Difference expansion and prediction for high bit-rate reversible data hiding

Size: px
Start display at page:

Download "Difference expansion and prediction for high bit-rate reversible data hiding"

Transcription

1 Difference expansion and prediction for high bit-rate reversible data hiding Giulia Boato Marco Carli Federica Battisti Marco Azzoni Karen Egiazarian

2 Journal of Electronic Imaging 1(3), (Jul Sep 01) Difference expansion and prediction for high bit-rate reversible data hiding Giulia Boato University of Trento Department of Information Engineering and Computer Science Trento 3811, Italy Marco Carli Federica Battisti University of Roma TRE Department of Applied Electronics Roma 00146, Italy Marco Azzoni University of Trento Department of Information Engineering and Computer Science Trento 3811, Italy Karen Egiazarian Tampere University of Technology Department of Signal Processing Tampere 3370, Finland Abstract. Reversible data hiding deals with the insertion of auxiliary information into a host data without causing any permanent degradation to the original signal. In this contribution a high capacity reversible data hiding scheme, based on the classical difference expansion insertion algorithm, is presented. The method exploits a prediction stage, followed by prediction errors modification, both in the spatial domain and in the S-transform domain. Such two step embedding allows us to achieve high embedding capacity while preserving a high image quality, as demonstrated in the experimental results. 01 SPIE and IS&T. [DOI: /1.JEI ] 1 Introduction Digital watermarking schemes are usually adopted for protecting rights of both digital data and their corresponding owners. 1, Such methods invisibly embed a watermark into the data to be protected, thus allowing copyright protection and illegal copies or illegal distributors identification via the embedded information recovery. In particular, classical watermarking applications consist of copy control, broadcast monitoring, fingerprinting, authentication, copyright protection, and access control (see for instance Refs. 3 and 4). This technology can be used also for different purposes, such as multimedia indexing, enrichment, quality assessment, error concealment, and others. In general, the imposed Paper 1196 received Nov. 3, 011; revised manuscript received May 7, 01; accepted for publication Jul. 9, 01; published online Aug. 14, /01/$ SPIE and IS&T requirements are 1. robustness: the hidden data should be detectable after classical signal processing,. imperceptibility: the watermarked signal has to be perceptually similar to the original one, and 3. capacity: the number of bits that can be embedded should be as high as possible. In particular application scenarios (e.g., medical or military) another crucial constraint has to be considered 4. integrity of the recovered signal: the watermarking process has to be invertible, allowing the reconstruction of the original data after the watermark extraction. This last requirement is achieved by the so-called reversible watermarking techniques. Many reversible watermarking algorithms have been proposed in the literature. The main difference among existing schemes lies in the particular method adopted for achieving reversibility. A first class of techniques exploits data compression, which was introduced in Ref. 5 by Fridrich et al. by embedding with the watermark also the lossless compressed original data as well as the corresponding location map. Celik et al. follow this idea in Ref. 6 by presenting a generalized-lsb data hiding method. Xuan et al. 7 propose an algorithm based on integer wavelet transform. Another class of methods is based on histogram shifting. The basic idea to embed the watermark through histogram modification was presented by Ni et al. 8 where the pixel values in the range between peak and zero points are modified. This technique is extended in, Ref. 9, where Hwang et al. propose to use two zero points and one peak point of the histogram as triplets to insert the data, and more Journal of Electronic Imaging Jul Sep 01/Vol. 1(3)

3 recently by Tai et al. 10 Bo et al. 11 and Yoo et al. 1 to extend histogram shifting using small blocks of the image to embed data. A third class of algorithms uses difference expansion to achieve reversibility. The first proposal is due to Tian 13 and embeds the watermark by modifying the difference between a pair of pixels, thus exploiting the redundancy among neighboring pixel values. Following Tian s intuition, many extensions were proposed, which extend this approach to triplets, 14 quads, 15 three-pixel blocks, 16 or n-pixel blocks, 17,18 therefore allowing a reduction of the location map and an increase in both efficiency and capacity. Further modifications are presented in Ref. 19 by Thodi et al. 0 by Kamstra et al. 1 by Hu et al. while novel techniques based on other integer transforms are proposed by Coltuc et al. and by Chen et al. 3 Finally, a new idea based on pixel prediction is elaborated in a set of recent contributions. The median edge detector predictor is used by Thodi et al. 4 by Hong et al. 5 and by Yang et al. 6 while the gradient adjusted prediction is exploited by Fallahpour et al. 7 Kuribayashi et al. 8 apply difference expansion and prediction, while Tsai et al. 9 and Pan et al. 30 apply predictive coding and histogram shifting in the specific domain of medical imaging. In Ref. 31, prediction and histogram shifting are dynamically applied depending on human visual system characteristic while in Refs. 3 to 34, interpolation is used as prediction to calculate the error band. Xuan et al. 35 and Kuo et al. 36 apply error control and histogram shifting to embed data keeping good stego-image quality. Tseng et al. 37 study various predictors, while Hu et al. 38 improve the location map compressibility, Sachnev et al. 39 reduce its size, and Fujiyoshi et al. 40 avoid any image-dependent parameter or location map. In Ref. 41, Yang et al. propose a data hiding technique in both the spatial and frequency domain which seems to be robust against JPEG and JPEG000. In this context, the authors proposed in Ref. 4 to exploit both local dependency and non-local similarity for prediction, by employing block-matching techniques, while in Ref. 43 histogram shifting was combined with a particular prediction exploiting directional differences. In this work a double embedding scheme is proposed, where a prediction stage, followed by prediction errors modification, is applied both 1. in the spatial domain and in. the S-transform domain. The adoption of this multilayer approach allow us to achieve very high capacity while preserving good image quality. A preliminary study on multiresolution approaches was presented in Ref. 44 Recently, high capacity was achieved by in Refs. 45 and 46, which we compare the performances with in the experimental section. The rest of the work is organized as follows: details on the proposed algorithm are given in Sec., while the experimental results are reported in Sec. 4, and finally in Sec. 5 some conclusions are drawn. Embedding As depicted in Fig. 1 the proposed scheme works as follows: the spatial prediction is first applied to the original image and a first embedding is performed exploiting the obtained prediction error. Then, an integer transform is applied to the resulting image, and a novel prediction scheme is applied to the low-and high-frequency subbands. Thus, a second embedding is performed on the prediction errors. Let us detail all steps of the scheme: 1. Prediction is applied to the original image X ¼fx i;j gi, j ¼ 1; :::;n in the spatial domain, thus obtaining ^X as described in Sec..1 and correspondingly the spatial prediction error E sp ¼ X ^X: (1). Embedding via difference expansion into prediction error E sp as detailed in Sec..4: Definition of positions used for embedding and of the corresponding location map (required at the detector side to perform watermark extraction and original image reconstruction). Watermark and overhead information embedding thus defining a new watermarked prediction error E 0 sp. The watermarked image X 0 is defined as follows X 0 ¼ ^X þ E 0 sp: () 3. S-transform is applied to the watermarked image X 0, thus obtaining low-and high-frequency bands L and H, respectively (see details in Sec..). Starting from L, prediction is applied to get ^H and the transform prediction error is calculated as follows E tr ¼ H ^H; (3) as described in Sec Embedding via difference expansion into prediction error E tr defining a new watermarked prediction error Etr, 0 as in step. The watermarked highfrequency band H 0 is defined as follows Fig. 1 Proposed scheme for watermark embedding. Journal of Electronic Imaging Jul Sep 01/Vol. 1(3)

