Pixel-Value-Ordering based Reversible Information Hiding Scheme with Self-Adaptive Threshold Strategy
<p>Li et al.’s PVO Difference Histogram.</p> "> Figure 2
<p>Li et al.’s PVO Embedding Example.</p> "> Figure 3
<p>The PVO Difference Histogram of Peng et al.</p> "> Figure 4
<p>The PVO Embedding Example of Peng et al.</p> "> Figure 5
<p>Wang’s Computation of PVO Block Complexity.</p> "> Figure 6
<p>PVO embedded example of Wang et al.</p> "> Figure 7
<p>The line graph of <math display="inline"><semantics> <mrow> <mi>H</mi> <mo stretchy="false">(</mo> <msup> <mi>σ</mi> <mn>2</mn> </msup> <mo stretchy="false">)</mo> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>C</mi> <mi>P</mi> </mrow> </semantics></math> for the example image.</p> "> Figure 8
<p>Embedding example of the proposed scheme.</p> "> Figure 9
<p>Extraction and recovery example of the proposed scheme.</p> "> Figure 10
<p>Six test images sized 512 × 512.</p> "> Figure 11
<p>The variance curves for the test images.</p> "> Figure 12
<p>The comparison between different <math display="inline"><semantics> <mi>Q</mi> </semantics></math> values.</p> "> Figure 12 Cont.
<p>The comparison between different <math display="inline"><semantics> <mi>Q</mi> </semantics></math> values.</p> "> Figure 12 Cont.
<p>The comparison between different <math display="inline"><semantics> <mi>Q</mi> </semantics></math> values.</p> "> Figure 12 Cont.
<p>The comparison between different <math display="inline"><semantics> <mi>Q</mi> </semantics></math> values.</p> "> Figure 13
<p>The experimental results of different hiding capacity.</p> "> Figure 13 Cont.
<p>The experimental results of different hiding capacity.</p> "> Figure 13 Cont.
<p>The experimental results of different hiding capacity.</p> "> Figure 14
<p>Some test images from Uncompressed Color Image Database (UCID).</p> "> Figure 15
<p>Peak signal to noise ratio (PSNR) comparison using UCID images.</p> "> Figure 16
<p>Hiding capacity comparison using UCID images.</p> ">
Abstract
:1. Introduction
2. Related Works
- Case 1: When NL > T1, it indicates that the block is a high complexity area. There will not be any message embedding and displacement.
- Case 2: When T2 < NL T1, it indicates that the block is a common complex area. Since the block is not smooth, the errors generated in the four blocks will mostly fall in the Outer Region; their displacements cannot increase the hiding capacity and may even lead to image distortion; Hence the 4 × 4 block is sorted directly and Peng’s method is used to generate error values, and confidential information embedding and pixels displacement are performed.
- Case 3: When NL T2, it indicates that the block is a smooth block, and embedding and displacement may be performed on each of the four sub-blocks individually; hence they are sorted in 2 × 2 blocks. Peng’s method is used for embedding.
3. Proposed Scheme
3.1. Improvement of Peng et al.’s Hiding Scheme
3.2. Adaptive Threshold Generation Strategy
3.3. Proposed Data Embedding Procedures
- Divide the host image into several non-overlaping blocks sized . Let be the block and total number of blocks is .
- Sort each block in ascending order to get .
- Generate a location map to record whether the block has an overflow (or underflow) problem or not. For each block, if = 0 or = 255, then = 1 which means the block may have the problem. On the contrary, if = 0, the location map is then compressed by the data algorithm (such as arithmetic coding or JBIG2 and so on). The compressed results are then concatenated with the secret message to embed it into the host image.
- Compute the variance of each block by using Formulas (9)–(11).
- Calculate the predefined threshold using the adaptive threshold generation strategy which was introduced in Section 3.2.
- Detect whether the block is embeddable or not.
- If = 1, then the block is non-embeddable.
- If the variance and = 0, then the block is non-embeddable.
- If the variance and = 0, then the block is embeddable.
- Conceal the secret message into the embeddable block.
- Compute , where:
- Calculate the stego pixel by:
- Compute , where:
- Calculate the stego pixel by:
- Continue the steps until all secret messages are embedded.
3.4. Extraction and Recovering Procedures
- Divide the stego image into several non-overlap blocks sized . Let be the block and total number of blocks is .
- Sort each block in ascending order to get .
- Extract the location map from the stego image by using Wang et al.’s scheme. For each block, if = 1 which means the block is non-embeddable.
- Compute the variance of each block by using Formulas (9)–(11).
- Detect whether the block is embeddable or not.
- If = 1, then the block is non-embeddable.
- If the variance and = 0, then the block is non-embeddable.
- If the variance and = 0, then the block is embeddable.
For the non-embeddable block, the proposed scheme will skip the block. The original block is the same as the stego block. - Extract the secret message from the embeddable block.
- Compute , where
- Obtain the secret message
- Calculate the original pixel by
- Compute , where
- Obtain the secret message
- Calculate the original pixel by
- Continue the steps until all the secret messages are extracted and the pixels are recovered.
4. Experimental Results
4.1. Adaptive Threshold Detection
4.2. Quantified Number Evaluation
4.3. Comparison Results
5. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Ou, B.; Li, X.; Zhao, Y.; Ni, R. Reversible Data Hiding Based on PDE Predictor. J. Syst. Softw. 2013, 86, 2700–2709. [Google Scholar] [CrossRef]
- Ni, Z.; Shi, Y.Q.; Ansari, N.; Su, W. Reversible Data Hiding. IEEE Trans. Circuits Syst. Video Technol. 2006, 16, 354–362. [Google Scholar]
- Meikap, S.; Jana, B. Directional PVO for Reversible Data Hiding Scheme with Image Interpolation. Multimedia Tools Appl. 2018, 77, 31281–31311. [Google Scholar] [CrossRef]
- Tian, J. Reversible Data Embedding Using a Difference Expansion. IEEE Trans. Circuits Syst. Video Technol. 2003, 13, 890–896. [Google Scholar] [CrossRef]
- Lu, T.C.; Tseng, C.Y.; Wu, J.H. Asymmetric-Histogram Based Reversible Information Hiding Scheme Using Edge Sensitivity Detection. J. Syst. Softw. 2016, 116, 2–21. [Google Scholar] [CrossRef]
- Thodi, D.M.; Rodriguez, J.J. Expansion Embedding Techniques for Reversible Watermarking. IEEE Trans. Image Process. 2007, 16, 721–730. [Google Scholar] [CrossRef]
- Luo, T.; Jiang, G.; Yu, M.; Gao, W. Novel Prediction Error Based Reversible Data Hiding Method Using Histogram Shifting. Int. J. Comput. Theory Eng. 2015, 7, 332–336. [Google Scholar] [CrossRef]
- Hong, W.; Chen, T.S.; Shiu, C.W. Reversible Data Hiding for High Quality Images Using Modification of Prediction Error. J. Syst. Softw. 2009, 82, 1833–1842. [Google Scholar] [CrossRef]
- Fallahpour, M. Reversible Image Data Hiding Based on Gradient Adjusted Prediction. IEICE Electron. Express 2008, 5, 870–876. [Google Scholar] [CrossRef]
- Coltuc, D. Improved Embedding for Prediction-Based Reversible Watermarking. IEEE Trans. Inf. Forensics Secur. 2011, 6, 873–882. [Google Scholar] [CrossRef]
- Li, X.; Zhang, W.; Gui, X.; Yang, B. A Novel Reversible Data Hiding Scheme Based on Two-Dimensional Difference-Histogram Modification. IEEE Trans. Inf. Forensics Secur. 2013, 8, 1091–1100. [Google Scholar]
- Wu, X.; Memon, N. Context-Based, Adaptive, Lossless Image Coding. IEEE Trans. Commun. 1997, 45, 437–444. [Google Scholar] [CrossRef]
- Lu, T.C.; Tseng, C.Y.; Deng, K.M. Reversible Data Hiding Using Local Edge Sensing Prediction Methods and Adaptive Thresholds. Signal Process. 2014, 104, 152–166. [Google Scholar] [CrossRef]
- Feng, G.; Fan, L. Reversible Data Hiding of High Payload Using Local Edge Sensing Prediction. J. Syst. Softw. 2012, 85, 392–399. [Google Scholar] [CrossRef]
- Lukac, R.; Martin, K.; Plataniotis, K.N. Digital Camera Zooming Based on Unified CFA Image Processing Steps. IEEE Trans. Consum. Electron. 2004, 50, 15–24. [Google Scholar] [CrossRef]
- Bo, O.; Li, X.L.; Wang, J.W. Improved PVO-based Reversible Data Hiding: A new Implementation based on Multiple Histograms Modification. J. Vis. Commun. Image Represent. 2016, 38, 328–339. [Google Scholar]
- He, W.G.; Cai, J.; Zhou, K.; Xiong, G.Q. Efficient PVO-based Reversible Data Hiding Using Multistage Blocking and Prediction Accuracy Matrix. J. Vis. Commun. Image Represent. 2017, 46, 58–69. [Google Scholar] [CrossRef]
- Li, X.; Li, J.; Li, B.; Yang, B. High-Fidelity Reversible Data Hiding Scheme Based on Pixel-Value-Ordering and Prediction-Error Expansion. Signal Process. 2013, 93, 198–205. [Google Scholar] [CrossRef]
- Peng, F.; Li, X.; Yang, B. Improved PVO-Based Reversible Data Hiding. Digit. Signal Process. 2014, 25, 255–265. [Google Scholar] [CrossRef]
- Wang, X.; Ding, J.; Pei, Q. A Novel Reversible Image Data Hiding Scheme Based on Pixel Value Ordering and Dynamic Pixel Block Partition. Inf. Sci. 2015, 310, 16–35. [Google Scholar] [CrossRef]
- Weinberger, M.J.; Seroussi, G.; Sapiro, G. The LOCO-I Lossless Image Compression Algorithm: Principles and Standardization into JPEG-LS. IEEE Trans. Image Process. 2000, 9, 1309–1324. [Google Scholar] [CrossRef] [PubMed]
0 | 3 | 4 | 8 | 11 | 12 | 16 | 19 | 20 | … | |
5195 | 14,148 | 8770 | 6001 | 7238 | 1780 | 1269 | 1986 | 2109 | … | |
7.93% | 21.59% | 13.38% | 9.16% | 11.04% | 2.72% | 1.94% | 3.03% | 3.22% | … | |
7.93% | 29.52% | 42.90% | 52.05% | 63.10% | 65.81% | 67.75% | 70.78% | 74.00% | … |
Image | 70% | 80% | ||
---|---|---|---|---|
T | CP(%) | T | CP(%) | |
Airplane | 13 | 71.73 | 36 | 80.14 |
Lake | 57 | 70.98 | 105 | 80.52 |
Lena | 20 | 71.33 | 36 | 80.46 |
Mandrill | 265 | 70.39 | 453 | 80.91 |
Pepper | 21 | 70.11 | 36 | 80.72 |
Tiffany | 13 | 72.41 | 28 | 80.33 |
Image | Method | Hiding Rate | T | PSNR | bpp | Capacity | Increased |
---|---|---|---|---|---|---|---|
Airplane | Peng | 100% | ∞ | 52.11 | 0.20 | 52,546 | 1.79 |
Peng_VAR | 70% | 13 | 53.90 | 0.18 | 48,132 | - | |
Peng_VAR | 80% | 36 | 53.19 | 0.19 | 50,223 | 0.71 | |
Wang | 100% | (241,117) | 52.21 | 0.20 | 52,007 | 1.69 | |
Lake | Peng | 100% | ∞ | 51.60 | 0.10 | 26,365 | 1.64 |
Peng_VAR | 70% | 57 | 53.24 | 0.09 | 24,076 | - | |
Peng_VAR | 80% | 105 | 52.65 | 0.10 | 25,038 | 0.59 | |
Wang | 100% | (220,51) | 52.28 | 0.10 | 25,265 | 0.96 | |
Lena | Peng | 100% | ∞ | 51.84 | 0.15 | 38,938 | 1.47 |
Peng_VAR | 70% | 20 | 53.31 | 0.13 | 35,033 | - | |
Peng_VAR | 80% | 36 | 52.83 | 0.14 | 36,903 | 0.48 | |
Wang | 100% | (155,49) | 52.20 | 0.15 | 38,279 | 1.11 | |
Mandrill | Peng | 100% | ∞ | 51.37 | 0.05 | 13,656 | 1.6 |
Peng_VAR | 70% | 265 | 52.97 | 0.05 | 12,129 | - | |
Peng_VAR | 80% | 453 | 52.37 | 0.05 | 12,665 | 0.6 | |
Wang | 100% | (212,80) | 51.97 | 0.05 | 13,020 | 1 | |
Pepper | Peng | 100% | ∞ | 51.73 | 0.13 | 33,173 | 1.57 |
Peng_VAR | 70% | 21 | 53.30 | 0.11 | 28,754 | - | |
Peng_VAR | 80% | 36 | 52.66 | 0.12 | 31,022 | 0.64 | |
Wang | 100% | (149,19) | 52.68 | 0.11 | 30,008 | 0.62 | |
Tiffany | Peng | 100% | ∞ | 51.94 | 0.17 | 44,047 | 1.7 |
Peng_VAR | 70% | 13 | 53.64 | 0.15 | 38,923 | - | |
Peng_VAR | 80% | 28 | 52.97 | 0.16 | 41,348 | 0.67 | |
Wang | 100% | (220,51) | 52.18 | 0.16 | 42,289 | 1.46 |
Image | Method | PSNR | bpp | Capacity | overflow |
---|---|---|---|---|---|
1063 | Peng_VAR (80%) | 52.24 | 0.02 | 4519 | 0 |
Peng_VAR (70%) | 52.82 | 0.02 | 4242 | 0 | |
Peng | 51.25 | 0.03 | 4943 | 0 | |
Wang | 56.32 | 0.02 | 4039 | 453 | |
1030 | Peng_VAR (80%) | 52.27 | 0.03 | 5687 | 0 |
Peng_VAR (70%) | 52.86 | 0.03 | 5393 | 0 | |
Peng | 51.28 | 0.03 | 6164 | 0 | |
Wang | 56.33 | 0.02 | 4340 | 281 | |
1050 | Peng_VAR (80%) | 52.29 | 0.03 | 6436 | 0 |
Peng_VAR (70%) | 52.89 | 0.03 | 6231 | 0 | |
Peng | 51.29 | 0.03 | 6748 | 0 | |
Wang | 55.09 | 0.03 | 6054 | 1969 | |
84 | Peng_VAR(80%) | 52.33 | 0.04 | 8306 | 0 |
Peng_VAR(70%) | 52.94 | 0.04 | 7925 | 0 | |
Peng | 51.34 | 0.05 | 8900 | 0 | |
Wang | 53.32 | 0.03 | 6813 | 283 |
File Name | Method | Percentage | PSNR | bpp | Capacity | Overflow | Increased |
---|---|---|---|---|---|---|---|
1.jpg | Peng_VAR | 80 | 53.12 | 0.17 | 32,728 | 0 | 0.62 |
Peng_VAR | 70 | 53.74 | 0.16 | 31,854 | 0 | - | |
Peng | 70 | 51.95 | 0.17 | 33,628 | 0 | 1.79 | |
Wang | 52.79 | 0.15 | 29,172 | 897 | 0.95 | ||
2.jpg | Peng_VAR | 80 | 53.23 | 0.18 | 35,910 | 0 | 0.69 |
Peng_VAR | 70 | 53.92 | 0.18 | 35,041 | 0 | - | |
Peng | 70 | 52.04 | 0.19 | 36,956 | 0 | 1.88 | |
Wang | 52.86 | 0.18 | 36,062 | 68 | 1.06 | ||
3.jpg | Peng_VAR | 80 | 52.63 | 0.09 | 18,119 | 0 | 0.63 |
Peng_VAR | 70 | 53.26 | 0.09 | 17,491 | 0 | - | |
Peng | 70 | 51.58 | 0.10 | 18,807 | 0 | 1.68 | |
Wang | 53.18 | 0.09 | 16,845 | 61 | 0.08 |
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Lu, T.-C.; Tseng, C.-Y.; Huang, S.-W.; Nhan Vo., T. Pixel-Value-Ordering based Reversible Information Hiding Scheme with Self-Adaptive Threshold Strategy. Symmetry 2018, 10, 764. https://doi.org/10.3390/sym10120764
Lu T-C, Tseng C-Y, Huang S-W, Nhan Vo. T. Pixel-Value-Ordering based Reversible Information Hiding Scheme with Self-Adaptive Threshold Strategy. Symmetry. 2018; 10(12):764. https://doi.org/10.3390/sym10120764
Chicago/Turabian StyleLu, Tzu-Chuen, Chun-Ya Tseng, Shu-Wen Huang, and Thanh Nhan Vo. 2018. "Pixel-Value-Ordering based Reversible Information Hiding Scheme with Self-Adaptive Threshold Strategy" Symmetry 10, no. 12: 764. https://doi.org/10.3390/sym10120764
APA StyleLu, T. -C., Tseng, C. -Y., Huang, S. -W., & Nhan Vo., T. (2018). Pixel-Value-Ordering based Reversible Information Hiding Scheme with Self-Adaptive Threshold Strategy. Symmetry, 10(12), 764. https://doi.org/10.3390/sym10120764