You are currently viewing a new version of our website. To view the old version click .
Electronics
  • Article
  • Open Access

3 March 2023

Secure Reversible Data Hiding Using Block-Wise Histogram Shifting

,
,
and
1
Department of Business Administration Techniques, Technical college management, Middle Technical University, Bab Al Moatham, Baghdad 10047, Iraq
2
Department of CSE, School of Engineering and Technology, GIET University, Gunupur 765022, Odisha, India
3
Department of Computer Science and Engineering, NMAM Institute of Technology, NITTE (Deemed to be University), Nitte 574110, Karnataka, India
4
Amrita School of Computing, Amrita Vishwa Vidyapeetham, Amaravati 522502, Andhra Pradesh, India
This article belongs to the Section Artificial Intelligence

Abstract

Reversible data hiding (RDH) techniques recover the original cover image after data extraction. Thus, they have gained popularity in e-healthcare, law forensics, and military applications. However, histogram shifting using a reversible data embedding technique suffers from low embedding capacity and high variability. This work proposes a technique in which the distribution obtained from the cover image determines the pixels that attain a peak or zero distribution. Afterward, adjacent histogram bins of the peak point are shifted, and data embedding is performed using the least significant bit (LSB) technique in the peak pixels. Furthermore, the robustness and embedding capacity are improved using the proposed dynamic block-wise reversible embedding strategy. Besides, the secret data are encrypted before embedding to further strengthen security. The experimental evaluation suggests that the proposed work attains superior stego images with a peak signal-to-noise ratio (PSNR) of more than 58 dB for 0.9 bits per pixel (BPP). Additionally, the results of the two-sample t-test and the Kolmogorov–Smirnov test reveal that the proposed work is resistant to attacks.

1. Introduction

Reversible data hiding (RDH) techniques can restore the original cover media and the embedded information on the receiver end [1]. The least significant bit (LSB) strategy is a highly preferred data hiding technique [2]. This technique replaces the LSBs of the cover image pixels with data bits [3]. The stego image is processed to extract the secret data bits on the receiver side without recovering the original cover image [4]. Interestingly, there are several application areas, such as e-healthcare, law forensics, and military imagery, where original secret data and cover image recovery are crucial on the receiving end [5]. In [6], cover image pixels are processed to recover the cover image after secret data extraction. Various reversible data embedding techniques have been proposed, including difference expansion and its variants [7,8,9,10], histogram shifting [11,12,13,14,15], prediction-based technique [16], and vector quantized-based technique [17]. Of these, the histogram-based shifting technique has gained popularity due to its simplicity and ability to offer higher security. However, a significant setback for the histogram-based shifting technique is that secret data are embedded without taking care of the contrast of the cover image, which provides distortion in a large number of pixels and, thus, negatively impacts the visual quality. To overcome this challenge, a dynamic histogram shifting RDH technique is proposed based on the contrast of the cover image. In the peak value of the cover image histogram, left-side or right-side data embedding is done. Furthermore, to improve the embedding capacity, the image is divided into fixed blocks, and for each block, the histogram bins’ peak values are determined for embedding capacity [18]. Researchers have suggested various data scrambling techniques in the literature [19,20,21,22] using the XOR function and different keystreams.
The major contribution of this paper is to improve the security, embedding capacity, and visual quality using a dynamic block-wise reversible (DBWR) data embedding technique. Initially, the pixel histogram is drawn from the cover image. Next, the histogram processing determines the 256-bit key, after which the cover image is divided into four blocks. Each block’s histogram bin is plotted, and the contrast of each block is determined. The contrast defines the frame’s histogram properties, which are low contrast, high contrast, and normal contrast. Based on the predetermined contrast properties, it then identifies in which direction the peak value of the histogram should be adjusted. Thus, the minimum variability comes after the adjustment process. The secret data are embedded using a 1-bit LSB technique after all the needed conditions have been adaptively selected. The experimental results show that the proposed technique has improved the visual quality and embedding capacity considerably compared to existing techniques, namely Zong’s technique [17] and Rajkumar’s and Vasuki’s technique [16].
The rest of the paper is organized as follows: Section 2 explains the histogram shifting embedding technique and highlights its issues. Next, Section 3 illustrates the proposed data embedding and extraction process. The experimental results and comparative analysis are presented in Section 4. Finally, Section 5 concludes the work with promising future directions.