4 H 0 ¼ ^H þ E 0 tr: (4) 5. Finally, the inverse S-transform is applied to L and H 0 to obtain the watermarked image X 0. Let us notice that the watermark and the required overhead information are embedded into two steps ( and 4) and will be denoted as W ¼ðW sp ;W tr Þ..1 Prediction in Spatial Domain The gradient adjust predictor (GAP) 7 considers seven neighbors of the to-be-predicted pixel ^x i;j as follows: d v ¼jx i 1;j x i 1;j 1 jþjx i;j 1 x i;j j þjx iþ1;j 1 x iþ1;j j d h ¼jx i 1;j x i ;j jþjx i;j 1 x i 1;j 1 jþjx i;j 1 x iþ1;j 1 j D ¼ d v d h 8 >< ^x i;j ¼ >: x i;j ¼ x i 1;j þ x i;j 1 if D < 80 x i;j 1 x i;j þx i;j 1 if 80 D < 3 3 x i;j þx i;j 1 4 if 3 D < 8 x i;j if 8 D < 8 3 x i;j þx i 1;j 4 if 8 D < 3 x i;j þx i 1;j if 3 D < 80 x i 1;j if D 80 þ x iþ1;j 1 þ x i 1;j 1 4 This defines ^X ¼f^x i;j gi, j ¼ 1; :::;nand the spatial prediction error E sp ¼ X ^X that will be used for watermark embedding via difference expansion.. S-Transform The S-transform 47 is an invertible time-frequency spectral localization technique often called also integer Haar wavelet transform. Let us consider the image X 0 of size n n. The low-frequency L and the high-frequency H sub-band decomposition of X can be computed as follows: x 0 iþ1;j þ x 0 iþ;j l iþ1;j ¼ : (5) h iþ1;j ¼ x 0 iþ1;j x 0 iþ;j ; (6) where i ¼ 0; :::; n 1, j ¼ 1; :::;nand L ¼fl iþ1;jg while H ¼fh iþ1;j g. The corresponding inverse transformation is given by xiþ1;j 0 ¼ l hiþ1;j þ 1 iþ1;j þ xiþ;j 0 ¼ x0 iþ1;j h iþ1;j: (7) Notice that in this case we are applying the S-transform in the vertical direction. Horizontal decomposition can be performed just by defining L ¼fl j;iþ1 g and H ¼fh j;iþ1 g..3 Prediction in Transform Domain To guarantee the reversibility of the watermarking method, the proposed prediction scheme aims at predicting highfrequency sub-band starting from the low frequency one in a way all required information will be available also at the detection side. The prediction scheme can be summarized as follows. Given the low frequency coefficients we define relative differences Δl iþ1;j ¼ l i;j l iþ1;j ; (8) where i ¼ 1; :::; n 1. Notice that differences can be calculated starting from the second row, thus we impose Δl 1;j ¼ 0. The predicted high-frequency sub-band ^H is estimated as following: ^h iþ1;j ¼ 1 4 l i;j þ 1 8 l iþ1;j 1 l iþ;j þ 1 8 l iþ3;j; (9) where i ¼ 1; :::; n 3 represent the range of coefficients used in the prediction. Notice that this prediction differs from the one presented in Ref. 44 since a new combination of weights is used exploring also second order differences. The prediction error is finally given by e iþ1;j ¼ h iþ1;j ^h iþ1;j þ 1 ; (10) where i ¼ 1; :::; n 3, j ¼ 1; :::;n. This defines the transform prediction error E tr ¼fe iþ1;j g that will be used for watermark embedding via difference expansion..4 Embedding Via Difference Expansion The main idea of difference expansion is to hide information into a set of values, in two slightly different ways according to their characteristics. Once E sp and E tr are defined, the watermark W ¼ðW sp ;W tr Þ insertion is performed by applying Tian s method 13 to E sp and E tr, thus defining the watermarked prediction error Esp 0 and Etr, 0 used in Eqs. () and (4), respectively. For simplicity and coherence with the original Tian s method we describe the process in the transform domain but the same procedure is applied in the spatial domain. In particular, following Eq. (4) Etr 0 is used to define the watermarked values of H 0 (similarly Esp 0 allows to define the watermarked values of X 0 ), which have to satisfy following rules in order to avoid overflow and underflow problems. Indeed, X, X 0, and X 00 values should be bounded in the range ½0; 55Š h 0 iþ1;j þ 1 0 l iþ1;j þ h 0 0 l iþ1;j iþ1;j Since both l and h 0 are integer values jh 0 iþ1;j j ð55 l iþ1;jþ ¼a; jh 0 iþ1;j j l iþ1;j þ 1 ¼ b: 55 55: (11) (1) Now we can define two different types of values in E tr (similarly in E sp ): Journal of Electronic Imaging Jul Sep 01/Vol. 1(3)

