Prediction-error expansion (PEE) is the most successful reversible data hiding (RDH) technique, and existing PEE-based RDH methods are mainly based on the modification of one- or two-dimensional ...prediction-error histogram (PEH). The two-dimensional PEH-based methods perform generally better than those based on one-dimensional PEH; however, their performance is still unsatisfactory since the PEH modification manner is fixed and independent of image content. In this paper, we propose a new RDH method based on PEE for multiple histograms. Unlike the previous methods, we consider in this paper a sequence of histograms and devise a new embedding mechanism based on multiple histograms modification (MHM). A complexity measurement is computed for each pixel according to its context, and the pixels with a given complexity are collected together to generate a PEH. By varying the complexity to cover the whole image, a sequence of histograms can be generated. Then, two expansion bins are selected in each generated histogram and data embedding is realized based on MHM. Here, the expansion bins are adaptively selected considering the image content such that the embedding distortion is minimized. With such selected expansion bins, the proposed MHM-based RDH method works well. Experimental results show that the proposed method outperforms the conventional PEE and its miscellaneous extensions including both one- or two-dimensional PEH-based ones.
A novel reversible data hiding technique in encrypted images is presented in this paper. Instead of embedding data in encrypted images directly, some pixels are estimated before encryption so that ...additional data can be embedded in the estimating errors. A benchmark encryption algorithm (e.g. AES) is applied to the rest pixels of the image and a special encryption scheme is designed to encrypt the estimating errors. Without the encryption key, one cannot get access to the original image. However, provided with the data hiding key only, he can embed in or extract from the encrypted image additional data without knowledge about the original image. Moreover, the data extraction and image recovery are free of errors for all images. Experiments demonstrate the feasibility and efficiency of the proposed method, especially in aspect of embedding rate versus Peak Signal-to-Noise Ratio (PSNR).
•The proposed method is completely reversible. That is to say, no error happens in data extraction and image recovery step.•The PSNR of decrypted image containing the embedded data is much higher for large payloads.•The extraction and decryption processes are completely independent, which is much more applicable in applications.
Recent advances on adaptive steganography imply that the security of steganography can be improved by exploiting the mutual impact of modifications between adjacent cover elements, such as pixels of ...images, which is called a nonadditive distortion model. In this paper, we propose a framework for nonadditive distortion steganography by defining joint distortion on pixel blocks. To reduce the complexity for minimizing joint distortion, we design a coding method to decompose the joint distortion (abbreviated to DeJoin) into distortion on individual pixels; thus, the message can be efficiently embedded with syndrome-trellis codes. We prove that DeJoin can approach the lower bound of joint distortion. As an example, we define joint distortion according to the principle of synchronizing modification direction and then design steganographic algorithms with DeJoin. The experimental results show that the proposed method outperforms previous nonadditive distortion steganography when resisting the state-of-the-art steganalysis.
Abstract
Membranes with high ion permeability and selectivity are of considerable interest for sustainable water treatment, resource extraction and energy storage. Herein, inspired by K
+
channel of ...streptomyces A (KcsA K
+
), we have constructed cation sieving membranes using MXene nanosheets and Ethylenediaminetetraacetic acid (EDTA) molecules as building blocks. Numerous negatively charged oxygen atoms of EDTA molecules and 6.0 Å two-dimensional (2D) sub-nanochannel of MXene nanosheets enable biomimetic channel size, chemical groups and tunable charge density for the resulting membranes. The membranes show the capability to recognize monovalent/divalent cations, achieving excellent K
+
/Mg
2+
selectivity of 121.2 using mixed salt solution as the feed, which outperforms other reported membranes under similar testing conditions and transcends the current upper limit. Characterization and simulations indicate that the cation recognition effect of EDTA and partial dehydration effects play critical roles in cations selective sieving and increasing the local charge density within the sub-nanochannel significantly improves cation selectivity. Our findings provide a theoretical basis for ions transport in sub-nanochannels and an alternative strategy for design ions separation membranes.
In this paper, based on two-dimensional difference- histogram modification, a novel reversible data hiding (RDH) scheme is proposed by using difference-pair-mapping (DPM). First, by considering each ...pixel-pair and its context, a sequence consisting of pairs of difference values is computed. Then, a two-dimensional difference-histogram is generated by counting the frequency of the resulting difference-pairs. Finally, reversible data embedding is implemented according to a specifically designed DPM. Here, the DPM is an injective mapping defined on difference-pairs. It is a natural extension of expansion embedding and shifting techniques used in current histogram-based RDH methods. By the proposed approach, compared with the conventional one-dimensional difference-histogram and one-dimensional prediction-error-histogram-based RDH methods, the image redundancy can be better exploited and an improved embedding performance is achieved. Moreover, a pixel-pair-selection strategy is also adopted to priorly use the pixel-pairs located in smooth image regions to embed data. This can further enhance the embedding performance. Experimental results demonstrate that the proposed scheme outperforms some state-of-the-art RDH works.
