2023
DOI: 10.3390/electronics12071645
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Reversible Data Hiding Using Two-Dimensional Pixel Clustering

Abstract: Pixel clustering is a technique of content-adaptive data embedding in the area of high-performance reversible data hiding (RDH). Using pixel clustering, the pixels in a cover image can be classified into different groups based on a single factor, which is usually the local complexity. Since finer pixel clustering seems to improve the embedding performance, in this manuscript, we propose using two factors for two-dimensional pixel clustering to develop high-performance RDH. Firstly, in addition to the local com… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 25 publications
0
5
0
Order By: Relevance
“…In this case, we can directly extract the watermark information from the distorted image I a for copyright verification. We adopted a generic reversible algorithm framework and traditional reversible watermarking methods such as histogram modification (HM) [24], pixel value ordering (PVO) [25], difference expansion (DE) [26], and prediction error expansion (PEE) [27] techniques. In this paper, we specifically used difference expansion.…”
Section: Integrity Informationmentioning
confidence: 99%
“…In this case, we can directly extract the watermark information from the distorted image I a for copyright verification. We adopted a generic reversible algorithm framework and traditional reversible watermarking methods such as histogram modification (HM) [24], pixel value ordering (PVO) [25], difference expansion (DE) [26], and prediction error expansion (PEE) [27] techniques. In this paper, we specifically used difference expansion.…”
Section: Integrity Informationmentioning
confidence: 99%
“…The size of the hidden message must be balanced to ensure the quality of the technique. To meet these requirements, researchers have proposed various RDH techniques, including cryptographic-based, perception-based, pixel clustering, LSB-based, histogram-based, and feature extraction-based [6,[9][10][11][12]. RDH based on the histogram has limitations, including susceptibility to statistical attacks such as histogram analysis and a relatively small embedding capacity compared to other methods; thus, increasing embedding capacity reduces image quality and requires a location map that increases the amount of information to be embedded.…”
Section: Introductionmentioning
confidence: 99%
“…Although most existing RDH methods can accurately extract the embedded information, the embedding process causes noticeable distortion to the carrier image. An attacker can identify any irregularities or inconsistencies in the image histogram and quality distortions, which would give away the presence of hidden information [12][13][14][15][16][17]. Furthermore, traditional histogram shifting RDH techniques [11,12,[18][19][20][21] shift the peak points to the zero point of the image histogram while ignoring the amount of invalid shifting pixels (ISPs), resulting in redundant locations that cause significant image distortion; the pixels are shifted but not used in the embedding process, making it more vulnerable to attacks.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Depending on the applications' requirements, reversible ones recover the original media, while irreversible ones either do not care about the original media or the stego media has a comparable quality to its originals. Moreover, the data hiding methods can be classified into four categories according to the domains being processed: spatial [11][12][13][14][15][16][17][18], transform [19][20][21], compressed [22][23][24], and encryption [8,[25][26][27]. When using spatial domain methods, secret data are embedded into cover images by modifying their pixel values.…”
Section: Introductionmentioning
confidence: 99%