5 The error is expandable if for both the watermark entries w m ¼ 0 and w m ¼ 1 jhiþ1;j 0 j¼j^h iþ1;j þ eiþ1;j 0 j minða; bþ: (13) In this case we can perform the embedding of the bit w m of the watermark W by expanding the error and define the watermarked value as follows: e 0 iþ1;j ¼ e iþ1;j þ w m : (14) The error is changeable if for both the watermark entries w m ¼ 0 and w m ¼ 1 jhiþ1;j ^h 0 j¼ eiþ1;j iþ1;j þ þ w m minða; bþ: (15) In this case embedding is performed just by substituting the least significant bit (LSB) of e iþ1;j with the bit w m of the watermark W. Notice that an expandable value is also changeable, as depicted in Fig. (a). Therefore, it can be used in both ways. This property will be exploited in the following subsets definition. Indeed, before embedding error values are partitioned into four sets: E1 which contains all expandable differences with e iþ1;j ¼ 0 or e iþ1;j ¼ 1. E which contains all expandable differences that do not belong to E1 and are used as expandable. E3 which contains all expandable differences that do not belong to E1 and are used as changeable. C which contains all changeable differences that do not belong to E1 or E or E3. NC which contains all non-changeable differences. Embedding is now performed in E1 E and E3 C following the two different rules, expansion and LSB substitution, respectively..5 Overhead Information In order to design a reversible method some information must be sent to the detector: such extra information is composed by original LSB of every error value changed through LSB substitution, and the so-called location map that is used to identify the positions of the bits that have been modified and the particular embedding adopted. The location map is a binary matrix of same size of the original image with value 1 in the position corresponding to differences belonging to E1 E and with value 0 in the position belonging to E3 C NC [see Fig. (a)]. It is worth noticing that a changeable value remains changeable also after embedding, thus it is always distinguishable from a value in NC. This way, during the detection stage it is possible to distinguish places where a bit of mark was introduced, and where not [see Fig. (b)]. The location map is lossless compressed defining the overhead information LM which has to be sent to the detector together with the mark. The compression ratio depends on the applied technique and affects the capacity of the algorithm. For each value of e iþ1;j in E3 and C, LSB values have to be collected since bit insertion change them. Such values are stored into a bit-stream called LSB. Therefore, the complete stream W ¼fW sp ;W tr g which is embedded consists of LM LSB watermark for both W sp and W tr. Thus, the watermark payload size is defined depending on the size of E and on the compression rate of the location map. 3 Detection Let us now describe in detail all phases of the detection process, illustrated also in Fig. 3: 1. The S-transform is applied to the watermarked image X 00, resulting in L and H 0 decomposition.. Starting from L, prediction is applied thus recovering ^H. The modified prediction error is calculated as E 0 tr ¼ H 0 ^H: (16) Since the L sub-band coefficients used for predicting ^H have not been modified (bitwise equal), the predicted ^H is exactly the same as in the embedding phase. Thus, information extracted from Etr 0 is bitwise identical to the one inserted (thanks to the reversibility of the difference expansion method, see for instance Ref. 13). 3. Bit-stream W tr is extracted from Etr 0 from all changeable values. Now from the recovered LM it is possible to differentiate among differences used as expandable E1 E, changeable E3 C, and non-changeable NC. From LSB it is then possible to recover all original LSB values of changeable differences. Finally, the watermark can be extracted and all original values of E tr can be restored. The original highfrequency sub-band H can be recovered by calculating Fig. (a) Distinction between values used as expandable and non-expandable positions within the location map; and (b) distinction between changeable positions and non-changeable positions recognizable at the detector side without any side information. Journal of Electronic Imaging Jul Sep 01/Vol. 1(3)

6 Fig. 3 Proposed scheme for watermark extraction and original image recovery. H ¼ ^H þ E tr : (17) 4. The image X 0 can be restored by computing the inverse S-transform of L and H. 5. Starting from X 0, prediction is applied thus recovering ^X. The modified prediction error is calculated as E 0 sp ¼ X 0 ^X: (18) Sec..3. In Figs. 4 to 7 results are reported for six different well known spatial predictors: GAP, median edge detector (MED), DARK, PAETH, simple average (SA), and previous pixel (DIFF). In all cases (we report here results for four images) GAP gives the best results and this motivates our choice in the algorithm design. Results reported in Figs. 8 to 11 present the detailed performances achieved by the proposed method for four images Also in this case, prediction is defined in order to be reversible: starting from the same input, the predicted set of coefficients will be exactly the same, independently from coefficients modified by the watermak (inserted only into high frequencies), see for instance Ref Bit-stream W sp is extracted from E 0 sp as in step 3 and all original values of E sp can be restored. Finally, the original image X can be recovered by calculating X ¼ ^X þ E sp : (19) Since both extraction steps (3 and 5) are reversible, the whole process can be inverted and the original image bitwise perfectly recovered. 4 Experimental Results To evaluate the effectiveness of the proposed schemes several experimental tests have been performed. The achieved results are reported by considering both capacity (payload of the watermark inserted without considering the overhead information: location map bit-stream LM and LSB of differences used as changeable, as described in Sec..5), measured in bit per pixel (bpp) and quality of the watermarked image measured with different perceptual metrics: PSNR, PSNR-HVS, and PNSR-HVS-M. 48 All tests have been computed on a set of 3 images taken from the GrayScale Set image repository of the University of Waterloo ( and the Tampere Image Database 008 ( info/tid008.htm), considering the gray-scaled version of original images only. Although the reversibility of the exploited techniques is already proved in the literature (see for instance Ref. 7), first of all we have verified that both the original image and the embedded data can be perfectly recovered from the watermarked one, after the hidden information extraction procedure. As far as the spatial prediction is concerned, different types of prediction have been tested and combined with the prediction in the transform domain described in Fig. 4 Spatial predictors performances in terms of PSNR for the Lena image. Fig. 5 Spatial predictors performances in terms of PSNR for the Barbara image. Journal of Electronic Imaging Jul Sep 01/Vol. 1(3)

7 Fig. 6 Spatial predictors performances in terms of PSNR for the Boat image. Fig. 9 Performances of the proposed approach in terms of different perceptual metrics for the Barbara image. Fig. 7 Spatial predictors performances in terms of PSNR for the Goldhill image. Fig. 10 Performances of the proposed approach in terms of different perceptual metrics for the Boat image. Fig. 8 Performances of the proposed approach in terms of different perceptual metrics for the Lena image. Fig. 11 Performances of the proposed approach in terms of different perceptual metrics for the Goldhill image. Journal of Electronic Imaging Jul Sep 01/Vol. 1(3)

