{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T00:44:11Z","timestamp":1760229851661,"version":"build-2065373602"},"reference-count":45,"publisher":"MDPI AG","issue":"13","license":[{"start":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:00:00Z","timestamp":1656374400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The rapid development of internet and social media has driven the great requirement for information sharing and intelligent property protection. Therefore, reversible information embedding theory has marked some approaches for information security. Assuming reversibility, the original and embedded data must be completely restored. In this paper, a high-capacity and multilayer reversible information hiding technique for digital images was presented. First, the integer Haar wavelet transform scheme converted the cover image from the spatial into the frequency domain that was used. Furthermore, we applied dynamic threshold analysis, the parameters of the predicted model, the location map, and the multilayer embedding method to improve the quality of the stego image and restore the cover image. In comparison with current algorithms, the proposed algorithm often had better embedding capacity versus image quality performance.<\/jats:p>","DOI":"10.3390\/s22134872","type":"journal-article","created":{"date-parts":[[2022,6,29]],"date-time":"2022-06-29T01:48:38Z","timestamp":1656467318000},"page":"4872","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Multilayer Reversible Information Hiding with Prediction-Error Expansion and Dynamic Threshold Analysis"],"prefix":"10.3390","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6220-5357","authenticated-orcid":false,"given":"I-Hui","family":"Pan","sequence":"first","affiliation":[{"name":"Air Command and Staff College, National Defense University, Taoyuan 335, Taiwan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ping-Sheng","family":"Huang","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, Ming Chuan University, Taoyuan 333, Taiwan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0272-1712","authenticated-orcid":false,"given":"Te-Jen","family":"Chang","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronic Engineering, Chung-Cheng Institute of Technology, National Defense University, Taoyuan 335, Taiwan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hsiang-Hsiung","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronic Engineering, Chung-Cheng Institute of Technology, National Defense University, Taoyuan 335, Taiwan"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1968","published-online":{"date-parts":[[2022,6,28]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Lin, Y.-H., Hsia, C.-H., Chen, B.-Y., and Chen, Y.-Y. (2019). Visual IoT Security: Data Hiding in AMBTC Images Using Block-Wise Embedding Strategy. Sensors, 19.","DOI":"10.3390\/s19091974"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"3582","DOI":"10.1016\/j.patcog.2008.05.015","article-title":"Multilevel Reversible Data Hiding Based on Histogram Modification of Difference Images","volume":"41","author":"Lin","year":"2008","journal-title":"Pattern Recognit."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","article-title":"Reversible Data Embedding Using a Difference Expansion","volume":"13","author":"Tian","year":"2003","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1147","DOI":"10.1109\/TIP.2004.828418","article-title":"Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform","volume":"13","author":"Alattar","year":"2004","journal-title":"IEEE Trans. Image Process"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"2353","DOI":"10.1109\/TCSVT.2019.2963393","article-title":"Fully Homomorphic Encryption Encapsulated Difference Expansion for Reversible Data Hiding in Encrypted Domain","volume":"30","author":"Ke","year":"2020","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.sigpro.2017.02.001","article-title":"Multiple Layer Data Hiding Scheme Based on Difference Expansion of Quad","volume":"137","author":"Arham","year":"2017","journal-title":"Signal Process."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","article-title":"Reversible Data Hiding","volume":"16","author":"Ni","year":"2006","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"9717","DOI":"10.3390\/s111009717","article-title":"Authenticity Preservation with Histogram-Based Reversible Data Hiding and Quadtree Concepts","volume":"11","author":"Huang","year":"2011","journal-title":"Sensors"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Yang, C.-Y., and Wu, J.