Advertisement

DWT-based reversible information hiding scheme using prediction-error-expansion in multimedia images

  • Chi-Yao WengEmail author
Article
  • 18 Downloads
Part of the following topical collections:
  1. Special Issue on IoT System Technologies based on Quality of Experience

Abstract

This article presents an information hiding scheme for Multimedia IoT (MIoT) applications, with particular concern the services where the context of cover multimedia is fully reserved. The proposed scheme develops an algorithm of prediction-error-expansion (PEE) based on prediction-generating-method (PGM) on discrete wavelet transform (DWT) domain. The PGM is applied to generate the predicted image, and then, conceal the message into predicted error that is computed between the original image and predicted image. More and more prediction errors are closed, the higher performance will have. The evidence is verified in the experimental results. The experimental results display the performance in terms of embedding capacity, auxiliary information, and image quality. From the experiments show that our proposed scheme clearly has superior performances than previous works.

Keywords

Multimedia IoT applications Prediction error expansion Discrete wavelet transform Prediction-generating-method 

Notes

Acknowledgments

The author would like to thank Mr. Terry Wong for providing the part of the experimental simulations. This work was supported in part by the Ministry of Science and Technology (MOST), Taiwan, under Grant. 106-2221-E-015-001 and 107-2221-E-153-001.

References

  1. 1.
    Floris A, Atzori L (2057) Managing the quality of experience in the multimedia internet of things: a layer-based approach. Sensors 16(2016):1–21Google Scholar
  2. 2.
    Wu Q, Ding G, Xu Y, Feng S, Du Z, Wang J, Long K (2016) Cognitive of internet of things: a new paradigm beyond connection. IEEE Internet of Thing Journal 1:129–143CrossRefGoogle Scholar
  3. 3.
    Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding, IEEE trans. Circuits and Systems for Video Technology 16:354–362CrossRefGoogle Scholar
  4. 4.
    Tsai P, Hu YC, Yeh HL (2009) Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process 89:1129–1143CrossRefGoogle Scholar
  5. 5.
    Luo L, Chen Z, Chen M, Zeng X (2010) Reversible image watermarking using interpolation technique. IEEE Trans Information Forensic and Security 5:187–193CrossRefGoogle Scholar
  6. 6.
    Wu HT, Huang J (2012) Reversible image watermarking on prediction errors by efficient histogram modification. Signal Process 92:3000–3009CrossRefGoogle Scholar
  7. 7.
    Tsai YY, Tsai DS, Liu CL (2013) Reversible data hiding scheme based on neighboring pixel differences. Digital Signal Processing 23:919–927MathSciNetCrossRefGoogle Scholar
  8. 8.
    Li X, Li B, Yang B, Zeng T (2013) General framework to histogram-shifting-based reversible data hiding. IEEE Trans. Image Processing 22:2181–2191MathSciNetCrossRefGoogle Scholar
  9. 9.
    Hong W, Chen TS, Chen J (2015) Reversible data hiding using Delaunay triangulation and selective embedment. Inf Sci 308:140–154MathSciNetCrossRefGoogle Scholar
  10. 10.
    Wu H, Dugelay JL, Shi YQ (2015) Reversible image data hiding with contrast enhancement. IEEE Signal Processing Letter 22:81–85CrossRefGoogle Scholar
  11. 11.
    Chen H, Ni J, Hong W, Chen TS (2016) Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering. Signal Process Image Commun 46:1–16CrossRefGoogle Scholar
  12. 12.
    Tian J (2003) Reversible data embedding using a difference expansion, IEEE trans. Circuits and Systems for Video Technology 13:890–896CrossRefGoogle Scholar
  13. 13.
    Tai WL, Yeh CM, Chang CC (2009) Reversible data hiding based on histogram modification of pixel differences, IEEE trans. Circuits and Systems for Video Technology 19:906–910CrossRefGoogle Scholar
  14. 14.
    Hu Y, Lee HK, Li J (2009) DE-based reversible data hiding with improved overflow location map, IEEE trans. Circuits Systems and Video Technology 19:250–260CrossRefGoogle Scholar
  15. 15.
    Li X, Zhang W, Gui X, Yang B (2013) A novel reversible data hiding scheme based on two-dimensional difference-histogram modification. IEEE Trans Information Forensics and Security 8:1091–1100CrossRefGoogle Scholar
  16. 16.
    Li X, Li J, Li B, Yang B (2013) High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Process 93:198–205CrossRefGoogle Scholar
  17. 17.
    Ou B, Li X, Wang J (2016) Improved PVO-based reversible data hiding: a new implementation based on multiple histograms modification. J Vis Commun Image Represent 38:328–339CrossRefGoogle Scholar
  18. 18.
    Leung HY, Cheng LM, Liu F, Fu QK (2013) Adaptive reversible data hiding based on block median preservation and modification of prediction errors. The Journal of Systems and Software 86:2204–2219CrossRefGoogle Scholar
  19. 19.
    Qu X, Kim HJ (2015) Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding. Signal Process 111:249–260CrossRefGoogle Scholar
  20. 20.
    Luo T, Jiang G, Yu M, Xu H, Shao F (2016) Inter-view local texture analysis based stereo image reversible data hiding. Digital Signal Processing 48:116–129MathSciNetCrossRefGoogle Scholar
  21. 21.
    Rad RM, Wong K, Guo JM (2016) Reversible data hiding by adaptive group modification on histogram of prediction errors. Signal Process 125:315–328CrossRefGoogle Scholar
  22. 22.
    Qiu YQ, He H, Qian XZ, Li S, Zhang ZP (2018) Lossless data hiding in JPEG bitstream using alternative embedding. J Vis Commun Image Represent 52:86–91CrossRefGoogle Scholar
  23. 23.
    Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-LSB data embedding. IEEE Trans. Image Processing 14:253–266CrossRefGoogle Scholar
  24. 24.
    Chang CC, Tai WL, Lin CC (2006) A reversible data hiding scheme based on side-match vector quantization, IEEE trans. Circuits and Systems for Video Technology 16:1301–1308CrossRefGoogle Scholar
  25. 25.
    Zhang W, Hu X, Li X, Yu N (2013) Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression. IEEE Trans Image Processing 22:2775–2785CrossRefGoogle Scholar
  26. 26.
    Zhang X (2013) Reversible data hiding with optimal value transfer. IEEE Trans Multimedia 15:316–325CrossRefGoogle Scholar
  27. 27.
    C. H. Yang, L. W. Chen, K. L. Liu, and C. H. Chang, Reversible data hiding in encrypted image based on frequency domain, 2014 conference on cryptology and information security (CISC 2014)Google Scholar
  28. 28.
    Mao Q, Li F, Chang CC (2015) Reversible data hiding with oriented and minimized distortions using cascading trellis coding. Inf Sci 317:170–180CrossRefGoogle Scholar
  29. 29.
    S. Kamila, R. Roy, and S. Changder, A DWT based steganography scheme with image block partitioning, 2015 2nd international conference on signal processing and integrated networks (SPIN 2015)Google Scholar
  30. 30.
    Guillermito, Chi-square steganography test tool <http://www.guillermito2.net/stegano/tools/. Accessed 1 June 2017

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of Computer ScienceNational Pingtung UniversityPingtungTaiwan

Personalised recommendations