scispace - formally typeset
Search or ask a question

Reversible Watermarking by Difference Expansion

TL;DR: A high capacity and high quality reversible watermarking method based on difference expansion that does not need to compress original values of the embedding area and explores the redundancy in the digital content to achieve reversibility.
Abstract: Reversible watermark has drawn lots of interest recently. Different from other types of digital watermarks, a reversible watermark has a special feature that the original digital content can be completely restored. In this paper we describe a high capacity and high quality reversible watermarking method based on difference expansion. A noticeable difference between our method and others is that we do not need to compress original values of the embedding area. We explore the redundancy in the digital content to achieve reversibility.
Citations
More filters
Book
24 Oct 2001
TL;DR: Digital Watermarking covers the crucial research findings in the field and explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied.
Abstract: Digital watermarking is a key ingredient to copyright protection. It provides a solution to illegal copying of digital material and has many other useful applications such as broadcast monitoring and the recording of electronic transactions. Now, for the first time, there is a book that focuses exclusively on this exciting technology. Digital Watermarking covers the crucial research findings in the field: it explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied. As a result, additional groundwork is laid for future developments in this field, helping the reader understand and anticipate new approaches and applications.

2,849 citations

Journal ArticleDOI
TL;DR: The redundancy in digital images is explored to achieve very high embedding capacity, and keep the distortion low, in a novel reversible data-embedding method for digital images.
Abstract: Reversible data embedding has drawn lots of interest recently Being reversible, the original digital content can be completely restored We present a novel reversible data-embedding method for digital images We explore the redundancy in digital images to achieve very high embedding capacity, and keep the distortion low

2,739 citations


Cites background from "Reversible Watermarking by Differen..."

  • ...…© 2003 IEEE original values in the embedding area) is larger than that of the embedding area, techniques in [1], [7]–[9] rely on lossless data compression on the original values in the embedding area, and the space saved from compression will be used for embedding the payload....

    [...]

Journal ArticleDOI
TL;DR: Results indicate that the spatial, quad-based algorithm developed for color images allows for hiding the largest payload at the highest signal-to-noise ratio.
Abstract: A reversible watermarking algorithm with very high data-hiding capacity has been developed for color images. The algorithm allows the watermarking process to be reversed, which restores the exact original image. The algorithm hides several bits in the difference expansion of vectors of adjacent pixels. The required general reversible integer transform and the necessary conditions to avoid underflow and overflow are derived for any vector of arbitrary length. Also, the potential payload size that can be embedded into a host image is discussed, and a feedback system for controlling this size is developed. In addition, to maximize the amount of data that can be hidden into an image, the embedding algorithm can be applied recursively across the color components. Simulation results using spatial triplets, spatial quads, cross-color triplets, and cross-color quads are presented and compared with the existing reversible watermarking algorithms. These results indicate that the spatial, quad-based algorithm allows for hiding the largest payload at the highest signal-to-noise ratio.

1,149 citations


Cites background or methods from "Reversible Watermarking by Differen..."

  • ...It should be mentioned here that the difference expansion transform used by Tian [11] is a special case of the above transform and can be obtained by setting and ....

    [...]

  • ...His algorithm first quantizes each pixel by a quantizer of step size, compresses the quantization noise and appends a payload to it, then adds an -ary representation of the result to the quantized image....

    [...]

Journal ArticleDOI
TL;DR: This paper proposes a new reversible method based on MSB (most significant bit) prediction with a very high capacity, which is better than current state of the art methods, both in terms of reconstructed image quality and embedding capacity.
Abstract: Reversible data hiding in encrypted images (RDHEI) is an effective technique to embed data in the encrypted domain. An original image is encrypted with a secret key and during or after its transmission, it is possible to embed additional information in the encrypted image, without knowing the encryp-tion key or the original content of the image. During the decoding process, the secret message can be extracted and the original image can be reconstructed. In the last few years, RDHEI has started to draw research interest. Indeed, with the development of cloud computing, data privacy has become a real issue. However, none of the existing methods allow us to hide a large amount of information in a reversible manner. In this paper, we propose a new reversible method based on MSB (most significant bit) prediction with a very high capacity. We present two approaches, these are: high capacity reversible data hiding approach with correction of prediction errors and high capacity reversible data hiding approach with embedded prediction errors. With this method, regardless of the approach used, our results are better than those obtained with current state of the art methods, both in terms of reconstructed image quality and embedding capacity.

258 citations


Cites methods from "Reversible Watermarking by Differen..."

  • ...Methods are based on lossless compression appending, difference expansion [23], [24], histogram shifting [5], [15], [22] or a combination of these schemes [16], [21]....

    [...]

Journal ArticleDOI
TL;DR: A survey and a comparison of emerging techniques for image authentication, that is strict or selective authentication, tamper detection, localization and reconstruction capabilities and robustness against different desired image processing operations are presented.
Abstract: Image authentication techniques have recently gained great attention due to its importance for a large number of multimedia applications. Digital images are increasingly transmitted over non-secure channels such as the Internet. Therefore, military, medical and quality control images must be protected against attempts to manipulate them; such manipulations could tamper the decisions based on these images. To protect the authenticity of multimedia images, several approaches have been proposed. These approaches include conventional cryptography, fragile and semi-fragile watermarking and digital signatures that are based on the image content. The aim of this paper is to present a survey and a comparison of emerging techniques for image authentication. Methods are classified according to the service they provide, that is strict or selective authentication, tamper detection, localization and reconstruction capabilities and robustness against different desired image processing operations. Furthermore, we introduce the concept of image content and discuss the most important requirements for an effective image authentication system design. Different algorithms are described and we focus on their comparison according to the properties cited above.

