Skip to main content
Log in

DWT-based reversible information hiding scheme using prediction-error-expansion in multimedia images

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

This article presents an information hiding scheme for Multimedia IoT (MIoT) applications, with particular concern the services where the context of cover multimedia is fully reserved. The proposed scheme develops an algorithm of prediction-error-expansion (PEE) based on prediction-generating-method (PGM) on discrete wavelet transform (DWT) domain. The PGM is applied to generate the predicted image, and then, conceal the message into predicted error that is computed between the original image and predicted image. More and more prediction errors are closed, the higher performance will have. The evidence is verified in the experimental results. The experimental results display the performance in terms of embedding capacity, auxiliary information, and image quality. From the experiments show that our proposed scheme clearly has superior performances than previous works.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Floris A, Atzori L (2057) Managing the quality of experience in the multimedia internet of things: a layer-based approach. Sensors 16(2016):1–21

    Google Scholar 

  2. Wu Q, Ding G, Xu Y, Feng S, Du Z, Wang J, Long K (2016) Cognitive of internet of things: a new paradigm beyond connection. IEEE Internet of Thing Journal 1:129–143

    Article  Google Scholar 

  3. Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding, IEEE trans. Circuits and Systems for Video Technology 16:354–362

    Article  Google Scholar 

  4. Tsai P, Hu YC, Yeh HL (2009) Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process 89:1129–1143

    Article  Google Scholar 

  5. Luo L, Chen Z, Chen M, Zeng X (2010) Reversible image watermarking using interpolation technique. IEEE Trans Information Forensic and Security 5:187–193

    Article  Google Scholar 

  6. Wu HT, Huang J (2012) Reversible image watermarking on prediction errors by efficient histogram modification. Signal Process 92:3000–3009

    Article  Google Scholar 

  7. Tsai YY, Tsai DS, Liu CL (2013) Reversible data hiding scheme based on neighboring pixel differences. Digital Signal Processing 23:919–927

    Article  MathSciNet  Google Scholar 

  8. Li X, Li B, Yang B, Zeng T (2013) General framework to histogram-shifting-based reversible data hiding. IEEE Trans. Image Processing 22:2181–2191

    Article  MathSciNet  Google Scholar 

  9. Hong W, Chen TS, Chen J (2015) Reversible data hiding using Delaunay triangulation and selective embedment. Inf Sci 308:140–154

    Article  Google Scholar 

  10. Wu H, Dugelay JL, Shi YQ (2015) Reversible image data hiding with contrast enhancement. IEEE Signal Processing Letter 22:81–85

    Article  Google Scholar 

  11. Chen H, Ni J, Hong W, Chen TS (2016) Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering. Signal Process Image Commun 46:1–16

    Article  Google Scholar 

  12. Tian J (2003) Reversible data embedding using a difference expansion, IEEE trans. Circuits and Systems for Video Technology 13:890–896

    Article  Google Scholar 

  13. Tai WL, Yeh CM, Chang CC (2009) Reversible data hiding based on histogram modification of pixel differences, IEEE trans. Circuits and Systems for Video Technology 19:906–910

    Article  Google Scholar 

  14. Hu Y, Lee HK, Li J (2009) DE-based reversible data hiding with improved overflow location map, IEEE trans. Circuits Systems and Video Technology 19:250–260

    Article  Google Scholar 

  15. Li X, Zhang W, Gui X, Yang B (2013) A novel reversible data hiding scheme based on two-dimensional difference-histogram modification. IEEE Trans Information Forensics and Security 8:1091–1100

    Article  Google Scholar 

  16. Li X, Li J, Li B, Yang B (2013) High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Process 93:198–205

    Article  Google Scholar 

  17. Ou B, Li X, Wang J (2016) Improved PVO-based reversible data hiding: a new implementation based on multiple histograms modification. J Vis Commun Image Represent 38:328–339

    Article  Google Scholar 

  18. Leung HY, Cheng LM, Liu F, Fu QK (2013) Adaptive reversible data hiding based on block median preservation and modification of prediction errors. The Journal of Systems and Software 86:2204–2219

    Article  Google Scholar 

  19. Qu X, Kim HJ (2015) Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding. Signal Process 111:249–260

    Article  Google Scholar 

  20. Luo T, Jiang G, Yu M, Xu H, Shao F (2016) Inter-view local texture analysis based stereo image reversible data hiding. Digital Signal Processing 48:116–129

    Article  MathSciNet  Google Scholar 

  21. Rad RM, Wong K, Guo JM (2016) Reversible data hiding by adaptive group modification on histogram of prediction errors. Signal Process 125:315–328

    Article  Google Scholar 

  22. Qiu YQ, He H, Qian XZ, Li S, Zhang ZP (2018) Lossless data hiding in JPEG bitstream using alternative embedding. J Vis Commun Image Represent 52:86–91

    Article  Google Scholar 

  23. Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-LSB data embedding. IEEE Trans. Image Processing 14:253–266

    Article  Google Scholar 

  24. Chang CC, Tai WL, Lin CC (2006) A reversible data hiding scheme based on side-match vector quantization, IEEE trans. Circuits and Systems for Video Technology 16:1301–1308

    Article  Google Scholar 

  25. Zhang W, Hu X, Li X, Yu N (2013) Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression. IEEE Trans Image Processing 22:2775–2785

    Article  Google Scholar 

  26. Zhang X (2013) Reversible data hiding with optimal value transfer. IEEE Trans Multimedia 15:316–325

    Article  Google Scholar 

  27. C. H. Yang, L. W. Chen, K. L. Liu, and C. H. Chang, Reversible data hiding in encrypted image based on frequency domain, 2014 conference on cryptology and information security (CISC 2014)

  28. Mao Q, Li F, Chang CC (2015) Reversible data hiding with oriented and minimized distortions using cascading trellis coding. Inf Sci 317:170–180

    Article  Google Scholar 

  29. S. Kamila, R. Roy, and S. Changder, A DWT based steganography scheme with image block partitioning, 2015 2nd international conference on signal processing and integrated networks (SPIN 2015)

  30. Guillermito, Chi-square steganography test tool <http://www.guillermito2.net/stegano/tools/. Accessed 1 June 2017

Download references

Acknowledgments

The author would like to thank Mr. Terry Wong for providing the part of the experimental simulations. This work was supported in part by the Ministry of Science and Technology (MOST), Taiwan, under Grant. 106-2221-E-015-001 and 107-2221-E-153-001.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chi-Yao Weng.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection: Special Issue on IoT System Technologies based on Quality of Experience

Guest Editors: Cho Jaeik, Naveen Chilamkurti, and SJ Wang

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Weng, CY. DWT-based reversible information hiding scheme using prediction-error-expansion in multimedia images. Peer-to-Peer Netw. Appl. 13, 514–523 (2020). https://doi.org/10.1007/s12083-018-0709-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-018-0709-2

Keywords

Navigation