adaptive block truncation coding based on an edge-based quantization approach. Symmetry 2019, 11, 765. [Google Scholar] [CrossRef]
  32. Hu, Y.C.; Tsai, P.Y.; Yeh, J.S.; Chen, W.L. Residual histogram shifting technique based on cascading prediction for reversible data hiding. In Proceedings of the 10th International Conference on Future Information Technology, Hanoi, Vietnam, 18–20 May 2015. [Google Scholar]
Figure 1. An example of prediction error generation using block-based prediction residual histogram shifting (BPRHS) for 4 × 4 block: (a) positional diagram of pixels in 4 × 4 block, (b) the test image block and (c) the prediction errors.
Figure 1. An example of prediction error generation using block-based prediction residual histogram shifting (BPRHS) for 4 × 4 block: (a) positional diagram of pixels in 4 × 4 block, (b) the test image block and (c) the prediction errors.
Symmetry 11 01146 g001
Figure 2. The corresponding residual histogram of prediction errors in Figure 1c.
Figure 2. The corresponding residual histogram of prediction errors in Figure 1c.
Symmetry 11 01146 g002
Figure 3. The first prediction model of the proposed technique when p10 is taken as the reference pixel for 4 × 4 image blocks: (a) prediction errors of directly adjacent pixels; (b) Prediction errors of the others; (c) the prediction errors.
Figure 3. The first prediction model of the proposed technique when p10 is taken as the reference pixel for 4 × 4 image blocks: (a) prediction errors of directly adjacent pixels; (b) Prediction errors of the others; (c) the prediction errors.
Symmetry 11 01146 g003
Figure 4. Prediction errors of the test image block as shown in Figure 1a by using the proposed two-round prediction mechanism.
Figure 4. Prediction errors of the test image block as shown in Figure 1a by using the proposed two-round prediction mechanism.
Symmetry 11 01146 g004
Figure 5. The corresponding residual histogram of prediction errors in Figure 4.
Figure 5. The corresponding residual histogram of prediction errors in Figure 4.
Symmetry 11 01146 g005
Figure 6. The second prediction model of the proposed technique when p10 is taken as the reference pixel for 4 × 4 image block: (a) prediction errors of directly adjacent pixels; (b) prediction errors of the others; (c) Prediction errors.
Figure 6. The second prediction model of the proposed technique when p10 is taken as the reference pixel for 4 × 4 image block: (a) prediction errors of directly adjacent pixels; (b) prediction errors of the others; (c) Prediction errors.
Symmetry 11 01146 g006
Figure 7. The first prediction model of the proposed technique for 5×5 image block: (a) positional diagram of pixels, (b) prediction errors of directly adjacent pixels, (c) prediction errors of the others and (d) Prediction errors.
Figure 7. The first prediction model of the proposed technique for 5×5 image block: (a) positional diagram of pixels, (b) prediction errors of directly adjacent pixels, (c) prediction errors of the others and (d) Prediction errors.
Symmetry 11 01146 g007
Figure 8. The second prediction model of the proposed technique for 5 × 5 image block: (a) prediction errors of directly adjacent pixels; (b) prediction errors of the others; (c) prediction errors.
Figure 8. The second prediction model of the proposed technique for 5 × 5 image block: (a) prediction errors of directly adjacent pixels; (b) prediction errors of the others; (c) prediction errors.