180 citations


Cites background from "Reversible Watermarking by Differen..."

  • ...Problem of couple integrity (Image/ Signature) DCT coefficients [112,114,116,120] Moments [145] DWT coefficients [124-125,131-139] Histograms [99] Edges [102103,110] Statistics [140-144]...

    [...]

  • ...Interested readers could consult references [34, 40, 64, 133] on this subject....

    [...]

References
More filters
Proceedings ArticleDOI
10 Dec 2002
TL;DR: A prediction-based conditional entropy coder which utilizes static portions of the host as side-information improves the compression efficiency, and thus the lossless data embedding capacity.
Abstract: We present a novel reversible (lossless) data hiding (embedding) technique, which enables the exact recovery of the original host signal upon extraction of the embedded information. A generalization of the well-known LSB (least significant bit) modification is proposed as the data embedding method, which introduces additional operating points on the capacity-distortion curve. Lossless recovery of the original is achieved by compressing portions of the signal that are susceptible to embedding distortion, and transmitting these compressed descriptions as a part of the embedded payload. A prediction-based conditional entropy coder which utilizes static portions of the host as side-information improves the compression efficiency, and thus the lossless data embedding capacity.

1,126 citations


"Reversible Watermarking by Differen..." refers background in this paper

  • ...As the amount of information needed to be embedded (payload and original values in the embedding area) is larger than that of the embedding area, most reversible watermarking techniques [1, 2, 3, 6] rely on lossless data compression on the original values in the embedding area, and the space saved from compression will be used for embedding the payload....

    [...]

  • ...Reversible watermarking [1, 2, 3, 4, 6, 7, 8], is a special digital watermark with an intriguing feature that when watermarked content has been authenticated, one can remove the watermark to retrieve the original, unwatermarked content....

    [...]

Patent
26 May 1999
TL;DR: Arbitrary digital information is embedded within a stream of digital data, in a way that avoids detection by a casual observer and that allows a user to determine whether the digital data have been modified from their intended form.
Abstract: Arbitrary digital information is embedded within a stream of digital data, in a way that avoids detection by a casual observer and that allows a user to determine whether the digital data have been modified from their intended form. The embedded information may only be extracted as authorized and may be used to verify that the original digital data stream has not been modified.

982 citations

Journal ArticleDOI
TL;DR: This paper introduces a new paradigm for data embedding in images (lossless dataembedding) that has the property that the distortion due to embedding can be completely removed from the watermarked image after the embedded data has been extracted.
Abstract: One common drawback of virtually all current data embedding methods is the fact that the original image is inevitably distorted due to data embedding itself. This distortion typically cannot be removed completely due to quantization, bit-replacement, or truncation at the grayscales 0 and 255. Although the distortion is often quite small and perceptual models are used to minimize its visibility, the distortion may not be acceptable for medical imagery (for legal reasons) or for military images inspected under nonstandard viewing conditions (after enhancement or extreme zoom). In this paper, we introduce a new paradigm for data embedding in images (lossless data embedding) that has the property that the distortion due to embedding can be completely removed from the watermarked image after the embedded data has been extracted. We present lossless embedding methods for the uncompressed formats (BMP, TIFF) and for the JPEG format. We also show how the concept of lossless data embedding can be used as a powerful tool to achieve a variety of nontrivial tasks, including lossless authentication using fragile watermarks, steganalysis of LSB embedding, and distortion-free robust watermarking.

702 citations


"Reversible Watermarking by Differen..." refers background in this paper

  • ...As the amount of information needed to be embedded (payload and original values in the embedding area) is larger than that of the embedding area, most reversible watermarking techniques [1, 2, 3, 6] rely on lossless data compression on the original values in the embedding area, and the space saved from compression will be used for embedding the payload....

    [...]

  • ...Reversible watermarking [1, 2, 3, 4, 6, 7, 8], is a special digital watermark with an intriguing feature that when watermarked content has been authenticated, one can remove the watermark to retrieve the original, unwatermarked content....

    [...]

Patent
07 May 1998
TL;DR: In this paper, a method and system embeds digital meta-data into an original image in such a way that the meta data can be completely removed at a later time to allow loss less recovery of the original image.
Abstract: The method and system embeds digital meta-data into an original image in such a way that the meta-data can be completely removed at a later time to allow loss less recovery of the original image. The loss less recovery of the original image allows for a digital signature of the image to be embedded in the image itself and later recovered and used to verify the authenticity of a received image.

472 citations

Journal ArticleDOI
TL;DR: The Joint Bi-Level Image Experts Group (JBIG), an international study group affiliated with ISO/IEC and ITU-T, is in the process of drafting a new standard for lossy and lossless compression of bilevel images, informally referred to as JBIG2, which will support model-based coding for text and halftones to permit compression ratios up to three times those of existing standards for Lossless compression.
Abstract: The Joint Bi-Level Image Experts Group (JBIG), an international study group affiliated with ISO/IEC and ITU-T, is in the process of drafting a new standard for lossy and lossless compression of bilevel images. The new standard, informally referred to as JBIG2, will support model-based coding for text and halftones to permit compression ratios up to three times those of existing standards for lossless compression. JBIG2 will also permit lossy preprocessing without specifying how it is to be done, In this case, compression ratios up to eight times those of existing standards may be obtained with imperceptible loss of quality. It is expected that JBIG2 will become an international standard by 2000.

273 citations


"Reversible Watermarking by Differen..." refers methods in this paper

  • ...The location map (a one-bit bitmap) will be lossless compressed by a JBIG2 compression [5] or run-length coding....

    [...]