3. Proposed Technique

The proposed RDH-based histogram-shifting technique provides adequate embedding capacity, lesser variability, and enhanced security. The work is diagrammatically represented in Figure 2. Initially, the cover image is partitioned into blocks. After that, each block’s pixels are processed, and a histogram is plotted. Next, the peak and zero bins on the histogram are determined. Based on the peak and zero-bin values, the adjacent bins of the peak value are shifted toward a zero value. The secret data are obtained and split into 1-bit form. The peak bin’s LSB bit matches the secret data bit. If the bits are matched, then the counter value is incremented, or else no change in the counter value is made. The whole process is repeated for all peak bins. The counter value is compared with the threshold value (T). The threshold value is determined using Equation (1).
T = M a x i m u m P e a k   B i n 2
Figure 2. Flowchart for the proposed data embedding technique.
If the counter value is greater than the threshold value, then data are hidden in the flipped form or in the original form. The whole process is repeated for all blocks. At last, the blocks are concatenated to reconstruct the stego image. The peak value, zero-bin value, and secret data hidden in the flipped or original form need to communicate with the receiver to recover the original secret data. The pseudocode for the proposed algorithm is shown below (Algorithm 1). On the receiver side, the stego image is divided into blocks. After that, the peak, zero-bin, and secret data order information are considered for each block. Next, data are extracted from the peak and its adjacent pixel value. Finally, after retrieving the secret data, the histogram bins are shifted toward the peak value to recover the original cover image. The proposed technique to improve visual quality is discussed in this section. Cover image pixel variability is reduced by selecting the appropriate zero-pixel value on the histogram to achieve this goal. In the proposed technique, the terminologies are used as follows: the image is I, the contrast value is C, the peak is P, the right zero is RZ, the left zero is LZ, and the histogram bins are h(n). The total number of bins in the histogram is L, histogram shifting is Hs, and data hiding is DH. The histogram distribution tells the image contrast and is calculated using Equation (2).
C = 1 L n = 1 L h n n n = 1 L h n
Algorithm 1: Pseudocode for the proposed algorithm
Input: Cover image block, secret data, counter
Output: Stego image block
Step 1: Read the image and split it into blocks.
Step 2: Plot the histogram (h) for the blocks.
Step 3: Determine the peak and zero-bin from the histogram.
[peak_index] = max(h) and [zero_index] = min(h)
Step 4: Adjusts the adjacent pixel values
    For i = 1:row
       For j = 1:col
          If(CI(i,j) > P)
             CI(i,j) = CI(i,j) + 1
          Else
             CI(i,j) = CI(i,j)
          Endif
    End
End
Step 5: Read the secret data and split it into 1-bit each.
Step 6: If peak bin LSB bit match with the secret, then k = 1, counter = 0;
For i = 1:row
       For j = 1:col
          If(peak_index(i,j)  ≠ secret data(1,k))
             counter = counter + 1
             k = k + 1
          Endif
    End
End
Step 7: If counter > threshold
       For i = 1:length(secret data)
          If(secret data(1,i) = 0)
             secret data(1,i) = 1
          else
             secret data(1,i) = 1
          Endif
    End
   Else
   secret data = secret data
     End
Step 8: Data embedding is done.
Practically, the contrast range varies from 0 to 1. Then, the image histogram shifting is classified into low contrast, normal contrast, or high contrast based on Equation (2), Figure 3a–c show an example of histogram shifting in possible cases. If the image is in in low contrast, the histogram bins are distributed on the left side (near 0) of the histogram. For high contrast, the distribution is on the right side of the histogram (near 255). The adjustment of histogram bins using the proposed technique is represented in Equation (3).
  H S = C RZ < C LZ   under   contrast   h n adjustment   towards   right C RZ = C LZ   C LZ < C RZ   normal   contrast   over   contrast h n a d j u s t m e n t   e i t h e r   l e f t   o r   r i g h t   d e p e n d i n g   o n   d i s t r i b u t i o n   h n adjustment   towards   left  
Figure 3. (a) low contrast, (b) normal contrast, and (c) high contrast.
In low-contrast images, the histogram is shifted toward the right side. For high-contrast images, it is shifted toward the left side. Moreover, if the contrast is normal, the histogram bins are distributed in the middle of the histogram. Next, the histogram bins’ intensity distribution on the left side and right side of the peak value is determined, and the side where the pixel distribution is less than the zero points is selected, as shown in Figure 4.
Figure 4. Flow chart for determining contrast and adjustment.