Environmental nanotechnology is considered to play a key role in shaping current environmental engineering and science. Looking at the nanoscale has stimulated the development and use of novel and ...cost-effective technologies for catalytic degradation, adsorptive removal and detection of contaminants as well as other environmental concerns. Polymer-based nanocomposites (PNCs), which incorporate advantages of both nanoparticles and polymers, have received increasing attention in both academia and industry. They present outstanding mechanical properties and compatibility owing to their polymer matrix, the unique physical and chemical properties caused by the unusually large surface area to volume ratios and high interfacial reactivity of the nanofillers. In addition, the composites provide an effective approach to overcome the bottleneck problems of nanoparticles in practice such as separation and reuse. This article gives an overview of PNCs for environment application. A brief summary of the fabrication methods of PNCs is provided, and recent advances on the application of PNC materials for treatment of contaminants, pollutant sensing and detection and green chemistry are highlighted. In addition, the research trends and prospective in the coming future are briefly discussed.
State-of-the-art schemes for reversible data hiding (RDH) usually consist of two steps: first construct a host sequence with a sharp histogram via prediction errors, and then embed messages by ...modifying the histogram with methods, such as difference expansion and histogram shift. In this paper, we focus on the second stage, and propose a histogram modification method for RDH, which embeds the message by recursively utilizing the decompression and compression processes of an entropy coder. We prove that, for independent identically distributed (i.i.d.) gray-scale host signals, the proposed method asymptotically approaches the rate-distortion bound of RDH as long as perfect compression can be realized, i.e., the entropy coder can approach entropy. Therefore, this method establishes the equivalency between reversible data hiding and lossless data compression. Experiments show that this coding method can be used to improve the performance of previous RDH schemes and the improvements are more significant for larger images.
With the popularity of outsourcing data to the cloud, it is vital to protect the privacy of data and enable the cloud server to easily manage the data at the same time. Under such demands, reversible ...data hiding in encrypted images (RDH-EI) attracts more and more researchers' attention. In this paper, we propose a novel framework for RDH-EI based on reversible image transformation (RIT). Different from all previous encryption-based frameworks, in which the ciphertexts may attract the notation of the curious cloud, RIT-based framework allows the user to transform the content of original image into the content of another target image with the same size. The transformed image, that looks like the target image, is used as the "encrypted image," and is outsourced to the cloud. Therefore, the cloud server can easily embed data into the "encrypted image" by any RDH methods for plaintext images. And thus a client-free scheme for RDH-EI can be realized, that is, the data-embedding process executed by the cloud server is irrelevant with the processes of both encryption and decryption. Two RDH methods, including traditional RDH scheme and unified embedding and scrambling scheme, are adopted to embed watermark in the encrypted image, which can satisfy different needs on image quality and large embedding capacity, respectively.
Display omitted
•The nanocomposite HZO-201 was stable under varying solution chemistry.•HZO-201 exhibited preferable phosphate removal over other ubiquitous anions.•Selective sorption mechanism was ...probed and discussed.•HZO-201 could be regenerated for cyclic use with constant efficiency.
In this study, we employed a new nanocomposite adsorbent HZO-201, which featured high stability under varying solution chemistry, for preferable removal of phosphate from synthetic solution and a real effluent. An anion exchange resin (D-201) was employed as the host of HZO-201, where nano-hydrous zirconium oxide (HZO) was encapsulated as the active species. D-201 binds phosphate through nonspecific electrostatic affinity, whereas the loaded HZO nanoparticles capture phosphate through formation of the inner-sphere complexes. Quantitative contribution of both species to phosphate adsorption was predicted based on the double-Langmuir model. Preferable removal of phosphate by HZO-201 was observed in the presence of the competing anions at higher levels (Cl−, NO3−, SO42−, HCO3−). Fixed-bed adsorption indicated that the effective volume capacity of a synthetic water (2.0mg P-PO43−/L) by using HZO-201 was ∼1600BV in the first run (<0.5mg P-PO43−/L), comparable to Fe(III)-based nanocomposite HFO-201 (∼1500BV) and much larger than D-201 (<250BV). The exhausted HZO-201 can be in situ regenerated by using a binary NaOH–NaCl solution for cyclic runs, whether fed with the synthetic solution or real effluent. In general, HZO-201 is a promising alternative to Fe(III)-based adsorbents for trace phosphate removal from effluent particularly at acidic pH.
Reversible data hiding in encrypted domain (RDH-ED) has greatly attracted researchers as the original content can be losslessly reconstructed after the embedded data are extracted, while the content ...owner's privacy remains protected. Most of the existing RDH-ED algorithms are designed for grayscale/color images, which cannot be directly applied to other carriers, such as three-dimensional (3D) meshes. With the rapid development of 3D related applications, 3D models have been widely used on the Internet, which motivated us to design a reliable RDH-ED scheme for 3D meshes. The proposed method maps decimals of the vertex coordinates into integers first, so that a bit-stream encryption technique can be executed. With a data-hiding key, several least-significant bits are operated to embed data. By using the encryption key, a receiver can roughly reconstruct the content of the mesh. According to the data-hiding key, with the aid of spatial correlation in natural mesh models, the embedded data can be successfully extracted and the original mesh can be perfectly recovered. Experiments show that the proposed method has a high data-embedding payload, maintains high values of the decrypted meshes, and has low computational complexity.