2020
DOI: 10.1109/access.2020.2993604
|View full text |Cite
|
Sign up to set email alerts
|

New High Capacity Reversible Data Hiding Using the Second-Order Difference Shifting

Abstract: Reversible data hiding (RDH) algorithm is developing rapidly for many years. Usually, the histogram shifting (HS) based RDH algorithm has two main steps: Firstly, a steep difference histogram is generated with some effective methods for difference. Secondly, by extending and shifting some differences in the histogram, bits of information can be embedded into the cover image which can be restored reversibly. In this paper, we proposed the second-order difference to obtain a steeper difference histogram. Firstly… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 39 publications
0
3
0
Order By: Relevance
“…During PEE-based data extraction, the predicted value of 60 is obtained using ( 17) and (18). Prediction error 1 60 60 0 e  is calculated using (19).…”
Section: Example Of Data Embedding and Extractionmentioning
confidence: 99%
See 1 more Smart Citation
“…During PEE-based data extraction, the predicted value of 60 is obtained using ( 17) and (18). Prediction error 1 60 60 0 e  is calculated using (19).…”
Section: Example Of Data Embedding and Extractionmentioning
confidence: 99%
“…RDH has attracted extensive research attention because of its ability to protect the data effectively, and various RDH methods with high performance are available. According to the embedding principle, RDH can be divided into difference expansion (DE) [1]- [10], histogram shifting (HS) [11]- [18] and interpolation techniques (ITs) [19]- [35]. Tian [1] first proposed a DE-based RDH method in 2003 by embedding one-bit segment of secret data into the least significant bit by extending the differences between the pixel pairs of the cover image, and the theoretical data-embedding capacity (in bits per pixel-BPP) was 0.5.…”
Section: Introductionmentioning
confidence: 99%
“…We will generate a fingerprint string in real time for each client to generate a request. In [35,36], develop a reversible data technique is developed to hide in audio using a statically computed histogram and hidden key.…”
Section: Related Workmentioning
confidence: 99%