{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T00:43:28Z","timestamp":1770338608678,"version":"3.49.0"},"reference-count":17,"publisher":"Oxford University Press (OUP)","issue":"4","license":[{"start":{"date-parts":[[2023,8,2]],"date-time":"2023-08-02T00:00:00Z","timestamp":1690934400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/pages\/standard-publication-reuse-rights"}],"funder":[{"name":"Guangdong Scientific Research Promotion Project for Key Construction Disciplines","award":["2021ZDJS132"],"award-info":[{"award-number":["2021ZDJS132"]}]},{"name":"Guangdong Engineering Technology Center of Regular Universities","award":["2021GCZX001"],"award-info":[{"award-number":["2021GCZX001"]}]},{"name":"Scientific Research Program of Guangzhou","award":["202201010098"],"award-info":[{"award-number":["202201010098"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,4,21]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>In the area of reversible data hiding (RDH), one of the most popular techniques is prediction-error expansion (PEE), which hides data in the prediction errors with well-preserved image fidelity. The key to a successful PEE-based RDH implementation usually lies in prediction algorithms with high accuracy. Existing PEE-based RDH works often employ one single prediction algorithm, which is usually globally optimized, but with less consideration of the pixel distribution characteristics within local neighborhoods. In this manuscript, the technique of pattern adaptive prediction is proposed for pixel estimation according to the type of local binary pattern (LBP), which is obtained from the pixel\u2019s eight neighborhood. Theoretically speaking, pattern-based predictors can be designed for each and every LBP patterns to create multiple prediction-error histograms (PEHs). However, the process of performance optimization with multiple PEHs requires extremely heavy computing power. To speed up the optimization process, LBP patterns are classified into various groups based on the degree of histogram concentration. Experiments demonstrate that the prediction accuracy is obviously improved and the image fidelity is well preserved.<\/jats:p>","DOI":"10.1093\/comjnl\/bxad082","type":"journal-article","created":{"date-parts":[[2023,8,3]],"date-time":"2023-08-03T20:02:40Z","timestamp":1691092960000},"page":"1564-1571","source":"Crossref","is-referenced-by-count":3,"title":["Reversible Data Hiding With Pattern Adaptive Prediction"],"prefix":"10.1093","volume":"67","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0156-9373","authenticated-orcid":false,"given":"Junying","family":"Yuan","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-sen University , No. 132, Outer Ring East Road, University Town, Panyu District, Guangzhou 510006 , China"},{"name":"School of Electrical and Computer Engineering, Guangzhou Nanfang College , Wenquan Town, Conghua District, Guangzhou 510970, China China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6729-4176","authenticated-orcid":false,"given":"Huicheng","family":"Zheng","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-sen University , No. 132, Outer Ring East Road, University Town, Panyu District, Guangzhou 510006 , China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7520-9031","authenticated-orcid":false,"given":"Jiangqun","family":"Ni","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-sen University , No. 132, Outer Ring East Road, University Town, Panyu District, Guangzhou 510006 , China"}]}],"member":"286","published-online":{"date-parts":[[2023,8,2]]},"reference":[{"key":"2024042316183142200_ref1","doi-asserted-by":"crossref","first-page":"3210","DOI":"10.1109\/ACCESS.2016.2573308","article-title":"Reversible data hiding: Advances in the past two decades","volume":"4","author":"Li","year":"2016","journal-title":"IEEE Access"},{"key":"2024042316183142200_ref2","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1109\/TIP.2006.891046","article-title":"Expansion embedding techniques for reversible watermarking","volume":"16","author":"Tholi","year":"2007","journal-title":"IEEE Trans. Image Process."