DOI QR코드

DOI QR Code

High-Quality and Robust Reversible Data Hiding by Coefficient Shifting Algorithm

  • Yang, Ching-Yu (Department of Computer Science and Information Engineering, National Penghu University of Science and Technology) ;
  • Lin, Chih-Hung (Graduate Institute of Mathematics and Science Education, National Chiayi University)
  • Received : 2011.05.23
  • Accepted : 2011.11.18
  • Published : 2012.06.01

Abstract

This study presents two reversible data hiding schemes based on the coefficient shifting (CS) algorithm. The first scheme uses the CS algorithm with a mean predictor in the spatial domain to provide a large payload while minimizing distortion. To guard against manipulations, the second scheme uses a robust version of the CS algorithm with feature embedding implemented in the integer wavelet transform domain. Simulations demonstrate that both the payload and peak signal-to-noise ratio generated by the CS algorithm with a mean predictor are better than those generated by existing techniques. In addition, the marked images generated by the variant of the CS algorithm are robust to various manipulations created by JPEG2000 compression, JPEG compression, noise additions, (edge) sharpening, low-pass filtering, bit truncation, brightness, contrast, (color) quantization, winding, zigzag and poster edge distortion, and inversion.

Keywords

References

  1. F.Y. Shih, Digital Watermarking and Steganography: Fundamentals and Techniques, Boca Raton, FL: CRC Press, 2008.
  2. I.J. Cox et al., Digital Watermarking and Steganography, 2nd ed., Burlington, MA: Morgan Kaufmann, 2008.
  3. Z.G. Qu et al., "Novel Quantum Steganography with Large Payload," Optics Commun., vol. 283, no. 13, 2010, pp. 4782-4786.
  4. S. Wang, B. Yang, and X. Niu, "A Secure Steganography Method Based on Genetic Algorithm," J. Inf. Hiding Multimedia Signal Process., vol. 1, no. 1, 2010, pp. 28-35.
  5. K. Yamamoto and M. Iwakiri, "Real-Time Audio Watermarking Based on Characteristics of PCM in Digital Instrument," J. Inf. Hiding Multimedia Signal Process., vol. 1, no. 2, 2010, pp. 59-71.
  6. C.Y. Yang et al., "A Simple Digital Watermarking by the Adaptive Bit-Labeling Scheme," Int. J. Innovative Computing, Inf. Control, vol. 6, no. 3, 2010, pp. 1401-1410.
  7. J. Tian, "Reversible Data Embedding Using a Difference Expansion," IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, 2003, pp. 890-896. https://doi.org/10.1109/TCSVT.2003.815962
  8. A.M. Alattar, "Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform," IEEE Trans. Image Process., vol. 13, no. 8, 2004, pp. 1147-1156. https://doi.org/10.1109/TIP.2004.828418
  9. D.M. Thodi and J.J. Rodriguez, "Expansion Embedding Techniques for Reversible Watermarking," IEEE Trans. Image Process., vol. 16, no. 3, 2007, pp. 721-730.
  10. K.S. Kim et al., "Reversible Data Hiding Exploiting Spatial Correlation Between Sub-sampled Images," Pattern Recognition, vol. 42, 2009, pp. 3083-3096. https://doi.org/10.1016/j.patcog.2009.04.004
  11. W. Hong, T.S. Chen, and C.W. Shiu, "Reversible Data Hiding for High Quality Images Using Modification of Prediction Error," J. Syst. Software, vol. 82, 2009, pp. 1833-1842. https://doi.org/10.1016/j.jss.2009.05.051
  12. V. Sachnev et al., "Reversible Watermark Algorithm Using Sorting and Prediction," IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 7, 2009, pp. 989-999.
  13. C.F. Lee, H.L. Chen, and H.K. Tso, "Embedding Capacity Raising in Reversible Data Hiding Based on Prediction of Different Expansion," J. Syst. Software, vol. 83, 2010, pp. 1864-1872. https://doi.org/10.1016/j.jss.2010.05.078
  14. X.R. Luo and T.L.Yin, "Reversible Data Hiding Exploiting Variance in Wavelet Coefficients," J. Computer Sci. Technol., vol. 11, no. 1, 2011, pp. 27-33.
  15. C.Y. Yang and W.C. Hu, "High-Performance Reversible Data Hiding with Overflow/Underflow Avoidance," ETRI J., vol. 33, no. 4, Aug. 2011, pp. 580-588. https://doi.org/10.4218/etrij.11.0110.0534
  16. Z. Ni et al., "Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication," IEEE Trans. Circuits Syst. Video Technol., vol. 18, no. 4, 2008, pp. 497-509.
  17. X.T. Zeng, L.D. Ping, and X.Z. Pan, "A Lossless Robust Data Hiding Scheme," Pattern Recognition, vol. 43, 2010, pp. 1656- 1667. https://doi.org/10.1016/j.patcog.2009.09.016
  18. A.R. Calderbank et al., "Wavelet Transforms that Map Integers to Integers," Appl. Computational Harmonics Anal., vol. 5, no. 3, 1998, pp. 332-369. https://doi.org/10.1006/acha.1997.0238

Cited by

  1. Robust Watermarking Scheme Based on Radius Weight Mean and Feature-Embedding Technique vol.35, pp.3, 2012, https://doi.org/10.4218/etrij.13.0112.0480
  2. Robust Reversible Data Hiding for Multispectral Images vol.9, pp.6, 2012, https://doi.org/10.4304/jnw.9.6.1454-1463
  3. Discrete Multiwavelet-Based Video Watermarking Scheme Using SURF vol.37, pp.3, 2012, https://doi.org/10.4218/etrij.15.0114.0012
  4. High performance reversible data hiding scheme through multilevel histogram modification in lifting integer wavelet transform vol.77, pp.6, 2018, https://doi.org/10.1007/s11042-017-4622-0