During the embedding phase, the peak value or its adjacent value is selected because the peak value and its adjacent value contain the same approximate distribution. Furthermore, the histogram bins are adjusted toward zero points for secret data embedding, improving the image’s visual quality. On the other side, if the zero-point histogram bin is unavailable, then the histogram bin that has a minimum number of pixels is selected, and zero points are created for secret data embedding.
The block diagram of data embedding and extraction is shown in Figure 5a,b. In the proposed technique, the cover image is taken, and the histogram is plotted. Afterward, the histogram is processed to generate a 256-bit random key from Equation (4). The complete flow for the key generation is shown in Figure 6. Here, hi denotes the histogram bins.
R a n d o m _ k e y i = h i 2   0   <   I   <   255
Figure 5. (a) Block diagram for data embedding, and (b) block diagram for data extraction.
Figure 6. Flow diagram of key generation.
Next, the secret message and the 256-bit key are given as input to the encryption module to generate the ciphertext. Then, the image is grouped into blocks, and for each block, a histogram is found to determine the contrast. The contrast of each block tells whether the block is either low contrast, high contrast, or normally distributed. Furthermore, the peak value of the histogram is determined in each block. Next, based on the contrast, the histogram bins are adjusted on either the left or right side, and the peak value or its adjacent value is selected for data embedding. Next, the cipher data bits are embedded in each block’s peak value or its adjacent value pixels to generate the stego image.
Finally, the peak value or adjacent value and the zero-point value details are communicated. Initially, the stego image is retrieved and divided into blocks on the receiver side. Next, based on the information available for the peak value or adjacent value and the zero-point value, the bits are extracted from the peak value or its adjacent value pixels. Afterward, the bins are readjusted to recover the cover image. After that, the cover image histogram is plotted using Equation (4) to generate a 256-bit random key. Then, the secret key and secret data bits are given as input to the decryption algorithm to generate the original secret message. The proposed technique can be summarized in the following steps:
Step 1: At the beginning, the image is taken, and its histogram is drawn, as shown in Figure 7a,b.
Figure 7. (a) cover image, and (b) histogram bins of the cover image.
Step 2: The 256-bit key is generated using Equation (4) based on the histogram bin value, and secret data are encrypted using a 256-bit key.
Step 3: The cover image is partitioned into 4 blocks, and a histogram is drawn for each, as shown in Figure 8a,b.
Figure 8. (a) Four blocks of the cover image, and (b) the histogram of each block.
Step 4: The contrast of each block is determined using Equation (1), and its contrast value is shown in Figure 9.
Figure 9. Contrast of respective blocks.
Step 5: Based on the contrast, the direction of histogram shifting is determined using Equation (3) and displayed in Figure 10. Figure 10 shows dynamic data embedding on either side of the peak. The sub-steps are defined below.
Figure 10. The direction of histogram adjustment in a block.
Step 5.1: The peak is determined from the histogram using Equation (5):
P = max h i   0 i 255
Step 5.2: Histogram shifting is required on the left or right side of the peak value based on the exposure value using Equation (2).
Step 5.3: The peak or its adjacent pixel is selected using Equation (6):
P Peak = P Peak   HRS If   P Peak % 2 = 0 P Peak + 1 HRS If   P Peak % 2 = 1 P Peak 1 HLS If   P Peak % 2 = 0 P Peak   HLS If   P Peak % 2 = 1
Step 5.4: The adjacent pixels are adjusted by 1. Equation (7) is used for a right shift, and Equation (8) is used for a left shift:
A d j a c e n t   p i x e l s i + 1 = A d j a c e n t   p i x e l s i       A d j a c e n t   p i x e l s i < z e r o v a l u e
A d j a c e n t   p i x e l s i 1 = A d j a c e n t   p i x e l s i       A d j a c e n t   p i x e l s i < z e r o v a l u e
Step 5.5: The data bits are embedded in the LSB of the peak using Equation (9):
P P e a k = P P e a k h                           h = 254
P P e a k = P P e a k + D H                            
Step 6: The peak value or its adjacent value is selected based on the information on whether the peak value is even or odd, as shown in Table 1. Thus, its adjustment pixel 49 is selected for data embedding.
Table 1. Gray level and its maximum peak value.
Step 7: The histogram shifting is completed.
Step 8: Afterward, the secret bit is embedded in the peak or its adjacent value, generating stego image blocks. Finally, the blocks are concatenated to produce a stego image, as shown in Figure 11a,b.
Figure 11. (a) Four blocks of the stego image, and (b) the stego image.

