Table of Contents Author Guidelines Submit a Manuscript
Advances in Multimedia
Volume 2017, Article ID 6359248, 9 pages
https://doi.org/10.1155/2017/6359248
Research Article

General Framework of Reversible Watermarking Based on Asymmetric Histogram Shifting of Prediction Error

Sheng Chen,1,2,3 Xianyi Chen,1,2,3 and Huijuan Fu4,5

1Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing, Jiangsu 210044, China
2Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology, Nanjing University of Information Science and Technology, Nanjing 210044, China
3School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing 210044, China
4School of Information Management, Wuhan University, Wuhan, China
5School of Information Engineering, Jiangxi University of Science and Technology, Jiangxi, China

Correspondence should be addressed to Xianyi Chen; moc.361@2264020

Received 28 July 2017; Accepted 9 October 2017; Published 23 November 2017

Academic Editor: Fu Lee Wang

Copyright © 2017 Sheng Chen et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. Y.-Q. Shi, X. Li, X. Zhang, H.-T. Wu, and B. Ma, “Reversible data hiding: Advances in the past two decades,” IEEE Access, vol. 4, pp. 3210–3237, 2016. View at Publisher · View at Google Scholar · View at Scopus
  2. P. Tsai, Y.-C. Hu, and H.-L. Yeh, “Reversible image hiding scheme using predictive coding and histogram shifting,” Signal Processing, vol. 89, no. 6, pp. 1129–1143, 2009. View at Publisher · View at Google Scholar · View at Scopus
  3. Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354–361, 2006. View at Publisher · View at Google Scholar · View at Scopus
  4. L. Luo, Z. Chen, M. Chen, X. Zeng, and Z. Xiong, “Reversible image watermarking using interpolation technique,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 1, pp. 187–193, 2010. View at Publisher · View at Google Scholar · View at Scopus
  5. C.-F. Lee and Y.-L. Huang, “An efficient image interpolation increasing payload in reversible data hiding,” Expert Systems with Applications, vol. 39, no. 8, pp. 6712–6719, 2012. View at Publisher · View at Google Scholar · View at Scopus
  6. V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y. Q. Shi, “Reversible watermarking algorithm using sorting and prediction,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 19, no. 7, pp. 989–999, 2009. View at Publisher · View at Google Scholar · View at Scopus
  7. W. Hong and T.-S. Chen, “Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism,” Journal of Visual Communication and Image Representation, vol. 22, no. 2, pp. 131–140, 2011. View at Publisher · View at Google Scholar · View at Scopus
  8. W. Hong, “Adaptive reversible data hiding method based on error energy control and histogram shifting,” Optics Communications, vol. 285, no. 2, pp. 101–108, 2012. View at Publisher · View at Google Scholar · View at Scopus
  9. R. M. Rad, K. Wong, and J.-M. Guo, “Reversible data hiding by adaptive group modification on histogram of prediction errors,” Signal Processing, vol. 125, pp. 315–328, 2016. View at Publisher · View at Google Scholar · View at Scopus
  10. B. Ou, Y. Zhao, and R. Ni, “Reversible watermarking using optional prediction error histogram modification,” Neurocomputing, vol. 93, pp. 67–76, 2012. View at Publisher · View at Google Scholar · View at Scopus
  11. W. Zhang, X. Hu, X. Li, and N. Yu, “Recursive histogram modification: Establishing equivalency between reversible data hiding and lossless data compression,” IEEE Transactions on Image Processing, vol. 22, no. 7, pp. 2775–2785, 2013. View at Publisher · View at Google Scholar · View at Scopus
  12. X. Hu, W. Zhang, X. Hu, N. Yu, X. Zhao, and F. Li, “Fast estimation of optimal marked-signal distribution for reversible data hiding,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 5, pp. 779–788, 2013. View at Publisher · View at Google Scholar · View at Scopus
  13. B. Chen, W. Zhang, K. Ma, and N. Yu, “Recursive code construction for reversible data hiding in DCT domain,” Multimedia Tools and Applications, vol. 72, no. 2, pp. 1985–2009, 2014. View at Publisher · View at Google Scholar · View at Scopus
  14. X. P. Zhang, “Separable reversible data hiding in encrypted image,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 826–832, 2012. View at Publisher · View at Google Scholar · View at Scopus
  15. X. Zeng, Z.-Y. Chen, M. Chen, and Z. Xiong, “Reversible video watermarking using motion estimation and prediction error expansion,” Journal of Information Science and Engineering, vol. 27, no. 2, pp. 465–479, 2011. View at Google Scholar · View at Scopus
  16. L.-C. Huang, L.-Y. Tseng, and M.-S. Hwang, “A reversible data hiding method by histogram shifting in high quality medical images,” The Journal of Systems and Software, vol. 86, no. 3, pp. 716–727, 2013. View at Publisher · View at Google Scholar · View at Scopus
  17. J. Serra-Ruiz and D. Megías, “Reversible data hiding for tampering detection in remote sensing images using histogram shifting,” in Proceedings of the Satellite Data Compression, Communications, and Processing VIII, August 2012. View at Publisher · View at Google Scholar · View at Scopus
  18. X. Chen, X. Sun, H. Sun, Z. Zhou, and J. Zhang, “Reversible watermarking method based on asymmetric-histogram shifting of prediction errors,” The Journal of Systems and Software, vol. 86, no. 10, pp. 2620–2626, 2013. View at Publisher · View at Google Scholar · View at Scopus
  19. T.-C. Lu, C.-M. Chen, M.-C. Lin, and Y.-H. Huang, “Multiple predictors hiding scheme using asymmetric histograms,” Multimedia Tools and Applications, vol. 76, no. 3, pp. 3361–3382, 2017. View at Publisher · View at Google Scholar · View at Scopus
  20. T.-C. Lu, C.-Y. Tseng, and J.-H. Wu, “Asymmetric-histogram based reversible information hiding scheme using edge sensitivity detection,” The Journal of Systems and Software, vol. 116, pp. 2–21, 2016. View at Publisher · View at Google Scholar · View at Scopus
  21. X. Chen, X. Sun, H. Sun, L. Xiang, and B. Yang, “Histogram shifting based reversible data hiding method using directed-prediction scheme,” Multimedia Tools and Applications, vol. 74, no. 15, pp. 5747–5765, 2015. View at Publisher · View at Google Scholar · View at Scopus
  22. A. H. M. Kamal and M. M. Islam, “Enhancing embedding capacity and stego image quality by employing multi predictors,” Journal of Information Security and Applications, vol. 32, pp. 59–74, 2017. View at Publisher · View at Google Scholar · View at Scopus
  23. Image database, http://sipi.usc.edu/database.