Adaptive Embedding Pattern for Grayscale-Invariance Reversible Data Hiding

08/16/2019
by   Erdun Gao, et al.
0

In traditional reversible data hiding (RDH) methods, researchers pay attention to enlarge the embedding capacity (EC) and to reduce the embedding distortion (ED). Recently, a completely novel RDH algorithm was developed to embed secret data into color image without changing the corresponding grayscale [1], which largely expands the applications of RDH. In [1], for color image, channel R and channel B are exploited to carry secret information, channel G is adjusted for balancing the modifications of channel R and channel B to keep the invariance of grayscale. However, we found that the embedding performance (EP) of that method is still unsatisfied and could be further enhanced. To improve the EP, an adaptive embedding pattern is introduced to enhance the competence of algorithm for selectively embedding different bits of secret data into pixels according to context information. Moreover, a novel two-level predictor is designed by uniting two normal predictors for reducing the ED for embedding more bits. Experimental results demonstrate that, compared to the previous method, our scheme could significantly enhance the image fidelity while keeping the grayscale invariant.

READ FULL TEXT

page 15

page 17

research
01/16/2021

A Novel Local Binary Pattern Based Blind Feature Image Steganography

Steganography methods in general terms tend to embed more and more secre...
research
01/03/2022

LSB Based Non Blind Predictive Edge Adaptive Image Steganography

Image steganography is the art of hiding secret message in grayscale or ...
research
05/05/2019

Game-theoretic Analysis to Content-adaptive Reversible Watermarking

While many games were designed for steganography and robust watermarking...
research
01/15/2018

Ensemble Reversible Data Hiding

The conventional reversible data hiding (RDH) algorithms often consider ...
research
04/03/2018

Intra-Frame Error Concealment Scheme using 3D Reversible Data Hiding in Mobile Cloud Environment

Data in mobile cloud environment are mainly transmitted via wireless noi...
research
01/15/2018

Reversible Embedding to Covers Full of Boundaries

In reversible data embedding, to avoid overflow and underflow problem, b...
research
09/25/2017

An Evolutionary Computing Enriched RS Attack Resilient Medical Image Steganography Model for Telemedicine Applications

The recent advancement in computing technologies and resulting vision ba...

Please sign up or login with your details

Forgot password? Click here to reset