2019
DOI: 10.1016/j.image.2018.11.005
|View full text |Cite
|
Sign up to set email alerts
|

Multiple moduli prediction error expansion reversible data hiding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
10
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(10 citation statements)
references
References 15 publications
0
10
0
Order By: Relevance
“…However, the reversibility of the proposed scheme still replies on the existence of zero value points in the histogram. As further development, Caciula et al 18 investigated a multiple moduli prediction error expansion approach to achieve reversible data hiding. Thanks to the introduced linear programming model, the specific moduli is selected so as to maximize the embedding bit rate.…”
Section: Related Workmentioning
confidence: 99%
“…However, the reversibility of the proposed scheme still replies on the existence of zero value points in the histogram. As further development, Caciula et al 18 investigated a multiple moduli prediction error expansion approach to achieve reversible data hiding. Thanks to the introduced linear programming model, the specific moduli is selected so as to maximize the embedding bit rate.…”
Section: Related Workmentioning
confidence: 99%
“…The difference between them is that the reversible hiding scheme can reconstruct the original cover image after secret data is extracted. Many successful reversible data hiding schemes have been proposed [1][2][3][4][5][6][7], including the difference expansion [3,4], the prediction error expansion (PEE) [5,6], the histogram shifting [8,9], the neural network [10][11][12] and so on. For instance, the prediction error expansion is first proposed by Thodi et al [13], which embeds the secret information by expanding the prediction errors obtained from the difference of original and predicted value of the target pixel.…”
Section: Introductionmentioning
confidence: 99%
“…The security of the carrier is ensured by cover image encryption, while the security of additional data is guaranteed by steganography, which results in the need for RDH in the encrypted domain. So far, RDH is classified into four types: lossless compression [14], histogram modification [15], difference expansion [16], and prediction error expansion [17]. In recent years, researchers have also done a lot of work on RDH in the encrypted domain.…”
Section: Introductionmentioning
confidence: 99%