2019
DOI: 10.1109/access.2019.2909560
|View full text |Cite
|
Sign up to set email alerts
|

Reversible Data Hiding With Image Enhancement Using Histogram Shifting

Abstract: Traditional reversible data hiding (RDH) focuses on enlarging the embedding payloads while minimizing the distortion with a criterion of mean square error (MSE). Since imperceptibility can also be achieved via image processing, we propose a novel method of RDH with contrast enhancement (RDH-CE) using histogram shifting. Instead of minimizing the MSE, the proposed method generates marked images with good quality with the sense of structural similarity. The proposed method contains two parts: the baseline embedd… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
27
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 38 publications
(27 citation statements)
references
References 35 publications
0
27
0
Order By: Relevance
“…Recently, Tang et al [18] applied HS to the design of RDH in encrypted image, and achieved data embedding by shifting block histogram of pixel differences in homomorphic encrypted domain. Ying et al [19] proposed a novel RDH algorithm based on contrast enhancement. This algorithm used the HS technique based on prediction error to achieve high embedding payload.…”
Section: Hs-based Rdh Algorithmsmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, Tang et al [18] applied HS to the design of RDH in encrypted image, and achieved data embedding by shifting block histogram of pixel differences in homomorphic encrypted domain. Ying et al [19] proposed a novel RDH algorithm based on contrast enhancement. This algorithm used the HS technique based on prediction error to achieve high embedding payload.…”
Section: Hs-based Rdh Algorithmsmentioning
confidence: 99%
“…The associate editor coordinating the review of this manuscript and approving it for publication was Jiju Poovvancheri . compression (LC) [7]- [11], difference expansion (DE) [12]- [14], histogram shifting (HS) [15]- [18], predictionerror expansion (PEE) [19]- [23] and integer transform (IT) [24]- [27]. Some typical algorithms of each category are briefly introduced as follows.…”
Section: Introductionmentioning
confidence: 99%
“…In the past decade, many data hiding schemes have been proposed. Schemes [1]- [3] embedded the data in the spatial domain. Schemes [4]- [6] implemented the data hiding in the compressed domain.…”
Section: Introductionmentioning
confidence: 99%
“…Information hiding is to embed secret data to the image, video or other public carriers, and makes them less susceptible and difficult for adversaries to detect. This paper studies and proposes a novel method of information hiding, which has practical application value for copyright and intellectual property protection [4], labeling digital images [5], company…”
Section: Introductionmentioning
confidence: 99%