8 Table 1 Maximum capacity and corresponding quality of watermarked images for the whole dataset. Image Max payload (bpp) PSNR (db) PSNR-HVS-M (db) PSNR-HVS (db) Zelda Washsat Peppers Mandrill Lena Goldhill Frog France Boat Barb I I I I I I I I I I I I I I I I I I I I I I (due to lack of space) in terms of different quality metrics: PSNR, PSNR-HVS, and PNSR-HVS-M. This way, we do not only have the information about classical PSNR measure of quality but also about state-of-art perceptual quality metrics which allow to better understand the real user evaluation of distortion introduced with the watermark. It is worth noticing that the proposed method allows us to achieve high capacity by keeping the quality of the watermarked images pretty high. With respect to Ref. 45, we achieve better results: for example, for Lena 45 reports 1,70 bpp with 19,60 db of PSNR while we reach a lower maximum capacity (1,47 bpp) but with much higher quality (7,54 db); for Barbara for capacity 1 bpp. 45 gets a PSNR of 18,8 db while we have 6,37 db; for Boat 45 reports 1,56 bpp with 19,5 db while we reach a 1,46 bpp with 7,01 db. As far as Ref. 46 is concerned, the proposed technique achieves very similar results for high-capacity ranges (see for example Lena and Barbara images). Comparison with high-capacity techniques cannot be done in terms of perceptual quality metrics due to the fact that results are usually reported just in terms of PSNR. The maximum capacity achieved and the corresponding perceptual quality of the watermarked image in terms of the three metrics are shown in Table 1 for all 3 tested images. It is evident that the proposed technique allows us to embed a high number of bits for the watermark without impacting too much on the quality of the data. In particular, capacity higher that 1 bpp can be achieved for Mandrill whereas Refs. 45 and 46 present maximum capacity lower than 1 bpp. 5 Conclusions In this work a reversible data hiding method has been presented. It is based on the combination of prediction and difference expansion insertion algorithms and on the use of such combination both in the spatial and in the transform domain. The adoption of a multilayer technique results in high capacity and good image quality as demonstrated in the performed simulations. References 1. I. Cox et al., Digital Watermarking and Steganography, Morgan Kaufmann, Burlington, MA (007).. F. Perez-Gonzales and S. Voloshynovskiy, Fundamentals of Digital Image Watermarking, John Wiley & Sons Inc., Hoboken, NJ (009). 3. B. Furht and D. Kirovski, Multimedia Watermaking Techniques and Application, Taylor & Francis Group, New York, NY (006). 4. G. Boato, F. G. B. De Natale, and C. Fontanari, An improved asymmetric watermarking scheme suitable for copy protection, IEEE Trans. Signal Process. 54(7), (006). 5. J. Fridrich, M. Goljan, and R. Du, Lossless data embedding: new paradigm in digital watermarking, EURASIP J. Appl. Signal Process. 00(), (00). 6. M. U. Celik et al., Lossless generalized LSB data embedding, IEEE Trans. Image Process. 14(), (005). 7. G. Xuan et al., Distortionless data hiding based on integer wavelet trans-form, Electron. Lett. 38(5), (00). 8. Z. Ni et al., Reversible data hiding, IEEE Trans. Circuits Syst. Video Technol. 16(3), (006). 9. J. Hwang, J. Kim, and J. Choi, A reversible watermark-ing based on histogram shifting, in Proc. of International Workshop on Digital Watermarking 006, LNCS, Vol. 483, pp (006). 10. W.-L.- Tai, Reversible data hiding based on histogram modification of pixel differences, IEEE Trans. Circuits Syst. Video Technol. 19(6), (009). 11. X. Bo, Y. Lizhi, and H. Yongfeng, Reversible data hiding using histogram shifting in small blocks, in IEEE International Conference in Communication (ICC), IEEE Content Engineering Publishing Technology, Piscataway, NJ (010). 1. H.-M. Yoo, S.-K. Lee, and J.-W. Suh, High capacity reversible data hiding using the histogram modification of block image, in LNCS Journal of Electronic Imaging Jul Sep 01/Vol. 1(3)