4. Experimental Results and Discussion

This work considers standard grayscale images, as shown in Table 2. The secret data are randomly generated. This work is executed using MATLAB 2017a. The system configuration for carrying out these operations is an Intel core-i5 with 8 GB of RAM. The cover image and the respective stego images that are produced are shown in Table 2. The performance matrices with respect to the quantitative analysis are discussed in subsequent sections.
Table 2. The cover image and the respective stego images.

4.1. Embedding Capacity

This measure estimates the total number of bits inserted in the cover image. It is based on Equation (10). Here, bpp refers to the bits per pixel.
b p p = N u m b e r   o f   B i t s   E m b e d d e d N u m b e r   o f   P i x e l s   i n   t h e   C o v e r   I m a g e
In this work, the image is divided into four blocks, and each block’s peak value is used for the data hiding. Thus, the total capacity in terms of BPP is presented in Table 3. The experimental results show that different images achieve different capacities due to different peak values. The outcome signals that House achieves the highest embedding capacity compared to the other images.
Table 3. Capacity for the standard dataset images.

4.2. Peak Signal-to-Noise Ratio (PSNR)

The PSNR computes the uniqueness between two images in decibels (dB). The PSNR is computed using Equation (11):
P S N R = 10 log 10 M a x 2 M S E
M S E C I , S I = 1 A B i = 1 A j = 1 B C i , j S i , j 2
Here, MSE is the mean square error. C I   and   S I denote the cover and stego images, respectively. In Table 4, for the different cover images, the PSNR value is presented. It is found that the Female image has achieved the highest PSNR compared to the other images due to less distance in the peak signal value and zero value available in the histogram for the image.
Table 4. PSNR for the standard dataset images.

4.3. Structural Similarity Index Measure (SSIM) and Quality Index (Q)

The SSIM finds the measure of similarity between images [32]. Its value varies between −1 and 1. Table 5 shows the SSIM between the cover and stego images. It is estimated based on Equation (13). Here, A m n ,   A m e a n , B m n , and B m e a n are the means and variances for the images.
S S I M = m = 1 J n = 1 K A m n A m e a n B m n B m e a n m = 1 J n = 1 K ( A m n A m e a n 2 ) n = 1 k n = 1 k B m n B m e a n 2
Table 5. SSIM for the standard dataset images.
The quality index (Q) is one of the metrics that finds the similarity between the cover and stego images. The highest value for Q is one. This can be achieved when two images are entirely equal. Q can be obtained using Equation (14):
Q = 4   σ xy   a ¯   b ¯   σ x 2   +   σ y 2       [ ( a ¯ ) 2   + ( b ¯ ) 2   ]  
Here, σ x and σ y are the standard deviations, and a ¯ and b ¯ denote the means for the individual images.

4.4. Statistical Tests

In this section, statistical tests are applied to the cover and stego histograms to check the normal distribution using various tests, including (1) the two-sample t--test and (2) the Kolmogorov–Smirnov test. The two-sample t-test is applied to check whether the average difference between the two groups is significant or not. In steganography, the cover and stego image histograms are two groups in which the average difference is determined. There are two types of hypotheses: null and alternative. The null hypothesis suggests that the data in the vectors x and y come from an independent random sample from a normal distribution with equal mean and unknown variance.
Conversely, in the alternative hypothesis, x and y come from a sample with unequal mean. Similarly, the two-sample Kolmogorov–Smirnov test is applied to check whether the data in the cover and stego histograms in the vectors x and y come from the same continuous distribution. Based on the distribution, it is defined as the null hypothesis or the alternative hypothesis. Table 6 calculates the two-sample t-test and the Kolmogorov–Smirnov test for the different images. The results show that our proposed technique passes the statistical tests.
Table 6. Two-sample t-test and Kolmogorov–Smirnov test.

