{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:44:58Z","timestamp":1767339898033,"version":"build-2065373602"},"reference-count":41,"publisher":"MDPI AG","issue":"6","license":[{"start":{"date-parts":[[2023,6,8]],"date-time":"2023-06-08T00:00:00Z","timestamp":1686182400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Natural Science Foundation of China (NSFC)","award":["62031023"],"award-info":[{"award-number":["62031023"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>As an interesting technique that allows data extraction and image recovery without any loss, reversible data hiding in encrypted images is an area of great concern in the field of information security. In this paper, a new reversible data hiding method with high embedding capacity is proposed based on hybrid prediction and Huffman coding. The combination of two embedding mechanisms is innovatively designed to improve the embedding capacity according to different parts of the original image, i.e., the most significant bit-plane and the remaining seven bit-planes. In the first part of this method, the prediction value of each pixel is obtained by calculating the average value of its two neighboring pixels, and all of the most significant bits can be vacated to accommodate additional data. In the second part, the prediction value of each pixel is calculated using the median edge detector predictor, on which the tag map is built. Then, Huffman coding is used to compress the tag map so that a large amount of vacant space is obtained. Finally, the secret data can be embedded into the vacated space by directly using bit substitution. Compared with some recently reported methods, experimental results and analysis have demonstrated that an original image with high visual symmetry\/quality can be recovered. Also, larger embedding capacity can be achieved, such as 3.3894 bpp and 3.2824 bpp, for BOSSBase and BOWS2 databases, respectively.<\/jats:p>","DOI":"10.3390\/sym15061222","type":"journal-article","created":{"date-parts":[[2023,6,8]],"date-time":"2023-06-08T01:34:32Z","timestamp":1686188072000},"page":"1222","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Reversible Data Hiding in Encrypted Images Based on Hybrid Prediction and Huffman Coding"],"prefix":"10.3390","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1771-1664","authenticated-orcid":false,"given":"Liansheng","family":"Sui","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Xi\u2019an University of Technology, Xi\u2019an 710048, China"},{"name":"Shaanxi Key Laboratory for Network Computing and Security Technology, Xi\u2019an 710048, China"}]},{"given":"Han","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Xi\u2019an University of Technology, Xi\u2019an 710048, China"}]},{"given":"Jie","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Xi\u2019an University of Technology, Xi\u2019an 710048, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2457-5944","authenticated-orcid":false,"given":"Zhaolin","family":"Xiao","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Xi\u2019an University of Technology, Xi\u2019an 710048, China"}]},{"given":"Ailing","family":"Tian","sequence":"additional","affiliation":[{"name":"Shaanxi Province Key Lab of Thin Film Technology and Optical Test, Xi\u2019an Technological University, Xi\u2019an 710048, China"}]}],"member":"1968","published-online":{"date-parts":[[2023,6,8]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1280","DOI":"10.1109\/TSMCB.2009.2037131","article-title":"An analysis of random projection for changeable and privacy-preserving biometric verification","volume":"40","author":"Wang","year":"2010","journal-title":"IEEE Trans. Syst. Man Cybern. B Cybern."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1091","DOI":"10.1109\/TIFS.2013.2261062","article-title":"A novel reversible data hiding scheme based on two-dimensional difference-histogram modification","volume":"8","author":"Li","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Hu, Y.C., Lin, Y.H., Lo, C.C., and Wu, C.M. (2019). Implementation of block-based hierarchical prediction for developing an error-propagation-free reversible data hiding scheme. Symmetry, 11.","DOI":"10.3390\/sym11091146"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Lee, C.F., Shen, J.J., Wu, Y.J., and Agrawal, S. (2020). PVO-based reversible data hiding exploiting two-layer embedding for enhancing image fidelity. Symmetry, 12.","DOI":"10.3390\/sym12071164"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Pang, Z., Li, H., Xiao, Z., and Sui, L. (2023). Reversible data hiding in encrypted images based on an adaptive recognition strategy for blocks. Symmetry, 15.","DOI":"10.3390\/sym15020524"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1109\/TITB.2008.2007199","article-title":"Reversible watermarking for knowledge digest embedding and reliability control in medical images","volume":"13","author":"Coatrieux","year":"2009","journal-title":"IEEE Trans. Inform. Technol. Biomed."