Symmetry 11 01146 g008
Figure 9. Grayscale test images of 512 × 512 pixels: (a) Airplane; (b) Boat; (c) Girl; (d) Goldhill; (e) Lenna; (f) Pepper; (g) Tiffany; (h) Zelda.
Figure 9. Grayscale test images of 512 × 512 pixels: (a) Airplane; (b) Boat; (c) Girl; (d) Goldhill; (e) Lenna; (f) Pepper; (g) Tiffany; (h) Zelda.
Symmetry 11 01146 g009
Table 1. Results of the hiding capacity of the proposed technique with the first prediction model when the block size is set to 4 × 4.
Table 1. Results of the hiding capacity of the proposed technique with the first prediction model when the block size is set to 4 × 4.
Imagesrefp = p5refp = p6refp = p9refp = p10
pno = 1pno = 2pno = 1pno = 2pno = 1pno = 2pno = 1pno = 2
Airplane417,43714,42415,82714,75416,63714,89413,28714,06
Boat249,73481,52250,43482,17250,91481,55249,38481,16
Girl269,04514,76266,62512,04267,43519,98262,55514,21
Goldhill199,25385,54199,81385,72198,73383,58199,05385,01
Lenna288,48537,21287,58539,25286,58537,72287,85537,76
Pepper173,41330,12172,53330,29173,99330,53171,37329,50
Tiffany321,22574,53316,34574,41319,57576,30320,74574,19
Zelda277,21539,25278,16540,61277,52535,75276,90540,22
Average274,47.1509,66.9273,41.1509,90.5273,92.0510,03.8272,64.0509,51.4
Table 2. Results of the hiding capacity of the proposed technique with the second prediction model when the block size is set to 4 × 4.
Table 2. Results of the hiding capacity of the proposed technique with the second prediction model when the block size is set to 4 × 4.
Imagesrefp = p5refp = p6refp = p9refp = p10
pno = 1pno = 2pno = 1pno = 2pno = 1pno = 2pno = 1pno = 2
Airplane417,43715,60415,82715,14416,63716,63413,28711,34
Boat249,73482,20250,43483,66250,91482,87249,38480,78
Girl269,04523,45266,62511,94267,43514,62262,55517,88
Goldhill199,25387,51199,81383,80198,73382,63199,05386,47
Lenna288,48534,93287,58538,42286,58536,23287,85535,72
Pepper173,41331,18172,53331,21173,99332,83171,37330,76
Tiffany321,22576,98316,34573,83319,57574,90320,74577,04
Zelda277,21540,57278,16537,45277,52535,91276,90540,48
Average274,47.1511,55.3273,41.1509,43.1273,92.0509,57.8272,64.0510,05.9
Table 3. Results of the image quality of the proposed technique with the first prediction model when the block size is set to 4 × 4.
Table 3. Results of the image quality of the proposed technique with the first prediction model when the block size is set to 4 × 4.
Imagesrefp = p5refp = p6refp = p9refp = p10
pno = 1pno = 2pno = 1pno = 2pno = 1pno = 2pno = 1pno = 2
Airplane49.54248.08849.49748.06949.54748.08349.54048.063
Boat49.28248.00249.30847.97649.31448.00549.27547.975
Girl49.05047.27648.94947.28349.46647.32549.40247.373
Goldhill49.03147.32549.05947.33049.01847.30349.01347.315
Lenna49.21947.49749.28347.57749.29147.55749.23847.551
Pepper49.11947.66149.05047.65249.15947.66249.05847.645
Tiffany49.47248.21349.47248.17349.47348.19549.46648.199
Zelda49.12647.43549.11647.45849.11947.45349.14847.462
Average49.23047.68749.21747.69049.29847.69849.26847.698
Table 4. Results of the image quality of the proposed technique with the second prediction model when the block size is set to 4 × 4.
Table 4. Results of the image quality of the proposed technique with the second prediction model when the block size is set to 4 × 4.
Imagesrefp = p5refp = p6refp = p9refp = p10
pno = 1pno = 2pno = 1pno = 2pno = 1pno = 2pno = 1pno = 2
Airplane51.929 48.25151.92248.24451.96148.21051.97048.167
Boat51.98548.10452.00948.06052.01748.10351.95448.072