4.5. Analysis of PSNR, BPP, and Q

In this section, the outcomes of our work and the already-present histogram-shifting algorithms with respect to the PSNR, embedding capacity, and Q are computed. The experimental results show that the improved histogram-shifting reversible data embedding algorithm achieves better PSNR, acceptable embedding capacity, and superior Q value compared to existing techniques. Table 7 presents the results for PSNR, BPP, SSIM, and Q for the proposed technique and the techniques proposed by Zong [17] and Rajkumar and Vasuki [16]. The average PSNR is 58.70 dB with a 0.932-bit rate, which is much better than the existing techniques. Furthermore, the obtained SSIM and Q values are also encouraging as the average of the respective values lies between the range of 0.99 and 1.
Table 7. Results for PSNR, bpp, and Q.

5. Conclusions and Future Research Direction

In this paper, a dynamic block-based, histogram shifting-based RDH technique is suggested to raise the embedding capacity and quality of stego images. Furthermore, embedding is performed based on a contrast strategy. To strengthen robustness, the secret data are scrambled using randomly generated keys, and a 256-bit key is generated based on the cover image’s histogram. In addition, error correction codes are added to the encrypted data before embedding. The experimental results show that the proposed approach achieves better PSNR and embedding capacity than existing histogram-shifting algorithms. The devised work could be applicable in various real-life cases, mainly in medical applications, telemedicine, and secure and confidential communication systems. In the future, the primary focus will be to identify the optimal changes to achieve minimum stego quality reduction. Additionally, using neural network-based pixel selection approaches can be beneficial in selecting the optimal pixels for embedding the secret information.

Author Contributions

Conceptualization, S.K.K. and A.K.S.; Data curation, R.K.R.; Investigation, M.S. and A.K.S.; Methodology, S.K.K. and A.K.S.; Writing—review and editing, M.S. All authors have read and agreed to the published version of the manuscript.