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1109\/TIFS.2007.905146","article-title":"Reversible image watermarking based on integer-to-integer wavelet transform","volume":"2","author":"Lee","year":"2007","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"2181","DOI":"10.1109\/TIP.2013.2246179","article-title":"General framework to histogram-shifting-based reversible data hiding","volume":"22","author":"Li","year":"2013","journal-title":"IEEE Trans. Image Process."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"2016","DOI":"10.1109\/TIFS.2015.2444354","article-title":"Efficient reversible data hiding based on multiple histograms modification","volume":"10","author":"Li","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","article-title":"Reversible data hiding","volume":"16","author":"Ni","year":"2006","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1109","DOI":"10.1109\/TCSVT.2012.2224052","article-title":"An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism","volume":"23","author":"Qin","year":"2013","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"5010","DOI":"10.1109\/TIP.2013.2281422","article-title":"Pairwise prediction-error expansion for efficient reversible data hiding","volume":"22","author":"Ou","year":"2013","journal-title":"IEEE Trans. Image Process."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","article-title":"Reversible data embedding using a difference expansion","volume":"13","author":"Tian","year":"2003","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1109\/TIP.2006.891046","article-title":"Expansion embedding techniques for reversible watermarking","volume":"16","author":"Thodi","year":"2007","journal-title":"IEEE Trans. Image Process."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1109\/TIP.2004.840686","article-title":"Lossless generalized-LSB data embedding","volume":"14","author":"Celik","year":"2005","journal-title":"IEEE Trans. Image Process."},{"key":"ref_16","unstructured":"Fridrich, J., and Golian, M. (2002, January 30). Lossless data embedding for all image formats. Proceedings of the IS&T\/SPIE Electronic Imaging, San Jose, CA, USA."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"23903","DOI":"10.1007\/s11042-016-4135-2","article-title":"Reversible data hiding in dual stego-images using frequency-based encoding strategy","volume":"76","author":"Lu","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"5861","DOI":"10.1007\/s11042-014-1894-5","article-title":"Reversible data hiding scheme based on exploiting modification direction with two steganographic images","volume":"74","author":"Qin","year":"2015","journal-title":"Multimed. Tools Appl."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1109\/TCSVT.2015.2416591","article-title":"Secure reversible image data hiding over encrypted domain via key modulation","volume":"26","author":"Zhou","year":"2016","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"2366","DOI":"10.1109\/TCSVT.2020.2990952","article-title":"A high-capacity reversible data hiding in encrypted images employing local difference predictor","volume":"30","author":"Mohammadi","year":"2020","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"61943","DOI":"10.1109\/ACCESS.2021.3072376","article-title":"Reversible data hiding in encrypted images based on block-wise multi-predictor","volume":"9","author":"Zhang","year":"2021","journal-title":"IEEE Access"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Puech, W., Chaumont, M., and Strauss, O. (2008, January 18). A reversible data hiding method for encrypted images. Proceedings of the SPIE: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, Bellingham, WA, USA.","DOI":"10.1117\/12.766754"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","article-title":"Reversible data hiding in encrypted image","volume":"18","author":"Zhang","year":"2011","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"826","DOI":"10.1109\/TIFS.2011.2176120","article-title":"Separable reversible data hiding in encrypted image","volume":"7","author":"Zhang","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1109\/LSP.2012.2187334","article-title":"An improved reversible data hiding in encrypted images using side match","volume":"19","author":"Hong","year":"2012","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.jvcir.2014.12.007","article-title":"Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels","volume":"28","author":"Liao","year":"2015","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1016\/j.ins.2018.07.021","article-title":"Reversible data hiding in encrypted image with separable capability and high embedding capacity","volume":"465","author":"Qin","year":"2018","journal-title":"Inf. Sci."