9 Neural Information Processing, IEEE Content Engineering Publishing Technology, Piscataway, NJ (009). 13. J. Tian, Reversible data embedding using a difference expansion, IEEE Trans. Circuits Syst. Video Technol. 13(8), (003). 14. A. M. Alattar, Reversible watermarking using difference expansion of triplets, IEEE International Conference on Image Processing ICIP, Vol. 003, pp (003). 15. A. M. Alattar, Reversible watermarking using difference expansion of quads, IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol. 3, pp , IEEE Content Engineering Publishing Technology, Piscataway, NJ (004). 16. C. C. Lin and N. L. HSueh, A lossless data hiding scheme based on three-pixel block differences, Pattern Recogn. 41(4), (008). 17. A. M. Alattar, Reversible watermarking using the difference expansion of a generalized integer transform, IEEE Trans. Image Process. 13(8), (004). 18. M. Khodaei and K. Faez, Reversible data hiding by using modified difference expansion, in nd International Conference on Signal Processing Systems (ICSPS), IEEE Content Engineering Publishing Technology, Piscataway, NJ (010). 19. D. M. Thodi and J. J. Rodriguez, Prediction-error based reversible watermarking, in Proc. of IEEE International Conference on Image Processing, Vol. 004, pp , IEEE Content Engineering Publishing Technology, Piscataway, NJ (004). 0. L. Kamstra and H. J. A. M. Heijmans, Reversible data embedding into images using wavelet techniques and sorting, IEEE Trans. Image Process. 14(1), (005). 1. Y. Hu et al., Difference expansion based reversible data hiding using two embedding directions, IEEE Trans. Multimed. 10(8), (008).. D. Coltuc and J. M. Chassery, Very fast watermarking by reversible constrast mapping, IEEE Signal Process. Lett. 14(4), (007). 3. X. Chen et al., Reversible image watermarking based on a generalized integer transform, in IEEE International Conference on Acoustics, Speech, and Signal Processing, IEEE Content Engineering Publishing Technology, Piscataway, NJ (010). 4. D. M. Thodi and J. Rodriguez, Expansion embedding techniques for reversible watermarking, IEEE Trans Image Process. 16(3), (007). 5. W. Hong, T. S. Chen, and C. W. Shiu, Reversible data hiding based on histogram shifting of prediction errors, in IEEE International Symposium on Intelligent Information Technology Application Workshops, pp (008). 6. L. Yang, Y. Jing, and S. Wei, Reversible data hiding algorithm based on prediction error, in nd International Asia Conference on Informatics in Control, Automation and Robotics, IEEE Content Engineering Publishing Technology, Piscataway, NJ (010). 7. M. Fallahpour, Reversible image data hiding based on gradient adjusted prediction, IECIE Electron. Express 5(0), (008). 8. M. Kuribayashi, M. Morii, and H. Tanaka, Reversible watermark with large capacity using the predictive coding, IECIE Trans. Fundament. Electron. Commun. Comput. Sci. 7(7), (008). 9. P. Tsai, Y.-C. Hu, and H.-L. Yeh, Reversible image hiding scheme using predictive coding and histogram shifting, Signal Process. 89(6), (009). 30. C. L. Pan et al., Lossless embedding using difference between sub-sampled images, in nd International Conference on Education Technology and Computer (ICETC), IEEE Content Engineering Publishing Technology, Piscataway, NJ (010). 31. S.-W. Jung, L. T. Ha, and S. J. Ko, A new histogram based reversible data hiding algorithm considering the human visual system, IEEE Signal Process. Lett. 18(), (011). 3. L. Luo et al., Reversible image watermarking using interpolation technique, IEEE Trans. Inf. Forensic Security 5(1), (010). 33. C.-H. Yang and M.-H. Tsai, Improving histogram-based reversible data hiding by interleaving predictions, IET Image Process. 4(4), 3 34 (009). 34. Y. Yalman, F. Akar, and I. Erturk, An image interpolation based reversible data hiding method using raweighted coding, in IEEE International Conference on Computational Science and Engineering, IEEE Content Engineering Publishing Technology, Piscataway, NJ (010). 35. G. Xuan et al., Double-threshold reversible data hiding, in IEEE International Symposium on Circuits and Systems (ISCAS), IEEE Content Engineering Publishing Technology, Piscataway, NJ (010). 36. W.-C. Kuo, S.-H. Kuo, and L.-C. Wuu, High embedding reversible data hiding scheme for JPEG, in Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IEEE Content Engineering Publishing Technology, Piscataway, NJ (010). 37. H.-W. Tseng and C.-P. Hsieh, Prediction-based reversible data hiding, Elsevier Inform. Sci. 179(14), (009). 38. Y. Hu, H.-K. Lee, and J. Li, De-based reversible data hiding with improved overflow location map, IEEE Trans. Circuits Syst. Video Technol. 19(), (009). 39. V. Sachnev et al., Reversible watermarking algorithm using sorting and prediction, IEEE Trans. Circuits Syst. Video Technol. 19(7), (009). 40. M. Fujiyoshi, T. Tsuneyoshi, and H. Kiya, A reversibile data hiding method free from location map parameter memorization, in ISCIT, IEEE Content Engineering Publishing Technology, Piscataway, NJ (010). 41. C.-Y. Yang and W.-C. Hu, Reversible data hiding in the spatial and frequency domains, Int. J. Image Process. 3(6), (010). 4. V. Conotter et al., High capacity reversible data hiding based on histogram shifting and non-local means, in IEEE International Workshop on Local and Non-Local Approximation in Image Processing, IEEE Content Engineering Publishing Technology, Piscataway, NJ (009). 43. V. Conotter et al., Near lossless reversible data hiding based on adaptive prediction, in IEEE International Conference on Image Processing, IEEE Content Engineering Publishing Technology, Piscataway, NJ (010). 44. M. Azzoni et al., Reversible watermarking using prediction and difference expansion, in IEEE European Workshop on Visual Information Processing, IEEE Content Engineering Publishing Technology, Piscataway, NJ (010). 45. M. Chaumont and W. Puech, A high capacity reversible watermarking scheme, Proc. SPIE 757, 7571H (009). 46. C. Wang, X. Li, and B. Yang, High capacity reversible image watermarking based on integer transform, in IEEE International Conference on Image Processing, IEEE Content Engineering Publishing Technology, Piscataway, NJ (010). 47. M. D. Adams, F. Kossentini, and R. K. Ward, Generalized S transform, IEEE Trans. Signal Process. 50(11), (00). 48. N. Ponomarenko et al., On between-coefficient contrast masking of DCT basis functions, in Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07 (007). Giulia Boato received the MSc degree in mathematics in 00, and the PhD degree in information and communication technologies in 005, both from the University of Trento, Italy. In 006, she was a visiting researcher at the University of Vigo, Spain, and in 009 and 010 she was a visiting researcher at the Tampere University of Technology, Finland. Currently, she is an assistant professor of telecommunications at the University of Trento, working within the Multimedia Signal Processing and Understanding Laboratory. Her research interests are focused on image and signal processing, with particular attention to multimedia data protection, data hiding, and digital forensics. Marco Carli received the Laurea degree in telecommunication engineering from the University of Rome, La Sapienza, Rome, Italy, in He joined Datamat Systems Engineering Company until Since 1997, he is involved in the European Union international programs in Distance Education. Since 000, he is a visiting researcher with the Image Processing Laboratory directed by S.Mitra, UCSB, University of California, Santa Barbara, California, USA. He currently holds an assistant professor position at the University of Rome, Roma TRE. His research interests are in the area of digital signal and image processing, in multimedia communications, and in security of telecommunication systems. He is an IEEE senior member and a SPIE member; he is a reviewer for many conferences and for IEEE Transactions. Federica Battisti received the MSc degree in electronic engineering in 006, and the PhD degree in telecommunication engineering in 010, from the Università degli Studi Roma TRE, Italy. In 008, she was a visiting researcher in the Groupe Multimedia at Telecom ParisTech, France. In 009, she was a visiting researcher in the signal processing in communications group at the University of Vigo, Spain. Currently, she is an assistant professor in the telecommunication group at Università degli Studi Roma TRE, Italy. Her research interests Journal of Electronic Imaging Jul Sep 01/Vol. 1(3)

