Authenticity preservation with histogram-based reversible data hiding and quadtree concepts

Hsiang Cheh Huang*, Wai-Chi Fang

*Corresponding author for this work

    Research output: Contribution to journalArticlepeer-review

    45 Scopus citations


    With the widespread use of identification systems, establishing authenticity with sensors has become an important research issue. Among the schemes for making authenticity verification based on information security possible, reversible data hiding has attracted much attention during the past few years. With its characteristics of reversibility, the scheme is required to fulfill the goals from two aspects. On the one hand, at the encoder, the secret information needs to be embedded into the original image by some algorithms, such that the output image will resemble the input one as much as possible. On the other hand, at the decoder, both the secret information and the original image must be correctly extracted and recovered, and they should be identical to their embedding counterparts. Under the requirement of reversibility, for evaluating the performance of the data hiding algorithm, the output image quality, named imperceptibility, and the number of bits for embedding, called capacity, are the two key factors to access the effectiveness of the algorithm. Besides, the size of side information for making decoding possible should also be evaluated. Here we consider using the characteristics of original images for developing our method with better performance. In this paper, we propose an algorithm that has the ability to provide more capacity than conventional algorithms, with similar output image quality after embedding, and comparable side information produced. Simulation results demonstrate the applicability and better performance of our algorithm.

    Original languageEnglish
    Pages (from-to)9717-9731
    Number of pages15
    Issue number10
    StatePublished - 1 Oct 2011


    • Capacity
    • Histogram
    • Imperceptibility
    • Quadtree
    • Reversible data hiding
    • Side information


    Dive into the research topics of 'Authenticity preservation with histogram-based reversible data hiding and quadtree concepts'. Together they form a unique fingerprint.

    Cite this