A generalized pixel value ordering data hiding with adaptive embedding capability

In this paper, we proposed an improvisation to Li et al.’s pixel value ordering (PVO) method and called it as generalized PVO (GePVO), which provides a suitable expansion strategy using the image redundancy more abundantly. GePVO makes use of a reference pixel and calculates prediction errors using both sides of the block in different modes (one-way GePVO, bidirectional GePVO, round-trip GePVO). The experimental results demonstrate that GePVO had better performance in terms of an increased embedding capacity compared to the other data hiding methods. When compared to Li et al.’s method, the bidirectional GePVO led to an increase in the embedding capacity by 1.8 times and the round-trip GePVO by three times. We contend that the GePVO method made the PVO method more flexible and unbound in terms of embedding capacity while keeping the image quality intact. Performance comparison with other reversible data hiding schemes is presented to demonstrate the validity of the proposed method.

[1]  Keke Gai,et al.  A survey on FinTech , 2018, J. Netw. Comput. Appl..

[2]  Zhihua Xia,et al.  A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.

[3]  Jau-Ji Shen,et al.  High-Capacity Reversible Data Hiding Based on Star-Shaped PVO Method , 2018, IIH-MSP 2018.

[4]  Wenqiang Zhao,et al.  A Higher Efficient Reversible Data Hiding Scheme Based on Pixel Value Ordering , 2018, J. Inf. Hiding Multim. Signal Process..

[5]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[6]  Fei Peng,et al.  Improved PVO-based reversible data hiding , 2014, Digit. Signal Process..

[7]  Xiang Wang,et al.  A novel reversible image data hiding scheme based on pixel value ordering and dynamic pixel block partition , 2015, Inf. Sci..

[8]  Yao Zhao,et al.  Reversible data hiding using invariant pixel-value-ordering and prediction-error expansion , 2014, Signal Process. Image Commun..

[9]  Bin Li,et al.  High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion , 2013, Signal Process..

[10]  Andrés Marín López,et al.  Enhancing privacy and dynamic federation in IdM for consumer cloud computing , 2012, IEEE Transactions on Consumer Electronics.

[11]  Hyoung Joong Kim,et al.  Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding , 2015, Signal Process..

[12]  Wojciech Mazurczyk,et al.  Is Cloud Computing Steganography-proof? , 2011, 2011 Third International Conference on Multimedia Information Networking and Security.

[13]  Wid Akeel Awadh,et al.  A New Text Steganography Method by Using Non-Printing Unicode Characters and Unicode System Characteristics in English/Arabic documents , 2012 .