10 are focused on image and video processing, with particular attention to data hiding and multimedia quality assessment. Marco Azzoni received the Bachelor degree in telecommunication engineering in 006 and the MSc degree in telecommunication engineering in 010 both from the University of Trento, Italy. From November 010 to December 010 he was a visiting researcher in the signal processing group in the Tampere University of Technology. Karen Egiazarian received the PhD degree from Moscow M. V. Lomonosov State University, Russia, in 1986, and Doctor of Technology degree from Tampere University of Technology (TUT), Finland, in He is a professor of signal processing leading the computational imaging and transforms group at TUT. He has published over 500 refereed journal and conference articles, books, and patents. His main interests are in the field of image and video denoising and compression, transforms, efficient algorithms, and digital logic. He is an associate editor of several journals, including the SPIE Journal of Electronic Imaging and Research Letters in Signal Processing. He is a member of the DSP Technical Committee of the IEEE Circuits and Systems Society and a senior member of the IEEE. Journal of Electronic Imaging Jul Sep 01/Vol. 1(3)

A reversible data hiding based on adaptive prediction technique and histogram shifting

A reversible data hiding based on adaptive prediction technique and histogram shifting A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn

More information

IMPROVED RHOMBUS INTERPOLATION FOR REVERSIBLE WATERMARKING BY DIFFERENCE EXPANSION. Catalin Dragoi, Dinu Coltuc

IMPROVED RHOMBUS INTERPOLATION FOR REVERSIBLE WATERMARKING BY DIFFERENCE EXPANSION. Catalin Dragoi, Dinu Coltuc 0th European Signal Processing Conference (EUSIPCO 01) Bucharest, Romania, August 7-31, 01 IMPROVED RHOMBUS INTERPOLATION FOR REVERSIBLE WATERMARKING BY DIFFERENCE EXPANSION Catalin Dragoi, Dinu Coltuc

More information

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Ruiqi Jiang, Weiming Zhang, Jiajia Xu, Nenghai Yu and Xiaocheng Hu Abstract Recently, a novel reversible data hiding scheme is proposed

More information

An Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility

An Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility An Information Hiding Scheme Based on Pixel- Value-Ordering Prediction-Error Expansion with Reversibility Ching-Chiuan Lin Department of Information Management Overseas Chinese University Taichung, Taiwan

More information

Interleaving Max-Min Difference Histogram Shifting Data Hiding Method

Interleaving Max-Min Difference Histogram Shifting Data Hiding Method JOURNAL OF SOFTWARE, VOL. 5, NO. 6, JUNE 2010 615 Interleaving Max-Min Difference Histogram Shifting Data Hiding Method Hsien-Wei Yang Overseas Chinese University/Department of Information Management,

More information

Literature Survey on Performance of Reversible Data Hiding Algorithm

Literature Survey on Performance of Reversible Data Hiding Algorithm Literature Survey on Performance of Reversible Data Hiding Algorithm Sona Ignacious PG Scholar Department of ECE, PET Engineering College, India Abstract-DATA hiding technique aims to embed some secret

More information

Multilayer Data Embedding Using Reduced Difference Expansion

Multilayer Data Embedding Using Reduced Difference Expansion Multilayer Data Embedding Using Reduced Difference Expansion DINESH SATRE 1, DEVYANI BONDE 2, SUBHASH RATHOD 3 Department Of Computer Engineering Marathwada Mitra Mandal s Institute of Technology Savitribai

More information

Reversible Data Hiding VIA Optimal Code for Image

Reversible Data Hiding VIA Optimal Code for Image Vol. 3, Issue. 3, May - June 2013 pp-1661-1665 ISSN: 2249-6645 Reversible Data Hiding VIA Optimal Code for Image Senthil Rani D. #, Gnana Kumari R. * # PG-Scholar, M.E-CSE, Coimbatore Institute of Engineering

More information

REVERSIBLE DATA HIDING SCHEME BASED ON PREDICTION ERROR SORTING AND DOUBLE PREDICTION.

REVERSIBLE DATA HIDING SCHEME BASED ON PREDICTION ERROR SORTING AND DOUBLE PREDICTION. REVERSIBLE DATA HIDING SCHEME BASED ON PREDICTION ERROR SORTING AND DOUBLE PREDICTION Ling-ling WAN 1,Fan CHEN 1, Hong-jie HE 1,Lei ZHANG 2 1 the School of Information Science and Technology, Southwest

More information

A Novel Reversible Digital Watermark Based on 2D Difference Histogram Pair Mapping

A Novel Reversible Digital Watermark Based on 2D Difference Histogram Pair Mapping A Novel Reversible Digital Watermark Based on 2D Difference Histogram Pair Mapping Anbuchezhiyan S Embedded Systems,Bharath University,Chennai Abstract In this paper, based on two-dimensional difference

More information

Reversible Data Hiding Based on Median Difference Histogram

Reversible Data Hiding Based on Median Difference Histogram JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 27, 577-593 (2011) Reversible Data Hiding Based on Median Difference Histogram HSIEN-WEI YANG 1,2, I-EN LIAO * AND CHAUR-CHIN CHEN + 1 Department of Information

More information

Reversible Blind Watermarking for Medical Images Based on Wavelet Histogram Shifting

Reversible Blind Watermarking for Medical Images Based on Wavelet Histogram Shifting Reversible Blind Watermarking for Medical Images Based on Wavelet Histogram Shifting Hêmin Golpîra 1, Habibollah Danyali 1, 2 1- Department of Electrical Engineering, University of Kurdistan, Sanandaj,

More information

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM 74 CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM Many data embedding methods use procedures that in which the original image is distorted by quite a small

More information

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Rhythm Katira #1, Prof. V. Thanikaiselvan *2 # ECE Department, VIT University Vellore, Tamil-Nadu, India 1 rhythm.katira2009@vit.ac.in

More information

A Reversible Data Hiding Scheme for BTC- Compressed Images

A Reversible Data Hiding Scheme for BTC- Compressed Images IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game

More information

Reversible Watermarking in JPEG Images Based on Modified RZL Codes and Histogram Shift

Reversible Watermarking in JPEG Images Based on Modified RZL Codes and Histogram Shift 203, Vol.8 No.2, 26-32 Article ID 007-202(203)02-026-07 DOI 0.007/s859-03-0904- Reversible Watermarking in JPEG Images Based on Modified RZL Codes and Histogram Shift CHEN Biao, ZHANG Weiming,2, YU Nenghai.

