2023
DOI: 10.3390/electronics12071652
|View full text |Cite
|
Sign up to set email alerts
|

High-Embedded Low-Distortion Multihistogram Shift Video Reversible Data Hiding Based on DCT Coefficient

Abstract: Video reversible data hiding technology can be applied to copyright protection, medical images, the military, and other fields, but it cannot guarantee high visual quality with an effective embedded capacity. In this paper, a high-embedding and low-distortion reversible data hiding scheme based on a discrete cosine transform (DCT) coefficients method is proposed. The scheme first decodes the original video stream with entropy, obtains all the DCT blocks, and selects the embeddable DCT blocks according to the c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 38 publications
0
2
0
Order By: Relevance
“…The size of the hidden message must be balanced to ensure the quality of the technique. To meet these requirements, researchers have proposed various RDH techniques, including cryptographic-based, perception-based, pixel clustering, LSB-based, histogram-based, and feature extraction-based [6,[9][10][11][12]. RDH based on the histogram has limitations, including susceptibility to statistical attacks such as histogram analysis and a relatively small embedding capacity compared to other methods; thus, increasing embedding capacity reduces image quality and requires a location map that increases the amount of information to be embedded.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The size of the hidden message must be balanced to ensure the quality of the technique. To meet these requirements, researchers have proposed various RDH techniques, including cryptographic-based, perception-based, pixel clustering, LSB-based, histogram-based, and feature extraction-based [6,[9][10][11][12]. RDH based on the histogram has limitations, including susceptibility to statistical attacks such as histogram analysis and a relatively small embedding capacity compared to other methods; thus, increasing embedding capacity reduces image quality and requires a location map that increases the amount of information to be embedded.…”
Section: Introductionmentioning
confidence: 99%
“…An attacker can identify any irregularities or inconsistencies in the image histogram and quality distortions, which would give away the presence of hidden information [12][13][14][15][16][17]. Furthermore, traditional histogram shifting RDH techniques [11,12,[18][19][20][21] shift the peak points to the zero point of the image histogram while ignoring the amount of invalid shifting pixels (ISPs), resulting in redundant locations that cause significant image distortion; the pixels are shifted but not used in the embedding process, making it more vulnerable to attacks. Usually, the prediction error histogram is used in conjunction with histogram modification to create prediction-error histograms (PEHs), from which the appropriate expansion bins for histogram shifting and histogram expansion are chosen.…”
Section: Introductionmentioning
confidence: 99%