{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:44:06Z","timestamp":1740149046255,"version":"3.37.3"},"reference-count":35,"publisher":"Wiley","license":[{"start":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T00:00:00Z","timestamp":1643587200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802074","2020A1515010760"],"award-info":[{"award-number":["61802074","2020A1515010760"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100021171","name":"Guangdong Basic and Applied Basic Research Foundation","doi-asserted-by":"crossref","award":["61802074","2020A1515010760"],"award-info":[{"award-number":["61802074","2020A1515010760"]}],"id":[{"id":"10.13039\/501100021171","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2022,1,31]]},"abstract":"<jats:p>Recent reversible data hiding (RDH) work tends to realize adaptive embedding by discriminately modifying pixels according to image content. However, further optimization and computational complexity remain great challenges. By presenting a better incorporation of pixel value ordering (PVO) prediction and pairwise prediction-error expansion (PEE) technologies, this paper proposes a new RDH scheme. The largest\/smallest three pixels of each block are utilized to generate error-pairs. To achieve optimization of the distribution of error pairs, two-layer embedding is introduced such that full-enclosed pixels of each block can be used to determine how to optimally define the spatial location of pixels within block. Then, to modify error pairs with less distortion introduced, the shifted pairing error is involved in the separable utilization of the other one; i.e., it serves as the context for recalculating the other one. Since the recalculation is equivalent to expansion bins selection, various extensions of original pairwise PEE are designed, parameterized, and combined into the so-called multiple pairwise PEE, with which the 2D histogram can be divided into a set of sub-ones for more accurate modification. The experimental results verify the superiority of the proposed scheme over several PVO-based schemes. On the Kodak image database, the average PSNR gains over original PVO-based pairwise PEE are 0.83 and 0.99\u2009dB for capacities of 10,000 and 20,000 bits, respectively.<\/jats:p>","DOI":"10.1155\/2022\/2051058","type":"journal-article","created":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T23:35:07Z","timestamp":1643672107000},"page":"1-12","source":"Crossref","is-referenced-by-count":6,"title":["Reversible Data Hiding Based on Multiple Pairwise PEE and Two-Layer Embedding"],"prefix":"10.1155","volume":"2022","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1051-389X","authenticated-orcid":true,"given":"Wenguang","family":"He","sequence":"first","affiliation":[{"name":"School of Information Engineering, Guangdong Medical University, Guangdong 524023, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1487-9637","authenticated-orcid":true,"given":"Gangqiang","family":"Xiong","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Guangdong Medical University, Guangdong 524023, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4696-0907","authenticated-orcid":true,"given":"Yaomin","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Guangdong Medical University, Guangdong 524023, China"}]}],"member":"311","reference":[{"doi-asserted-by":"publisher","key":"1","DOI":"10.1109\/lsp.2021.3059202"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1109\/tifs.2020.3006382"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1109\/tip.2004.840686"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1117\/12.435400"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1109\/icme.2006.262782"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1109\/tip.2013.2246179"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1016\/j.sigpro.2008.12.017"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/tip.2004.828418"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1016\/j.jvcir.2016.03.011"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1016\/j.sigpro.2015.01.002"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1109\/tip.2006.891046"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1016\/j.sigpro.2019.107264"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/tip.2011.2162424"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1109\/lsp.2006.884895"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1109\/lsp.2010.2046930"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1109\/lsp.2008.2001984"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1109\/tcsvt.2009.2020257"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1109\/tifs.2009.2035975"},{"doi-asserted-by":"publisher","key":"19","DOI":"10.1016\/j.jss.2013.06.055"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1016\/j.jss.2013.05.077"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1109\/tip.2014.2307482"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1109\/tip.2014.2302681"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1109\/tifs.2015.2444354"},{"doi-asserted-by":"publisher","key":"24","DOI":"10.1016\/j.optcom.2011.09.005"},{"doi-asserted-by":"publisher","key":"25","DOI":"10.1109\/tifs.2013.2261062"},{"doi-asserted-by":"publisher","key":"26","DOI":"10.1016\/j.sigpro.2012.05.034"},{"doi-asserted-by":"publisher","key":"27","DOI":"10.1109\/tip.2013.2281422"},{"doi-asserted-by":"publisher","key":"28","DOI":"10.1109\/tip.2016.2549458"},{"doi-asserted-by":"publisher","key":"29","DOI":"10.1109\/tip.2011.2150233"},{"doi-asserted-by":"publisher","key":"30","DOI":"10.1016\/j.jvcir.2016.05.005"},{"doi-asserted-by":"publisher","key":"31","DOI":"10.1016\/j.ins.2018.04.088"},{"doi-asserted-by":"publisher","key":"32","DOI":"10.1109\/tmm.2020.2982042"},{"doi-asserted-by":"publisher","key":"33","DOI":"10.1016\/j.dsp.2013.11.002"},{"doi-asserted-by":"publisher","key":"34","DOI":"10.1016\/j.sigpro.2012.07.025"},{"doi-asserted-by":"publisher","key":"35","DOI":"10.1016\/j.ins.2019.03.032"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2022\/2051058.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2022\/2051058.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2022\/2051058.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T23:35:13Z","timestamp":1643672113000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2022\/2051058\/"}},"subtitle":[],"editor":[{"given":"Mohamed Amine","family":"Ferrag","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2022,1,31]]},"references-count":35,"alternative-id":["2051058","2051058"],"URL":"https:\/\/doi.org\/10.1155\/2022\/2051058","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2022,1,31]]}}}