• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zeng Xiao, Chen Zhenyong, Chen Ming, and Xiong Zhang. Reversible Data Hiding Using Full-Context Prediction and Error Expansion[J]. Journal of Computer Research and Development, 2010, 47(9): 1595-1603.
Citation: Zeng Xiao, Chen Zhenyong, Chen Ming, and Xiong Zhang. Reversible Data Hiding Using Full-Context Prediction and Error Expansion[J]. Journal of Computer Research and Development, 2010, 47(9): 1595-1603.

Reversible Data Hiding Using Full-Context Prediction and Error Expansion

More Information
  • Published Date: September 14, 2010
  • Proposed in this paper is a data hiding scheme featuring high capacity and low distortion. It is a reversible data hiding scheme, in which secret data is embedded into the host image by expanding the prediction errors of pixels, and the original host image can be exactly recovered once the embedded data is extracted. In this paper, three strategies are proposed to improve the performance. Different from most existing predictors, wherein only a partial prediction context is available, a predictor with full context for every pixel is proposed to enhance the accuracy. An expansion methods derived from difference expansion is presented for embedding secret data into the prediction errors. And a new boundary map strategy is proposed to avoid the overflow problem, which only introduces a little overhead data. Experimental results demonstrate that the proposed full-context predictor has better accuracy than other predictors and works out a more centralized histogram; and with the proposed expansion method as well as boundary map, the proposed scheme can provide a larger embedding capacity and a better image quality than those reported in other state-of-the-art literature. In addition, the proposed scheme is able to adjust the payload to embed different amount of bits into one prediction error.
  • Related Articles

    [1]She Xiaomeng, Du Yang, Ma Wenjing, Yin Zhaoxia. Reversible Data Hiding in Encrypted Images Based on Pixel Prediction and Block Labeling[J]. Journal of Computer Research and Development, 2022, 59(9): 2089-2100. DOI: 10.7544/issn1000-1239.20210495
    [2]Yang Yaolin, He Hongjie, Chen Fan, Yuan Changqi. Reversible Data Hiding of Image Encryption Based on Prediction Error Adaptive Coding[J]. Journal of Computer Research and Development, 2021, 58(6): 1340-1350. DOI: 10.7544/issn1000-1239.2021.20200172
    [3]Song Chuanming, He Xing, Min Xin, Wang Xianghai. Index Map Prediction by 2-Neighbor Joint Transition Probability in Palette Coding[J]. Journal of Computer Research and Development, 2018, 55(11): 2557-2568. DOI: 10.7544/issn1000-1239.2018.20170247
    [4]Yan Shu, Chen Fan, He Hongjie. Reversible Data Hiding in Encrypted Image Based on Neighborhood Prediction Using XOR-Permutation Encryption[J]. Journal of Computer Research and Development, 2018, 55(6): 1211-1221. DOI: 10.7544/issn1000-1239.2018.20170295
    [5]Xu Xiaolong, Geng Weijian, Yang Geng, Li Lingjuan, Yang Zhen. An Efficient Fault-Tolerant Event and Event Boundary Detection Algorithm for Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2014, 51(5): 997-1008.
    [6]Yang Jiwen, Li Zheshuo, He Shuping, Xian Min. On Cellular Homology Boundary Learning Algorithms[J]. Journal of Computer Research and Development, 2013, 50(5): 1005-1011.
    [7]Yu Guoliang, Wu Weiguo, Yang Zhihua, Qian Depei. A Boundary-Table-Based Algorithm for Reconfigurable Resource Management and Hardware Task Scheduling[J]. Journal of Computer Research and Development, 2011, 48(4): 699-708.
    [8]Lin Yiming, Luo Haiyong, Li Jintao, Zhao Fang. Dynamic Radio Map Based Particle Filter for Indoor Wireless Localization[J]. Journal of Computer Research and Development, 2011, 48(1): 139-146.
    [9]Xiao Chuangbai, Yu Jing, Xue Yi. A Novel Fast Algorithm for MAP Super-Resolution Image Reconstruction[J]. Journal of Computer Research and Development, 2009, 46(5): 872-880.
    [10]Wang Bei, Yang Linjun, Lu Hong, and Xue Xiangyang. Post-Refinement of Shot Boundary Detection Based on Manifold Feature[J]. Journal of Computer Research and Development, 2006, 43(11): 1993-1998.

Catalog

    Article views (673) PDF downloads (586) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return