Local complexity based adaptive embedding mechanism for reversible data hiding in digital images
- 162 Downloads
In this paper, a reversible data hiding scheme for digital images with high hiding capacity is proposed. Original image is segmented into smooth and rough regions based on local complexity. In order to achieve higher hiding capacity, we embed three bits into each pixel belonging to smooth region with lower local complexity and one bit is embedded into each pixel of rough region, which can effectively exploit more redundancy during data embedding compared with conventional methods of prediction error expansion (PEE). Additionally, the pixel selection mechanism is applied to reduce the number of shifted pixels, which leads to high visual quality of stego image. Experimental results show that, our scheme can achieve better rate-distortion performance than some of state-of-the-art schemes.
KeywordsReversible data hiding Prediction error expansion Local complexity Adaptive embedding Hiding capacity Image quality
This work was supported by the National Natural Science Foundation of China (61171126, 61272452, 61702332, U1636101, 61562007), Ministry of Transport and Applied Basic Research Projects (2014329810060), and Science & Technology Program of Shanghai Maritime University (20130479), Natural Science Foundation of Guangxi (2017GXNSFAA198222), and Research Fund of Guangxi Key Lab of Multi-source Information Mining & Security (MIMS15-03).
- 5.Hong W, Zheng S, Chen TS, Huang CC (2016) Reversible data hiding in block truncation coding compressed images using quantization level swapping and shifting. KSII Trans Internet Inf Syst 10(6):2817–2834Google Scholar
- 10.Liu JF, Tian YG, Han T, Wang JC, Luo XY (2016) Stego key searching for LSB steganography on JPEG decompressed image. SCIENCE CHINA Inf Sci 59(3):1–15Google Scholar
- 13.Ma YY, Luo XY, Li XL, Bao ZK, Zhang Y (2018) Selection of rich model Steganalysis features based on decision rough set α-positive region reduction. IEEE Trans Circuits Syst Video Technol. https://doi.org/10.1109/TCSVT.2018.2799243
- 24.Qin C, Ji P, Chang CC, Dong J, Sun XM (2018) Non-uniform watermark sharing based on optimal iterative BTC for image tampering recovery. IEEE Multimedia. https://doi.org/10.1109/MMUL.2018.112142509
- 30.Zhang XP (2012) Separable reversible data hiding in encrypted image. IEEE Trans Inf Forensics Secur 7(2):526–532Google Scholar