Treffer: Efficient Reversible Data Hiding for JPEG Images With Multiple Histograms Modification.

Title:
Efficient Reversible Data Hiding for JPEG Images With Multiple Histograms Modification.
Authors:
Xiao, Mengyao1 xiaomengyao@bjtu.edu.cn, Li, Xiaolong1 lixl@bjtu.edu.cn, Ma, Bin2 sddxmb@126.com, Zhang, Xinpeng3 zhangxinpeng@fudan.edu.cn, Zhao, Yao1 yzhao@bjtu.edu.cn
Source:
IEEE Transactions on Circuits & Systems for Video Technology. Jul2021, Vol. 31 Issue 7, p2535-2546. 12p.
Database:
Business Source Premier

Weitere Informationen

Most current reversible data hiding (RDH) techniques are designed for uncompressed images. However, JPEG images are more commonly used in our daily lives. Up to now, several RDH methods for JPEG images have been proposed, yet few of them investigated the adaptive data embedding as the lack of accurate measurement for the embedding distortion. To realize adaptive embedding and optimize the embedding performance, in this article, a novel RDH scheme for JPEG images based on multiple histogram modification (MHM) and rate-distortion optimization is proposed. Firstly, with selected coefficients, the RDH for JPEG images is generalized into a MHM embedding framework. Then, by estimating the embedding distortion, the rate-distortion model is formulated, so that the expansion bins can be adaptively determined for different histograms and images. Finally, to optimize the embedding performance in real time, a greedy algorithm with low computation complexity is proposed to derive the nearly optimal embedding efficiently. Experiments show that the proposed method can yield better embedding performance compared with state-of-the-art methods in terms of both visual quality and file size preservation. [ABSTRACT FROM AUTHOR]

Copyright of IEEE Transactions on Circuits & Systems for Video Technology is the property of IEEE and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)