More information

A Novel Reversible Data Hiding Scheme Based on Two-Dimensional Difference-Histogram Modification

A Novel Reversible Data Hiding Scheme Based on Two-Dimensional Difference-Histogram Modification IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 7, JULY 2013 1091 A Novel Reversible Data Hiding Scheme Based on Two-Dimensional Dference-Histogram Modication Xiaolong Li, Weiming

More information

Hierarchical Image Authentication Based on Reversible Data Hiding

Hierarchical Image Authentication Based on Reversible Data Hiding 1 Bull. Soc. Photogr. Imag. Japan. (2014) Vol. 24 No. 1: 1 5 Original Paper Hierarchical Image Authentication Based on Reversible Data Hiding Shoko Imaizumi * and Kanichi Taniguchi * Abstract: In this

More information

REVERSIBLE DATA HIDING SCHEME USING PDE BASED INPAINTING PREDICTOR

REVERSIBLE DATA HIDING SCHEME USING PDE BASED INPAINTING PREDICTOR REVERSIBLE DATA HIDING SCHEME USING PDE BASED INPAINTING PREDICTOR Asha Jose Research Scholar, Department Of CSE, Karpagam University ashajose07@gmail.com Abstract - Data hacking is very challenging problem

More information

Pattern Recognition 41 (2008) Contents lists available at ScienceDirect. Pattern Recognition

Pattern Recognition 41 (2008) Contents lists available at ScienceDirect. Pattern Recognition Pattern Recognition 4 (8) 58 -- 59 Contents lists available at ScienceDirect Pattern Recognition journal homepage: www.elsevier.com/locate/pr Multilevel reversible data hiding based on histogram modification

More information

Improved Reversible Data Hiding in Encrypted Images Based on Reserving Room After Encryption and Pixel Prediction

Improved Reversible Data Hiding in Encrypted Images Based on Reserving Room After Encryption and Pixel Prediction Improved Reversible Data Hiding in Encrypted Images Based on Reserving Room After Encryption and Pixel Prediction Ioan Catalin Dragoi, Henri-George Coanda and Dinu Coltuc Electrical Engineering Dept. Valahia

More information

Error-free Authentication Watermarking Based on Prediction-Error-Expansion Reversible Technique

Error-free Authentication Watermarking Based on Prediction-Error-Expansion Reversible Technique ISSC 2013, LYIT Letterkenny, June 20 21 Error-free Authentication Watermarking Based on Prediction-Error-Expansion Reversible Technique Rongrong Ni,H.D.Cheng, Yao Zhao andyuhou Institute of Information

More information

GA Based Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption

GA Based Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption GA Based Reversible Hiding in Encrypted s by Reserving Room before Encryption Patil K.U. 1 &Nandwalkar B.R. 2 1,2 (Comp. Engg. Dept., GNS COENashik, SPP Univ., Pune(MS), India) Abstract Information Security

More information

A Framework to Reversible Data Hiding Using Histogram-Modification

A Framework to Reversible Data Hiding Using Histogram-Modification A Framework to Reversible Data Hiding Using Histogram-Modification R. Neeraja 1 PG Student, ECE Department Gokula Krishna College of Engineering Sullurpet, India e-mail:r.p.neeru@gmail.com M. Gnana Priya

More information

Image Authentication and Recovery Scheme Based on Watermarking Technique

Image Authentication and Recovery Scheme Based on Watermarking Technique Image Authentication and Recovery Scheme Based on Watermarking Technique KENJI SUMITOMO 1, MARIKO NAKANO 2, HECTOR PEREZ 2 1 Faculty of Information and Computer Engineering The University of Electro-Communications

More information

A New Approach to Compressed Image Steganography Using Wavelet Transform

A New Approach to Compressed Image Steganography Using Wavelet Transform IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 53-59 www.iosrjournals.org A New Approach to Compressed Image Steganography

More information

Data Hiding in Video

Data Hiding in Video Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract

More information

TATIANA EFIMUSHKINA REVERSIBLE DATA HIDING IN DIGITAL IMAGES Master s thesis

TATIANA EFIMUSHKINA REVERSIBLE DATA HIDING IN DIGITAL IMAGES Master s thesis TATIANA EFIMUSHKINA REVERSIBLE DATA HIDING IN DIGITAL IMAGES Master s thesis Examiners: Professor Karen Egiazarian Professor Yevgeni Koucheryavy Professor Moncef Gabbouj Examiners and topic approved by

More information

COMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING

COMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING International Journal of Computer Engineering and Applications, Volume X, Issue VII, July 16 www.ijcea.com ISSN 2321-3469 COMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING Geeta

More information

A New Reversible Watermarking Method. Based on Histogram Shifting

A New Reversible Watermarking Method. Based on Histogram Shifting Applied Mathematical Sciences, Vol. 11, 2017, no. 10, 445-460 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/ams.2017.7116 A New Reversible Watermarking Method Based on Histogram Shifting Kim Sao

More information

Improved Qualitative Color Image Steganography Based on DWT

Improved Qualitative Color Image Steganography Based on DWT Improved Qualitative Color Image Steganography Based on DWT 1 Naresh Goud M, II Arjun Nelikanti I, II M. Tech student I, II Dept. of CSE, I, II Vardhaman College of Eng. Hyderabad, India Muni Sekhar V

More information

A Novel Reversible Data Hiding Technique Based on Pixel Prediction and Histogram Shifting

A Novel Reversible Data Hiding Technique Based on Pixel Prediction and Histogram Shifting Research Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet A Novel

More information

I. Introduction. II Integer-To-Integer Wavelet Transforms

I. Introduction. II Integer-To-Integer Wavelet Transforms Reversible Image Data Hiding Using Lifting Wavelet Transform and Histogram Shifting S. Kurshid Jinna Dr. L. Ganesan Professor, Dept of Computer Science & Engineering Professor, Dept of Computer Science

More information

Robust Image Watermarking based on DCT-DWT- SVD Method

Robust Image Watermarking based on DCT-DWT- SVD Method Robust Image Watermarking based on DCT-DWT- SVD Sneha Jose Rajesh Cherian Roy, PhD. Sreenesh Shashidharan ABSTRACT Hybrid Image watermarking scheme proposed based on Discrete Cosine Transform (DCT)-Discrete

More information

Digital image steganography using LSB substitution, PVD, and EMD

Digital image steganography using LSB substitution, PVD, and EMD Digital image steganography using LSB substitution, PVD, and EMD Anita Pradhan, K. Raja Sekhar, Gandharba Swain* Department of Computer Science and Engineering, K L University, Vaddeswaram-522502, Andhra

