REVERSIBLE DATA HIDING BASED ON PIXEL-BASED PIXEL VALUE ORDERING PREDICTOR AND EMD

Main Article Content

Nam Hoang Tram
Thanh Van Huynh
C Thanh Vo
Khanh Ngoc Van Duong
Son Thai Nguyen

Abstract

In this paper, we improved the reversible data hiding method of Qu’s et al. The original image is divided into overlapped equalsize blocks (2x2). Each of block is used to predict a pixel. Then a histogram is constructed from the different value between the original pixel and  the prediction pixel. In order to increase the
capacity, the proposed method combination with EMD table to change the histogram. According to Qu’s method, each pixel satisfies only one bit of information is embedded. In our method, by using the EMD table, each pair of eligible pixels can embed three bits of information. Experimental results show that the proposed  method increases 1.5 times the hidden performance while the image quality changes negligibly.

Downloads

Download data is not yet available.

Article Details

How to Cite
Tram, N., Huynh, T., Vo, C., Duong, K. and Nguyen, S. (2019) “REVERSIBLE DATA HIDING BASED ON PIXEL-BASED PIXEL VALUE ORDERING PREDICTOR AND EMD”, The Scientific Journal of Tra Vinh University, 1(1), pp. 14-19. doi: 10.35382/18594816.1.1.2019.82.
Section
Proceeding

References

[1] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Transactions on Circuits and
Systems for Video Technology, vol. 13, no. 8, pp.
890–896, Aug. 2003.
[2] A. M. Alattar, “Reversible watermark using the difference expansion of a generalized integer transform,” IEEE Transactions on Image Processing, vol.
13, no. 8, pp. 1147–1156, Aug. 2004.
[3] L. Kamstra and H. J. A. M. Heijmans, “Reversible
data embedding into images using wavelet techniques
and sorting,” IEEE Transactions on Image Processing, vol. 14, no. 12, pp. 2082–2090, Dec. 2005.
[4] H. J. Kim, V. Sachnev, Y. Q. Shi, J. Nam, and H.
Choo, “A Novel Difference Expansion Transform for
Reversible Data Embedding,” IEEE Transactions on
Information Forensics and Security, vol. 3, no. 3, pp.
456–465, Sep. 2008.
[5] Zhicheng Ni, Yun-Qing Shi, N. Ansari, and Wei
Su, “Reversible data hiding,” IEEE Transactions on
Circuits and Systems for Video Technology, vol. 16,
no. 3, pp. 354–362, Mar. 2006.
[6] S. Lee, Y. Suh, and Y. Ho, “Reversiblee Image Authentication Based on Watermarking,” in 2006 IEEE
International Conference on Multimedia and Expo,
Toronto, ON, Canada, 2006, pp. 1321–1324.
[7] X. Gao, L. An, X. Li, and D. Tao, “Reversibility
improved lossless data hiding,” Signal Processing,
vol. 89, no. 10, pp. 2053–2065, Oct. 2009.
[8] X. Gao, L. An, Y. Yuan, D. Tao, and X. Li, “Lossless Data Embedding Using Generalized Statistical
Quantity Histogram,” IEEE Transactions on Circuits
and Systems for Video Technology, vol. 21, no. 8, pp.
1061–1070, Aug. 2011.
[9] G. Feng and L. Fan, “Reversible data hiding of high
payload using local edge sensing prediction,” Journal
of Systems and Software, vol. 85, no. 2, pp. 392–399,
Feb. 2012.
[10] L. An, X. Gao, X. Li, D. Tao, C. Deng, and J. Li,
“Robust Reversible Watermarking via Clustering and
Enhanced Pixel-Wise Masking,” IEEE Transactions
on Image Processing, vol. 21, no. 8, pp. 3598–3611,
Aug. 2012.
[11] D. M. Thodi and J. J. Rodriguez, “Expansion Embedding Techniques for Reversible Watermarking,” IEEE
Transactions on Image Processing, vol. 16, no. 3, pp.
721–730, Mar. 2007.
[12] Yongjian Hu, Heung-Kyu Lee, and Jianwei Li, “DEBased Reversible Data Hiding With Improved Overflow Location Map,” IEEE Transactions on Circuits
and Systems for Video Technology, vol. 19, no. 2, pp.
250–260, Feb. 2009.
[13] V. Sachnev, Hyoung Joong Kim, Jeho Nam, S.
Suresh, and Yun Qing Shi, “Reversible Watermarking Algorithm Using Sorting and Prediction,” IEEE
Transactions on Circuits and Systems for Video Technology, vol. 19, no. 7, pp. 989–999, Jul. 2009.
[14] Wei-Liang Tai, Chia-Ming Yeh, and Chin-Chen
Chang, “Reversible Data Hiding Based on Histogram
Modification of Pixel Differences,” IEEE Transactions on Circuits and Systems for Video Technology,
vol. 19, no. 6, pp. 906–910, Jun. 2009.
[15] W. Hong, T.-S. Chen, and C.-W. Shiu, “Reversible
data hiding for high quality images using modification of prediction errors,” Journal of Systems and
Software, vol. 82, no. 11, pp. 1833–1842, Nov. 2009.
[16] W. Hong, T.-S. Chen, Y.-P. Chang, and C.-W. Shiu,
“A high capacity reversible data hiding scheme using orthogonal projection and prediction error modification,” Signal Processing, vol. 90, no. 11, pp.
2911–2922, Nov. 2010.
[17] Xiaolong Li, Bin Yang, and Tieyong Zeng, “Efficient Reversible Watermarking Based on Adaptive Prediction-Error Expansion and Pixel Selection,”
IEEE Transactions on Image Processing, vol. 20, no.
12, pp. 3524–3533, Dec. 2011.
[18] X. Li, J. Li, B. Li, and B. Yang, “High-fidelity
reversible data hiding scheme based on pixel-valueordering and prediction-error expansion,” Signal
Processing, vol. 93, no. 1, pp. 198–205, Jan. 2013.
[19] F. Peng, X. Li, and B. Yang, “Improved PVO-based
reversible data hiding,” Digital Signal Processing,
vol. 25, pp. 255–265, Feb. 2014.
[20] X. Qu and H. J. Kim, “Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding,”
Signal Processing, vol. 111, pp. 249–260, Jun. 2015.
[21] X. Zhang and S. Wang, “Efficient Steganographic
Embedding by Exploiting Modification Direction,”
IEEE Communications Letters, vol. 10, no. 11, pp.
781–783, Nov. 2006.
[22] C.-F. Lee, Y.-R. Wang, and C.-C. Chang, “A Steganographic Method with High Embedding Capacity by
Improving Exploiting Modification Direction,” in
Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), Kaohsiung, Taiwan, 2007, pp.
497–500.

Most read articles by the same author(s)