Funding

This work did not receive any funding directly or indirectly from any source or agency.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Megías, D.; Mazurczyk, W.; Kuribayashi, M. Data hiding and its applications: Digital watermarking and steganography. Appl. Sci. 2021, 11, 10928. [Google Scholar] [CrossRef]
  2. Takaoğlu, M.; Özyavaş, A.; Ajlouni, N.; Alshahrani, A.; Alkasasbeh, B. A novel and robust hybrid blockchain and steganography Scheme. Appl. Sci. 2021, 11, 10698. [Google Scholar] [CrossRef]
  3. Zakaria, A.A.; Hussain, M.; Wahab, A.W.A.; Idris, M.Y.I.; Abdullah, N.A.; Jung, K.-H. High-capacity image steganography with minimum modified bits based on data mapping and LSB substitution. Appl. Sci. 2018, 8, 2199. [Google Scholar] [CrossRef]
  4. Darwis, D.; Junaidi, A.; Shofiana, D.A. A new digital image steganography based on center embedded pixel positioning. Cybern. Inf. Technol. 2021, 21, 89–104. [Google Scholar] [CrossRef]
  5. Navadiya, C.; Sanghani, N. Comparative survey of digital image steganography spatial domain techniques. In Data Science and Intelligent Applications: Proceedings of ICDSIA 2020; Springer: Singapore, 2021; pp. 491–497. [Google Scholar]
  6. Hussain, M.; Wahab, A.W.A.; Bin Idris, Y.I.; Ho, A.T.; Jung, K.-H. Image steganography in spatial domain: A survey. Signal Process. Image Commun. 2018, 65, 46–66. [Google Scholar] [CrossRef]
  7. Puteaux, P.; Puech, W. A recursive reversible data hiding in encrypted images technique with a very high payload. IEEE Trans. Multimed. 2020, 23, 636–650. [Google Scholar] [CrossRef]
  8. Kumar, R.; Chand, S.; Singh, S. An Improved histogram-shifting-imitated reversible data hiding based on HVS characteristics. Multimed. Tools Appl. 2018, 77, 13445–13457. [Google Scholar] [CrossRef]
  9. Kulkarni, R.; Dinesh, V.S.; Bhagya, R.; Bharathi, R. Difference expansion based reversible data hiding scheme for watermarking. Int. J. Res. Eng. Sci. Manag. 2021, 4, 193–195. [Google Scholar]
  10. Chen, H.; Wang, J.; Zhou, Y.; Chang, T.; Shi, K.; Yuan, J. Improving the security of reversible data hiding using multiple histogram modification. Math. Probl. Eng. 2022, 2022, 7192697. [Google Scholar] [CrossRef]
  11. Puteaux, P.; Puech, W. An efficient MSB prediction-based technique for high-capacity reversible data hiding in encrypted images. IEEE Trans. Inf. Forensics Secur. 2018, 13, 1670–1681. [Google Scholar] [CrossRef]
  12. Kumar, S.; Gupta, A.; Walia, G.S. Reversible data hiding: A contemporary survey of state-of-the-art, opportunities and challenges. Appl. Intell. 2021, 52, 7373–7406. [Google Scholar] [CrossRef]
  13. Faragallah, O.S.; Elaskily, M.A.; Alenezi, A.F.; El-Sayed, H.S.; Kelash, H.M. Quadruple histogram shifting-based reversible information hiding approach for digital images. Multimed. Tools Appl. 2021, 80, 26297–26317. [Google Scholar] [CrossRef]
  14. Sahu, A.K.; Swain, G. A novel n-rightmost bit replacement image steganography technique. 3D Res. 2019, 10, 2. [Google Scholar] [CrossRef]
  15. He, W.; Xiong, G.; Wang, Y. Reversible Data hiding based on adaptive multiple histograms modification. IEEE Trans. Inf. Forensics Secur. 2021, 16, 3000–3012. [Google Scholar] [CrossRef]
  16. Rajkumar, R.; Vasuki, A. Reversible and robust image watermarking based on histogram shifting. Clust. Comput. 2018, 22, 12313–12323. [Google Scholar] [CrossRef]
  17. Zong, T.; Xiang, Y.; Natgunanathan, I.; Guo, S.; Zhou, W.; Beliakov, G. Robust histogram shape-based technique for image watermarking. IEEE Trans. Circuits Syst. Video Technol. 2014, 25, 717–729. [Google Scholar] [CrossRef]
  18. Chang, I.-C.; Hu, Y.-C.; Chen, W.-L.; Lo, C.-C. High capacity reversible data hiding scheme based on residual histogram shifting for block truncation coding. Signal Process. 2015, 108, 376–388. [Google Scholar] [CrossRef]
  19. Lin, J.; Chang, C.-C.; Horng, J.-H. Asymmetric data hiding for compressed images with high payload and reversibility. Symmetry 2021, 13, 2355. [Google Scholar] [CrossRef]
  20. Yadav, P.; Mishra, N.; Sharma, S. A secure video steganography with encryption based on LSB technique. In Proceedings of the 2013 IEEE International Conference on Computational Intelligence and Computing Research, Enathi, India, 26–28 December 2013. [Google Scholar]
  21. Saini, J.K.; Verma, H.K. A hybrid approach for image security by combining encryption and steganography. In Proceedings of the 2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013), Shimla, India, 9–11 December 2013. [Google Scholar]
  22. Singh, S.K.; Gopi, V.P.; Palanisamy, P. Image security using DES and RNS with reversible watermarking. In Proceedings of the 2014 International Conference on Electronics and Communication Systems (ICECS), Coimbatore, India, 13–14 February 2014. [Google Scholar]
