An Improvemant of the IGEPVO-k Reversible Data Hiding Method

  • Ngoc-Hung Nguyen Institute of Information Technology, Vietnam Academy of Science and Technology
  • Kinh-Tai Le
  • Tran-Duc Dang
  • Duc-Diep Can
  • Minh-Thai Pham
Keywords: PVO, PVO-K, GePVO-K, iGePVO-K, Reversible data hiding, flag bits

Abstract

PVO-K method is an expansion of PVO method in which all ???? largest (???? smallest pixels) are used as a single unit
to embed a bit. In PVOK-method, each pixel of an original image is modified by one at most. GePVO-K method is again a development of the PVOK-method by embedding k bits in k largest pixels and ???? bits in ???? smallest pixels. However, this method has two drawbacks. First, each pixel of the original image is changed by two at most, so marked image quality is not good. Second, the location map consisting of two bits for each pixel is so large that in some cases compression code length of the map is greater method’s embedding capacity, and then data embedding capacity is zero. Both drawbacks are overcome in the iGePVO-K method. Specifically, in this method, each pixel only is changed by one at most and the two-bit location map as in iGePVO-K method is replaced by
a one-bit map and a sequence of binary flags. This paper is a development of the iGePVO-K method by discarding the sequence of binary flags. That means it is not necessary to embed flags with the data in the original image. Therefore, the proposed method not only has a larger data embedding capacity but also has a better image quality than the methods mentioned above.

References

M. Celik, G. Sharma, A. Tekalp, and E. Saber, “Lossless generalized-lsb data embedding,” IEEE Transactions on Image Processing, vol. 14, no. 2, pp. 253–266, 2005.

M. Celik, G. Sharma, and A. Tekalp, “Lossless watermarking for image authentication: a new framework and an implementation,” IEEE Transactions on Image Processing, vol. 15, no. 4, pp. 1042–1049, 2006.

J. Fridrich, M. Goljan, and R. Du, “Invertible authentication,” Proceedings of SPIE - The International Society for Optical Engineering, vol. 4314, pp. 197–208, 08 2001.

J. J. Fridrich, M. Goljan, and R. Du, “Lossless data embedding—new paradigm in digital watermarking,” EURASIP Journal on Advances in Signal Processing, vol. 2002, pp. 185–196, 2002.

J. Tian, “Reversible data embedding using a difference expansion,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 890–896, 2003.

A. Alattar, “Reversible watermark using the difference expansion of a generalized integer transform,” IEEE Transactions on Image Processing, vol. 13, no. 8, pp. 1147–1156, 2004.

L. Kamstra and H. Heijmans, “Reversible data embedding into images using wavelet techniques and sorting,” IEEE Transactions on Image Processing, vol. 14, no. 12, pp. 2082–2090, 2005.

W.-L. Tai, C.-M. Yeh, and C.-C. Chang, “Reversible data hiding based on histogram modification of pixel differences,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 19, no. 6, pp. 906–910, 2009.

D. M. Thodi and J. J. Rodriguez, “Expansion embedding techniques for reversible watermarking,” IEEE Transactions on Image Processing, vol. 16, no. 3, pp. 721–730, 2007.

Y. Hu, H.-K. Lee, and J. Li, “De-based reversible data hiding with improved overflow location map,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 19, no. 2, pp. 250–260, 2009.

X. Li, B. Yang, and T. Zeng, “Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection,” IEEE Transactions on Image Processing, vol. 20, no. 12, pp. 3524–3533, 2011.

Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354–362, 2006.

X. Chen, S. Xingming, H. Sun, L. Xiang, and Y. bin, “Histogram shifting based reversible data hiding method using directed-prediction scheme,” Multimedia Tools and Applications, vol. 74, pp. 5747–5765, 02 2015.

S. Kukreja, S. S. Kasana, and G. Kasana, “Histogram based multilevel reversible data hiding scheme using simple and absolute difference images,” Multimedia Tools Appl., vol. 78, no. 5, p. 6139–6162, 2019.

X. Ma, Z. Pan, S. Hu, and L. Wang, “High-fidelity reversible data hiding scheme based on multi-predictor sorting and selecting mechanism,” Journal of Visual Communication and Image Representation, vol. 28, pp. 71–82, 01 2015.

B. Ou, X. Li, W. Li, and Y.-Q. Shi, “Pixel-value-ordering based reversible data hiding with adaptive texture classification and modification,” Digital Forensics and Watermarking, vol. 11378, pp. 169–179, 2019.

X. Wang, J. Ding, and Q. Pei, “A novel reversible image data hiding scheme based on pixel value ordering and dynamic pixel block partition,” Inf. Sci., vol. 310, p. 16–35, 2015.

X. Li, J. Li, B. Li, and B. Yang, “High-fidelity reversible data hiding scheme based on pixel-value-ordering and predictionerror expansion,” Signal Process., vol. 93, no. 1, p. 198–205, jan 2013.

F. Peng, X. Li, and B. Yang, “Improved pvo-based reversible data hiding,” Digit. Signal Process., vol. 25, no. C, p. 255–265, feb 2014.

B. Ou, X. Li, Y. Zhao, and R. Ni, “Reversible data hiding using invariant pixel-value-ordering and prediction-error expansion,” Image Commun., vol. 29, no. 7, p. 760–772, aug 2014.

J.-J. Li, Y.-H. Wu, C.-F. Lee, and C.-C. Chang, “Generalized pvo-k embedding technique for reversible data hiding,” International Journal of Network Security, vol. 20, pp. 65–77, 01 2018.

N. K. Sao, N. N. Hoa, and P. V. At, “An effective reversible data hiding method based on pixel-value-ordering,” Journal of Computer Science and Cybernetics, vol. 36, no. 2, p. 139–158, May 2020.

Published
2023-06-25