-L. (2021). Two-Bit Embedding Histogram-Prediction-Error Based Reversible Data Hiding for Medical Images with Smooth Area. Computers, 10.","DOI":"10.3390\/computers10110152"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Hou, X., Min, L., and Yang, H. (2018). A Reversible Watermarking Scheme for Vector Maps Based on Multilevel Histogram Modification. Symmetry, 10.","DOI":"10.3390\/sym10090397"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Liu, W.-L., Leng, H.-S., Huang, C.-K., and Chen, D.-C. (2017). A Block-Based Division Reversible Data Hiding Method in Encrypted Images. Symmetry, 9.","DOI":"10.3390\/sym9120308"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Lu, T.-C., Tseng, C.-Y., Huang, S.-W., and Nhan Vo, T. (2018). Pixel-Value-Ordering based Reversible Information Hiding Scheme with Self-Adaptive Threshold Strategy. Symmetry, 10.","DOI":"10.3390\/sym10120764"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"3517","DOI":"10.1007\/s11831-020-09512-3","article-title":"A comprehensive study of reversible data hiding (RDH) schemes based on pixel value ordering (PVO)","volume":"28","author":"Kaur","year":"2020","journal-title":"Arch. Comput. Methods Eng."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1007\/s11045-020-00748-7","article-title":"PVO based reversible data hiding technique for roughly textured images","volume":"32","author":"Kaur","year":"2021","journal-title":"Multidimens. Syst. Signal Process."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1109\/TIP.2004.840686","article-title":"Lossless Generalized-LSB Data Embedding","volume":"14","author":"Celik","year":"2005","journal-title":"IEEE Trans. Image Process."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Faheem, Z.B., Ali, M., Raza, M.A., Arslan, F., Ali, J., Masud, M., and Shorfuzzaman, M. (2022). Image Watermarking Scheme Using LSB and Image Gradient. Appl. Sci., 12.","DOI":"10.3390\/app12094202"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Lin, J.-Y., Horng, J.-H., Chang, C.-C., and Li, Y.-H. (2022). Asymmetric Orientation Combination for Reversible and Authenticable Data Hiding of Dual Stego-images. Symmetry, 14.","DOI":"10.3390\/sym14040819"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Chang, C.-C., Su, G.-D., Lin, C.-C., and Li, Y.-H. (2022). Position-Aware Guided Hiding Data Scheme with Reversibility and Adaptivity for Dual Images. Symmetry, 14.","DOI":"10.3390\/sym14030509"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"116696","DOI":"10.1016\/j.image.2022.116696","article-title":"Reversible data hiding in encrypted images without additional information transmission","volume":"105","author":"Yu","year":"2022","journal-title":"Signal Process. Image Commun."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Motomura, R., Imaizumi, S., and Kiya, H. (2021). A Reversible Data Hiding Method in Encrypted Images for Controlling Trade-Off between Hiding Capacity and Compression Efficiency. J. Imaging, 7.","DOI":"10.3390\/jimaging7120268"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Khanam, F.-T.-Z., and Kim, S. (2017). Enhanced Joint and Separable Reversible Data Hiding in Encrypted Images with High Payload. Symmetry, 9.","DOI":"10.3390\/sym9040050"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Fragoso-Navarro, E., Cedillo-Hernandez, M., Garcia-Ugalde, F., and Morelos-Zaragoza, R. (2022). Reversible Data Hiding with a New Local Contrast Enhancement Approach. Mathematics, 10.","DOI":"10.3390\/math10050841"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Lin, C.-C., Nguyen, T.-S., and Chang, C.-C. (2021). LRW-CRDB: Lossless Robust Watermarking Scheme for Categorical Relational Databases. Symmetry, 13.","DOI":"10.3390\/sym13112191"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Lin, J.-Y., Horng, J.-H., and Chang, C.-C. (2021). A Novel (2, 3)-Threshold Reversible Secret Image Sharing Scheme Based on Optimized Crystal-Lattice Matrix. Symmetry, 13.","DOI":"10.3390\/sym13112063"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Aryal, A., Imaizumi, S., Horiuchi, T., and Kiya, H. (2018). Integrated Model of Image Protection Techniques. J. Imaging., 4.","DOI":"10.3390\/jimaging4010001"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1109\/TIP.2006.891046","article-title":"Expansion Embedding Techniques for Reversible Watermarking","volume":"16","author":"Thodi","year":"2007","journal-title":"IEEE Trans. Image Process."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Hung, C.-C., Lin, C.-C., Wu, H.-C., and Lin, C.-W. (2022). A Study on Reversible Data Hiding Technique Based on Three-Dimensional Prediction-Error Histogram Modification and a Multilayer Perceptron. Appl. Sci., 12.","DOI":"10.3390\/app12052502"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Cai, S., Li, X., Liu, J., and Guo, Z. (2016, January 25\u201328). A new reversible data hiding scheme exploiting high-dimensional prediction-error histogram. Proceedings of the IEEE International Conference on Image Processing (ICIP\u201916), Phoenix, AZ, USA.","DOI":"10.1109\/ICIP.2016.7532856"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"5010","DOI":"10.1109\/TIP.2013.2281422","article-title":"Pairwise prediction-error expansion for efficient reversible data hiding","volume":"22","author":"Ou","year":"2013","journal-title":"IEEE Trans. Image Process."