  23. Patel, K.; Utareja, S.; Gupta, H. Information hiding using least significant bit steganography and blowfish algorithm. Int. J. Comput. Appl. 2013, 63, 24–28. [Google Scholar] [CrossRef]
  24. Jain, M.; Lenka, S.K.; Vasistha, S.K. Adaptive circular queue image steganography with RSA cryptosystem. Perspect. Sci. 2016, 8, 417–420. [Google Scholar] [CrossRef]
  25. Rai, A.K.; Kumar, N.; Kumar, R.; Om, H.; Chand, S.; Jung, K.H. Intra-Block Correlation Based Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling. Symmetry 2021, 13, 1072. [Google Scholar] [CrossRef]
  26. Xu, S.; Horng, J.-H.; Chang, C.-C. Reversible data hiding scheme based on VQ prediction and adaptive parametric binary tree labeling for encrypted images. IEEE Access 2021, 9, 55191–55204. [Google Scholar] [CrossRef]
  27. Aziz, F.; Ahmad, T.; Malik, A.H.; Uddin, M.I.; Ahmad, S.; Sharaf, M. Reversible data hiding techniques with high message embedding capacity in images. PLoS ONE 2020, 15, e0231602. [Google Scholar] [CrossRef] [PubMed]
  28. Sahu, A.K. A logistic map based blind and fragile watermarking for tamper detection and localization in images. J. Ambient. Intell. Humaniz. Comput. 2021, 13, 3869–3881. [Google Scholar] [CrossRef]
  29. Volume 2: Aerials. Available online: http://sipi.usc.edu/database/database.php?volume=aerials&image=5#top (accessed on 19 August 2022).
  30. Ayyappan, S.; Lakshmi, C. A review on reversible data hiding techniques. Int. J. Appl. Eng. Res. 2018, 13, 2857–2864. [Google Scholar]
  31. Sahu, A.K.; Hassaballah, M.; Rao, R.S.; Suresh, G. Logistic-map based fragile image watermarking scheme for tamper detection and localization. Multimed. Tools Appl. 2022, 1–32. [Google Scholar] [CrossRef]
  32. Wang, J.; Mao, N.; Chen, X.; Ni, J.; Wang, C.; Shi, Y. Multiple histograms based reversible data hiding by using FCM clustering. Signal Process. 2019, 159, 193–203. [Google Scholar] [CrossRef]
  33. Sahu, A.K.; Sahu, M.; Patro, P.; Sahu, G.; Nayak, S.R. Dual image-based reversible fragile watermarking scheme for tamper detection and localization. Pattern Anal. Appl. 2022, 1–20. [Google Scholar] [CrossRef]
  34. Zhou, K.; Ding, Y.; Bi, W. High-capacity PVO-based reversible data hiding scheme using changeable step size. Multimed. Tools Appl. 2020, 80, 1123–1141. [Google Scholar] [CrossRef]
  35. Pan, Z.; Gao, E. Reversible data hiding based on novel embedding structure PVO and adaptive block-merging strategy. Multimed. Tools Appl. 2019, 78, 26047–26071. [Google Scholar] [CrossRef]
  36. Cox, I.J.; Miller, M.L.; Bloom, J.A.; Fridrich, J.; Kalker, T. Digital Watermarking and Steganography; Morgan Kaufmann: Burlington, MA, USA, 2007. [Google Scholar]
  37. Fallahpour, M.; Megias, D.; Ghanbari, M. Reversible and high-capacity data hiding in medical images. IET Image Process. 2011, 5, 190–197. [Google Scholar] [CrossRef]
  38. Wang, X.; Li, L.; Chang, C.-C.; Huang, Y. Multi-level reversible data hiding for crypto-imagery via a block-wise substitution-transposition cipher. J. Inf. Secur. Appl. 2021, 64, 103067. [Google Scholar] [CrossRef]
  39. Manikandan, V.; Masilamani, V. Histogram shifting-based blind watermarking scheme for copyright protection in 5G. Comput. Electr. Eng. 2018, 72, 614–630. [Google Scholar] [CrossRef]
  40. Sahu, A.K.; Swain, G.; Sahu, M.; Hemalatha, J. Multi-directional block based PVD and modulus function image steganography to avoid FOBP and IEP. J. Inf. Secur. Appl. 2021, 58, 102808. [Google Scholar] [CrossRef]
  41. Kumar, R.; Jung, K.-H. Enhanced pairwise IPVO-based reversible data hiding scheme using rhombus context. Inf. Sci. 2020, 536, 101–119. [Google Scholar] [CrossRef]
  42. He, W.; Xiong, G.; Weng, S.; Cai, Z.; Wang, Y. Reversible data hiding using multi-pass pixel-value-ordering and pairwise prediction-error expansion. Inf. Sci. 2018, 467, 784–799. [Google Scholar] [CrossRef]
  43. Sahu, A.K.; Gutub, A. Improving grayscale steganography to protect personal information disclosure within hotel services. Multimedia Tools Appl. 2022, 81, 30663–30683. [Google Scholar] [CrossRef]
  44. Chang, J.; Ding, F.; Li, X.; Zhu, G. Hybrid prediction-based pixel-value-ordering technique for reversible data hiding. J. Vis. Commun. Image Represent. 2021, 77, 103097. [Google Scholar] [CrossRef]
  45. Sahu, A.K.; Umachandran, K.; Biradar, V.D.; Comfort, O.; Hema, V.S.V.; Odimegwu, F.; Saifullah, M.A. A Study on Content Tampering in Multimedia Watermarking. SN Comput. Sci. 2023, 4, 222. [Google Scholar] [CrossRef]
  46. Darehnaei, Z.G.; Shokouhifar, M.; Yazdanjouei, H.; Fatemi, S.M.J.R. SI-EDTL: Swarm intelligence ensemble deep transfer learning for multiple vehicle detection in UAV images. Concurr. Comput. Pract. Exp. 2021, 34, e6726. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.