2019
DOI: 10.1109/access.2019.2904174
|View full text |Cite
|
Sign up to set email alerts
|

Improved K-Pass Pixel Value Ordering Based Data Hiding

Abstract: K-pass pixel value ordering (PVO) is an effective reversible data hiding (RDH) technique. In k-pass PVO, the complexity measurement may lead to a weak estimation result because the unaltered pixels in a block are excluded to estimate block complexity. In addition, the prediction-error is computed without considering the location relationship of the second largest and largest pixels or the second smallest and smallest pixels. To this end, an improved RDH technique is proposed in this paper to enhance the embedd… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
22
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 28 publications
(22 citation statements)
references
References 31 publications
(39 reference statements)
0
22
0
Order By: Relevance
“…A high embedding capacity maintaining satisfying visual quality was achieved thru this aforementioned method. Weng et al [23] proposed an improved k-pass PVO revisable data hiding by utilizing the location relationship of the largest and the second largest or the smallest and the second smallest pixels in a block to increase the number of embeddable pixels. Moreover, the remaining pixels are exploited together with neighbor pixels to increase the estimation accuracy of local complexity.…”
Section: Introductionmentioning
confidence: 99%
“…A high embedding capacity maintaining satisfying visual quality was achieved thru this aforementioned method. Weng et al [23] proposed an improved k-pass PVO revisable data hiding by utilizing the location relationship of the largest and the second largest or the smallest and the second smallest pixels in a block to increase the number of embeddable pixels. Moreover, the remaining pixels are exploited together with neighbor pixels to increase the estimation accuracy of local complexity.…”
Section: Introductionmentioning
confidence: 99%
“…Huang et al proposed a RDH algorithm for QR code [8]. The background image covered by QR code is embedded into other regions of the background image using RDH [9][10][11][12][13][14][15][16]. Once scanned, the QR code can be removed and the background image can be partially recovered.…”
Section: Introductionmentioning
confidence: 99%
“…This characteristic makes RDH suitable for high authentication scenarios, such as medical image processing or military communication. It is widely used in applications such as law forensics [2][3][4], military imagery, medical imagery [5], cloud storage [6,7], copyright protection [8][9][10][11], etc. The traditional RDH schemes can be classified into several categories such as lossless compression [12], difference expansion (DE) [13,14], histogram shifting (HS) [15,16], and pixel prediction [17].…”
Section: Introductionmentioning
confidence: 99%
“…Cover image ← z 1j 37: end function 38: (11) where D 3j is pseudo-random binary matrix generated by K d . Then, read the first four bits of W 2j and convert them to a column vectorz 3j .…”
mentioning
confidence: 99%