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"35289","DOI":"10.1007\/s11042-019-07962-x","article-title":"Three-dimensional prediction-error histograms based reversible data hiding algorithm for color images. Multimed","volume":"78","author":"Zhan","year":"2019","journal-title":"Tools Appl."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"5263","DOI":"10.1007\/s11042-017-4430-6","article-title":"Reversible data hiding for 3D mesh models with three-dimensional prediction-error histogram modification","volume":"77","author":"Jiang","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1016\/j.sigpro.2012.07.025","article-title":"High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion","volume":"93","author":"Li","year":"2013","journal-title":"Signal Process."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Aljuaid, H., and Parah, S.A. (2021). Secure Patient Data Transfer Using Information Embedding and Hyperchaos. Sensors, 21.","DOI":"10.3390\/s21010282"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Kaw, J.A., Gull, S., and Parah, S.A. (2022). SVIoT: A Secure Visual-IoT Framework for Smart Healthcare. Sensors, 22.","DOI":"10.3390\/s22051773"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"1500","DOI":"10.1109\/TMM.2008.2007341","article-title":"Difference Expansion Based Reversible Data Hiding Using Two Embedding Directions","volume":"10","author":"Hu","year":"2008","journal-title":"IEEE Trans. Multimed."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"2082","DOI":"10.1109\/TIP.2005.859373","article-title":"Reversible data embedding into images using wavelet techniques and sorting","volume":"14","author":"Kamstra","year":"2005","journal-title":"IEEE Trans. Image Process."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"103203","DOI":"10.1016\/j.jvcir.2021.103203","article-title":"Privacy-preserving Reversible Data Hiding Based on Quad-tree Block Encoding and Integer Wavelet Transform","volume":"79","author":"Wang","year":"2021","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"2347","DOI":"10.1016\/j.patcog.2007.12.009","article-title":"Lossless data hiding for color images based on block truncation coding","volume":"41","author":"Chang","year":"2008","journal-title":"Pattern Recognit."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1016\/j.jss.2008.07.008","article-title":"A HDWT-based Reversible Data Hiding Method","volume":"82","author":"Chan","year":"2009","journal-title":"J. Syst. Softw."},{"key":"ref_40","first-page":"571","article-title":"Reversible Watermarking Algorithm Based on Embedding Pixel Dependence","volume":"13","author":"Hsu","year":"2012","journal-title":"J. Internet Technol."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"456","DOI":"10.1109\/TIFS.2008.924600","article-title":"A Novel Difference Expansion Transform for Reversible Data Embedding","volume":"3","author":"Kim","year":"2008","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_42","first-page":"250","article-title":"DE-Based Reversible Data Hiding with Improved Overflow Location Map","volume":"2","author":"Hu","year":"2009","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"2286","DOI":"10.1016\/j.ins.2010.01.034","article-title":"A High Payload Frequency-based Reversible Image Hiding Method","volume":"180","author":"Chang","year":"2009","journal-title":"Inf. Sci."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"2653","DOI":"10.1016\/j.jss.2010.08.047","article-title":"A Local Variance-controlled Reversible Data Hiding Method Using Prediction and Histogram-shifting","volume":"83","author":"Hong","year":"2010","journal-title":"J. Syst. Softw."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1109\/TIFS.2009.2035975","article-title":"Reversible Image Watermarking Using Interpolation Technique","volume":"5","author":"Luo","year":"2010","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/13\/4872\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T23:39:35Z","timestamp":1760139575000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/13\/4872"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,28]]},"references-count":45,"journal-issue":{"issue":"13","published-online":{"date-parts":[[2022,7]]}},"alternative-id":["s22134872"],"URL":"https:\/\/doi.org\/10.3390\/s22134872","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2022,6,28]]}}}