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"76956","DOI":"10.1109\/ACCESS.2018.2882563","article-title":"Separable and error-free reversible data hiding in encrypted image based on two-layer pixel errors","volume":"6","author":"Yu","year":"2018","journal-title":"IEEE Access"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.ins.2019.04.043","article-title":"Effective reversible data hiding in encrypted image with adaptive encoding strategy","volume":"494","author":"Fu","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1929","DOI":"10.1109\/TMM.2019.2952979","article-title":"An improved reversible data hiding in encrypted images using parametric binary tree labeling","volume":"22","author":"Wu","year":"2020","journal-title":"IEEE Trans. Multimed."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1109\/TIFS.2013.2248725","article-title":"Reversible data hiding in encrypted images by reserving room before encryption","volume":"8","author":"Ma","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"1132","DOI":"10.1109\/TCYB.2015.2423678","article-title":"High capacity reversible data hiding in encrypted images by patch-level sparse representation","volume":"46","author":"Cao","year":"2017","journal-title":"IEEE Trans. Cybern."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1016\/j.sigpro.2016.10.017","article-title":"Binary-block embedding for reversible data hiding in encrypted images","volume":"133","author":"Yi","year":"2017","journal-title":"Signal Process."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"62361","DOI":"10.1109\/ACCESS.2019.2916355","article-title":"High-capacity reversible data hiding in encrypted images by bit plane partition and MSB prediction","volume":"7","author":"Wu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Arun, K.R., Neeraj, K., Rajeev, K., Hari, O., Satish, C., and Ki, H.J. (2021). Intra-block correlation based reversible data hiding in encrypted images using parametric binary tree labeling. Symmetry, 13.","DOI":"10.3390\/sym13061072"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Mittal, S., Goyal, S., Aggarwal, S., and Kumar, R. (2023, January 17\u201318). Interpolative AMBTC based reversible data hiding in encrypted images using rhombus mean. Proceedings of the 2023 International Conference on Device Intelligence, Computing and Communication Technologies, Dehradun, India.","DOI":"10.1109\/DICCT56244.2023.10110223"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1670","DOI":"10.1109\/TIFS.2018.2799381","article-title":"An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images","volume":"13","author":"Puteaux","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Puteaux, P., and Puech, W. (2018, January 11\u201313). EPE-based huge-capacity reversible data hiding in encrypted images. Proceedings of the IEEE International Workshop on Information Forensics and Security, Hong Kong, China.","DOI":"10.1109\/WIFS.2018.8630788"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"874","DOI":"10.1109\/TMM.2019.2936314","article-title":"Reversible data hiding in encrypted images based on multi-MSB prediction and Huffman coding","volume":"22","author":"Yin","year":"2020","journal-title":"IEEE Trans. Multimed."},{"key":"ref_40","unstructured":"Bas, P., Filler, T., and Pevny, T. (2011, January 18\u201320). Break our steganographic system-The ins and outs of organizing BOSS. Proceedings of the 13th International Conference, IH 2011, Prague, Czech Republic."},{"key":"ref_41","unstructured":"Bas, P., and Furon, T. (2017, June 20). Image Database of BOWS-2. Available online: http:\/\/bows2.ec-lille.fr\/."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/15\/6\/1222\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T19:50:26Z","timestamp":1760125826000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/15\/6\/1222"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,8]]},"references-count":41,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2023,6]]}},"alternative-id":["sym15061222"],"URL":"https:\/\/doi.org\/10.3390\/sym15061222","relation":{},"ISSN":["2073-8994"],"issn-type":[{"type":"electronic","value":"2073-8994"}],"subject":[],"published":{"date-parts":[[2023,6,8]]}}}