Girl51.71947.34751.52647.37851.38347.31051.58947.323
Goldhill51.56647.36251.53947.36051.54047.33351.56347.339
Lenna51.57347.55551.59047.64651.58547.59851.60547.632
Pepper51.80647.70551.82347.69251.86147.70651.81147.689
Tiffany52.04348.33752.02948.24352.01048.29052.07048.290
Zelda51.52147.51451.52447.52651.52747.52751.51347.525
Average51.76847.77251.74547.76951.73647.76051.75947.755
Table 5. Results of the hiding capacity and embedded image quality of the proposed technique with the first prediction model when the block size is set to 5 × 5.
Table 5. Results of the hiding capacity and embedded image quality of the proposed technique with the first prediction model when the block size is set to 5 × 5.
ImagesHiding CapacityEmbedded Image Quality
pno = 1pno = 2pno = 3pno = 1pno = 2pno = 3
Airplane414,39718,03718,0548.61547.37147.371
Boat253,92491,23491,2648.45047.44647.445
Girl266,34506,63506,7848.14946.56546.565
Goldhill202,69387,74387,7948.11546.62646.625
Lenna286,74539,39539,4648.23946.79046.790
Pepper269,43512,75512,7948.29442.65042.650
Tiffany320,34580,28580,4448.55547.59847.598
Zelda282,22546,78546,8548.16646.68946.689
Average287,00.9535,35.4535,42.848.32346.46746.467
Table 6. Results of the hiding capacity and embedded image quality of the proposed technique with the second prediction model when the block size is set to 5 × 5.
Table 6. Results of the hiding capacity and embedded image quality of the proposed technique with the second prediction model when the block size is set to 5 × 5.
ImagesHiding CapacityEmbedded Image Quality
pno = 1pno = 2pno = 3pno = 1pno = 2pno = 3
Airplane414,39718,81718,8551.78447.52947.528
Boat253,92489,62489,6551.93047.54247.542
Girl266,34506,27506,4251.21246.65346.653
Goldhill202,69388,02388,0551.36246.68046.680
Lenna286,74540,19540,2651.37146.91146.911
Pepper269,43511,46511,5051.51842.38742.387
Tiffany320,34580,83580,8651.96447.70047.700
Zelda282,22547,71547,8051.26046.78446.783
Average287,00.9535,36.4535,42.451.55046.52346.523
Table 7. Average results of the hiding capacity and embedded image quality of the comparative techniques.
Table 7. Average results of the hiding capacity and embedded image quality of the comparative techniques.
ImagesHiding CapacityEmbedded Image Quality
pno = 1pno = 2pno = 1pno = 2
HS431,7.000837,7.12553.09448.264
BPRHS-4 × 4245,27.625464,55.37551.93949.320
BPRHS-5 × 5230,76.375436,70.25051.76449.148
CM284,66.625531,80.12549.18447.240
PT1-4 × 4274,47.125509,66.87549.23047.687
PT1-5 × 5287,00.875535,35.37548.32346.467
PT2-4 × 4274,47.125511,55.25051.76847.772
PT2-5 × 5287,00.875535,36.37551.55046.523

Share and Cite

MDPI and ACS Style

Hu, Y.-C.; Lin, Y.-H.; Lo, C.-C.; Wu, C.-M. Implementation of Block-Based Hierarchical Prediction for Developing an Error-Propagation-Free Reversible Data Hiding Scheme. Symmetry 2019, 11, 1146. https://doi.org/10.3390/sym11091146

AMA Style

Hu Y-C, Lin Y-H, Lo C-C, Wu C-M. Implementation of Block-Based Hierarchical Prediction for Developing an Error-Propagation-Free Reversible Data Hiding Scheme. Symmetry. 2019; 11(9):1146. https://doi.org/10.3390/sym11091146

Chicago/Turabian Style

Hu, Yu-Chen, Yu-Hsiu Lin, Chun-Chi Lo, and Chang-Ming Wu. 2019. "Implementation of Block-Based Hierarchical Prediction for Developing an Error-Propagation-Free Reversible Data Hiding Scheme" Symmetry 11, no. 9: 1146. https://doi.org/10.3390/sym11091146

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop