270 likes | 497 Views
Adjustable prediction-based reversible data hiding. Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp. 941–953, 2012. Outline. Introduction Proposed method Experimental results Conclusions. Tseng and Hsieh’s scheme. Introduction.
E N D
Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp. 941–953, 2012
Outline • Introduction • Proposed method • Experimental results • Conclusions
Tseng and Hsieh’s scheme Introduction Proposed scheme Prediction value (P) = (100 + 100)/2 = 100
The proposed scheme- Embedding phase 0 1 Cover image Threshold (T) = 0 Extra data: 0
T = 0 255 d = 0 The proposed scheme- Embedding phase 101 102 -255 Modified image T = 0 s = 1 C = 101 P = 101 d = 101 – 101 = 0 P’ = P + 2*d + s = 101 + 2 * 0 + 1 = 102
T = 0 -255 255 d = 29 The proposed scheme- Embedding phase 106 105 Modified image T = 0 s = 1 C = 105 P = 76 d = 105 – 76 = 29 P’ = C + T + 1 = 105 + 0 + 1 = 106
T = 0 -255 255 d = 26 The proposed scheme- Embedding phase 102 103 Modified image T = 0 s = 1 C = 102 P = 76 d = 102 – 76 = 26 P’ = C + T + 1 = 102 + 0 + 1 = 103
T = 0 -255 255 d = –103 The proposed scheme- Embedding phase 1 0 Modified image T = 0 s = 1 C = 1 P = 104 d = 1 – 104 = –103 P’ = 1 – T – 1 = 1 – 0 – 1 = 0
T’ = 1 -255 255 0 The proposed scheme- Extraction and recovery phase d = –104 0 1 Stego image T’ = 2*T + 1 = 0 + 1 =1 P’ = 0 P = 104 d = 0 – 104 = –104 C = 0 + T + 1 = 0 + 0 + 1 = 1
T’ = 1 -255 255 0 The proposed scheme- Extraction and recovery phase d = 27 103 102 Stego image T’ = 1 P’ = 103 P = 76 d = 103 – 76= 27 C = 103 – T – 1 = 103 – 0 – 1 = 102
T’ = 1 -255 255 0 The proposed scheme- Extraction and recovery phase 106 105 d = 30 Stego image T’ = 1 P’ = 106 P = 76 d = 106 – 76= 30 C = 106 – T – 1 = 106 – 0 – 1 = 105
T’ = 1 -255 255 0 The proposed scheme- Extraction and recovery phase 102 101 Stego image d = 1 T’ = 1 P’ = 102 P = 101 d = 102 – 101 = 1 s = d mod 2 = 1 C = P – d / 2 = 101 – 1 / 2 = 101
The proposed scheme- Extraction and recovery phase 1 0 Modified image Extra data: 0 T’ = 1
48.6 dB and 0.2 bpp 37.15 dB and 0.99 bpp 47.9 dB and 0.06 bpp 30.78 dB and 0.71 bpp Experimental results
Conclusions • This study proposes a reversible data hiding scheme that exploits the adjustment of prediction-errors to increase the embedding rate and reduce image distortion. • The proposed scheme exploits a threshold to achieve the flexibility in perceptual image quality and embedding.
Appendix [16] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, pp. 890-896, 2003. [17] Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, pp. 354-362, 2006. [19] W. L. Tai, C. M. Yeh, and C. C. Chang, “Reversible data hiding based on histogram modification of pixel differences,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 19, pp. 906-910, 2009.
Appendix [20] D. M. Thodi and J. J. Rodriguez, “Expansion embedding techniques for reversible watermarking,” IEEE Transactions on Image Processing, Vol. 16, pp. 721-730, 2007. [21] P. Tsai, Y. C. Hu, and H. L. Yeh, “Reversible image hiding scheme using predictive coding and histogram shifting,” Signal Processing, Vol. 89, pp. 1129-1143, 2009. [22] K. S. Kim, M. J. Lee, H. Y. Lee, and H. K. Lee, “Reversible data hiding exploiting spatial correlation between sub-sampled images,” Pattern Recognition, Vol. 42, pp. 3083-3096, 2009.
Appendix [25] Y. C. Liu, H. C. Wu, and S. S. Yu, “Adaptive DE-based reversible steganographic technique using bilinear interpolation and simplified location map,” Multimedia Tools and Applications, Vol. 52, pp. 263-276, 2011. [26] C. F. Lee and H. L. Chen, “Reversible data hiding based on histogram modification of prediction-error,” Imaging Science Journal, Vol. 59, pp. 278-292, 2011. [27] H. W. Tseng and C. P. Hsieh, “Prediction-based reversible data hiding,” Information Sciences, Vol. 179, pp. 2460-2460, 2009.