},{"key":"2024042316183142200_ref3","doi-asserted-by":"crossref","first-page":"989","DOI":"10.1109\/TCSVT.2009.2020257","article-title":"Reversible watermarking algorithm using sorting and prediction","volume":"19","author":"Sachnev","year":"2009","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"2024042316183142200_ref4","doi-asserted-by":"crossref","first-page":"574","DOI":"10.1109\/LSP.2017.2679043","article-title":"High-fidelity reversible data hiding using directionally enclosed prediction","volume":"24","author":"Chen","year":"2017","journal-title":"IEEE Signal Process. Letters"},{"key":"2024042316183142200_ref5","doi-asserted-by":"crossref","first-page":"464","DOI":"10.1109\/LSP.2021.3059202","article-title":"CNN prediction based reversible data hiding","volume":"28","author":"Hu","year":"2021","journal-title":"IEEE Signal Process. Letters"},{"key":"2024042316183142200_ref6","doi-asserted-by":"crossref","first-page":"2627","DOI":"10.1109\/LSP.2022.3231193","article-title":"New CNN-based predictor for reversible data hiding","volume":"29","author":"Xie","year":"2022","journal-title":"IEEE Signal Process. Lett."},{"key":"2024042316183142200_ref7","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1109\/TIFS.2011.2155062","article-title":"A novel data embedding method using adaptive pixel pair matching","volume":"7","author":"Hong","year":"2012","journal-title":"IEEE Trans. on Info. Forensics and Secur."},{"key":"2024042316183142200_ref8","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.ins.2021.12.092","article-title":"Reversible data hiding based on high fidelity prediction scheme for reducing the number of invalid modifications","volume":"589","author":"Kouhi","year":"2022","journal-title":"Inform. Sci."},{"key":"2024042316183142200_ref9","doi-asserted-by":"crossref","first-page":"2653","DOI":"10.1016\/j.jss.2010.08.047","article-title":"A local variance-controlled reversible data hiding method using prediction and histogram-shifting","volume":"83","author":"Hong","year":"2010","journal-title":"J. Sys. Softw."},{"key":"2024042316183142200_ref10","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.ins.2020.10.063","article-title":"Reversible data hiding method for multi-histogram point selection based on improved crisscross optimization algorithm","volume":"549","author":"Weng","year":"2021","journal-title":"Inform. Sci."},{"key":"2024042316183142200_ref11","first-page":"1","article-title":"High-quality reversible data hiding scheme using sorting and enhanced pairwise pee","volume":"4","author":"Kaur","year":"2022","journal-title":"IET Image Process."},{"key":"2024042316183142200_ref12","doi-asserted-by":"crossref","first-page":"2300","DOI":"10.1109\/TCSVT.2019.2942489","article-title":"Optimal reversible data hiding scheme based on multiple histograms modification","volume":"30","author":"Qi","year":"2020","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"2024042316183142200_ref13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.image.2020.116118","article-title":"Reversible data hiding based on multiple histograms modification and deep neural networks","volume":"92","author":"Hou","year":"2021","journal-title":"Signal Process. Image Commun."},{"key":"2024042316183142200_ref14","doi-asserted-by":"crossref","first-page":"2016","DOI":"10.1109\/TIFS.2015.2444354","article-title":"Efficient reversible data hiding based on multiple histograms modification","volume":"10","author":"Li","year":"2015","journal-title":"IEEE Trans. Info. Forensics Secur."},{"key":"2024042316183142200_ref15","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/0031-3203(95)00067-4","article-title":"A comparative study of texture measures with classification based on featured distributions","volume":"29","author":"Ohala","year":"1996","journal-title":"Pattern Recognit."},{"key":"2024042316183142200_ref16","volume-title":"BOWS-2","author":"Bas"},{"key":"2024042316183142200_ref17","author":"The USC-SIPI Image Database"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/67\/4\/1564\/57296009\/bxad082.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/67\/4\/1564\/57296009\/bxad082.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,23]],"date-time":"2024-04-23T17:02:02Z","timestamp":1713891722000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/67\/4\/1564\/7235533"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,2]]},"references-count":17,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2023,8,2]]},"published-print":{"date-parts":[[2024,4,21]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxad082","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2024,4]]},"published":{"date-parts":[[2023,8,2]]}}}