Analysis of Reversible Watermarking using Image Compression and Histogram Shifting

Meghana Daware, Navnath Chine, Babasaheb Thombare

Abstract


In this paper, we propose new reversible watermarking technique which is for data hiding. This data hiding enables embedding of messages in a host image without any loss of host content, which is proposed for image authentication that if the watermarked image is deemed authentic, we can revert it to the exact copy of the original image before the embedding occurred. Our first contribution is towards the modulation of the Histogram Shifting on image contents with compression of image. we present an improved histogram-based reversible data hiding technique based on pixel prediction and sorting. A rhombus pixel prediction is employed to explore the prediction for histogram-based embedding. Sorting the prediction has a good effect on increasing the embedding capacity. The second contribution is to hide data into textured area of the image. To achieve large hiding capacity we used characteristics of the pixel difference by keeping low distortion. The proposed scheme which derives a two-stage embedding strategy to solve the problem about communicating peak points. We also present a histogram shifting technique to prevent overflow and underflow. In this way, the watermark embedder and extractor synchronized for message extraction and image reconstruction.


Full Text:

PDF

References


M. Van der Veen, F. Bruekers, A. Van Leest, and S. Cavin, “High capacity reversible watermarking for audio,” In Proc. of the SPIE, Security and Watermarking of Multimedia Contents V, vol. 5020, Santa Clara CA, Jan.2003, pp. 1-11. Article (CrossRef Link).

M. Van der Veen, F. Bruekers, A. Van Leest, and S. Cavin, “High capacity reversible watermarking for audio,” In Proc. of the SPIE, Security and Watermarking of Multimedia Contents V, vol. 5020, Santa Clara CA, Jan. 2003, pp. 1-11. Article (CrossRef Link).

D. Rui and J. Fridrich, “Lossless authentication of MPEG-2 video,” In Proc. of IEEE International Conference on Image Processing, vol. 2, Rochester, NY, 2002, pp. 893-896. Article (CrossRef Link).

J. Dittmann and O. Benedens, “Invertible authentication for 3D meshes,” In Proc. of the SPIE, Security and Watermarking of Multimedia Contents V, vol.

, Santa Clara CA, Jan. 2003, pp. 653-664. Article (CrossRef Link).

C. C. Chang, W. L. Tai, and C. C. Lin, “A reversible data hiding schem based on side match vector quantization,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 10, pp. 1301-1308, Oct. 2006. Article (CrossRef Link).

M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, “Lossless generalized- LSB data embedding,” IEEE Transactions on Image Processing, vol. 14, no. 2, pp. 253-266, Feb. 2005. Article (CrossRef Link).

M. U. Celik, G. Sharma, and A. M. Tekalp, “Lossless watermarking for image authentication: a new framework and an implementation,” IEEE Transactions on Image Processing, vol. 15, no. 4, 1042-1049, Apr. 2006. Article (CrossRef Link).

J. Tian, “Reversible data embedding using a difference expansion,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 890-896, Aug. 2003. Article (CrossRef Link).

A. M. Alattar, “Reversible watermark using the difference expansion of a generalized integer transform,” IEEE Transactions on Image Processing, vol. 13, no. 8, pp. 1147-1156, Aug. 2004.

L. Kamstra and H. J. A. M. Heijmans, “Reversible data embedding into images using wavelet techniques and sorting,” IEEE Transactions on Image Processing, vol. 14, no. 12, pp. 2082-2090, Dec. 2005. Article (CrossRef Link).

D. M. Thodi and J. J. Rodríguez, “Expansion embedding techniques for reversible watermarking,” IEEE Transactions on Image Processing, vol. 16, no. 3, pp. 721-730, Mar. 2007. Article (CrossRef Link).

Y. Hu, H. K. Lee, and J. Li, “DE-based reversible data hiding with improved overflow location map,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 19, no. 2, pp. 250-260, Feb. 2009.


Refbacks

  • There are currently no refbacks.


Copyright © IJETT, International Journal on Emerging Trends in Technology