More information

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information A Revisit to LSB Substitution Based Data Hiding for Embedding More Information Yanjun Liu 1,, Chin-Chen Chang 1, and Tzu-Yi Chien 2 1 Department of Information Engineering and Computer Science, Feng Chia

More information

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

Region Based Even Odd Watermarking Method With Fuzzy Wavelet Region Based Even Odd Watermarking Method With Fuzzy Wavelet S.Maruthuperumal 1, G.Rosline Nesakumari 1, Dr.V.Vijayakumar 2 1 Research Scholar, Dr.MGR University Chennai. Associate Professor, GIET Rajahmundry,

More information

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Digital Image Steganography Techniques: Case Study. Karnataka, India. ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College

More information

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature Research Journal of Applied Sciences, Engineering and Technology 7(19): 4100-4105, 2014 DOI:10.19026/rjaset.7.773 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:

More information

Concealing Information in Images using Progressive Recovery

Concealing Information in Images using Progressive Recovery Concealing Information in Images using Progressive Recovery Pooja R 1, Neha S Prasad 2, Nithya S Jois 3, Sahithya KS 4, Bhagyashri R H 5 1,2,3,4 UG Student, Department Of Computer Science and Engineering,

More information

A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME

A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME VOL 13, NO 13, JULY 2018 ISSN 1819-6608 2006-2018 Asian Research Publishing Network (ARPN) All rights reserved wwwarpnjournalscom A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME Javvaji V K Ratnam

More information

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan

More information

Efficient & Secure Data Hiding Using Secret Reference Matrix

Efficient & Secure Data Hiding Using Secret Reference Matrix Efficient & Secure Data Hiding Using Secret Reference Matrix Laxman Tawade 1, Rajshree Mahajan 2, Chandan Kulthe 3 1 Department of Electronic and Telecommunication Engineering, Pune University, India 2,3

More information

AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION

AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION Shaik Shaheena 1, B. L. Sirisha 2 VR Siddhartha Engineering College, Vijayawada, Krishna, Andhra Pradesh(520007),

More information

II. RELATIVE WORK The earlier watermarking techniques were proposed for data hiding applications only [2, 7]. Then, the authentication capability beca

II. RELATIVE WORK The earlier watermarking techniques were proposed for data hiding applications only [2, 7]. Then, the authentication capability beca ROI based Tamper Detection and Recovery for Medical Images Using Reversible Watermarking Technique Osamah M. Al-Qershi, Bee Ee Khoo School of Electrical and Electronic Engineering Universiti Sains Malaysia

More information

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a International Symposium on Mechanical Engineering and Material Science (ISMEMS 2016) An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a 1 School of Big Data and Computer Science,

More information

SIGNAL COMPRESSION. 9. Lossy image compression: SPIHT and S+P

SIGNAL COMPRESSION. 9. Lossy image compression: SPIHT and S+P SIGNAL COMPRESSION 9. Lossy image compression: SPIHT and S+P 9.1 SPIHT embedded coder 9.2 The reversible multiresolution transform S+P 9.3 Error resilience in embedded coding 178 9.1 Embedded Tree-Based

More information

A Flexible Scheme of Self Recovery for Digital Image Protection

A Flexible Scheme of Self Recovery for Digital Image Protection www.ijcsi.org 460 A Flexible Scheme of Self Recoery for Digital Image Protection Zhenxing Qian, Lili Zhao 2 School of Communication and Information Engineering, Shanghai Uniersity, Shanghai 200072, China

More information

Digital Image Steganography Using Bit Flipping

Digital Image Steganography Using Bit Flipping BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 1 Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2018-0006 Digital Image Steganography Using

More information

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 8 August, 2014 Page No. 7932-7937 Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting

More information

An improved reversible image watermarking algorithm based on difference expansion

An improved reversible image watermarking algorithm based on difference expansion Research Article An improved reversible image watermarking algorithm based on difference expansion International Journal of Distributed Sensor Networks 2017, Vol. 13(1) Ó The Author(s) 2017 DOI: 10.1177/1550147716686577

More information

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection John N. Ellinas Abstract In this paper, a robust watermarking algorithm using the wavelet transform and edge detection is presented. The

More information

Blind Scheme with Histogram Peak Estimation for Histogram Modification-Based Lossless Information Embedding

Blind Scheme with Histogram Peak Estimation for Histogram Modification-Based Lossless Information Embedding Blind Scheme with Histogram Peak Estimation for Histogram Modification-Based Lossless Information Embedding 97 Blind Scheme with Histogram Peak Estimation for Histogram Modification-Based Lossless Information

More information

IN digital watermarking, an imperceptible signal, referred to

IN digital watermarking, an imperceptible signal, referred to IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 2, NO. 3, SEPTEMBER 2007 321 Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform Sunil Lee, Student Member, IEEE, Chang

More information

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques Bashar S. Mahdi Alia K. Abdul Hassan Department of Computer Science, University of Technology, Baghdad, Iraq A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and

More information

Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing

Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing Chi-Yao Weng 1, Yen-Chia Huang 1, Chin-Feng Lee 2(&), and Dong-Peng Lin 2 1 Department of Computer Science, National Pingtung University,

More information

Speech Modulation for Image Watermarking

Speech Modulation for Image Watermarking Speech Modulation for Image Watermarking Mourad Talbi 1, Ben Fatima Sira 2 1 Center of Researches and Technologies of Energy, Tunisia 2 Engineering School of Tunis, Tunisia Abstract Embedding a hidden

More information

Difference Expansion Reversible Image Watermarking Schemes Using Integer Wavelet Transform Based Approach

Difference Expansion Reversible Image Watermarking Schemes Using Integer Wavelet Transform Based Approach RESEARCH ARTICLE OPEN ACCESS Difference Expansion Reversible Image Watermarking Schemes Using Integer Wavelet Transform Based Approach Subhanya R.J (1), Anjani Dayanandh N (2) (1) PG Scholar, Arunachala

More information

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON WITH S.Shanmugaprabha PG Scholar, Dept of Computer Science & Engineering VMKV Engineering College, Salem India N.Malmurugan Director Sri Ranganathar Institute

More information

High Capacity Data Hiding Scheme for DCT-based Images

High Capacity Data Hiding Scheme for DCT-based Images Journal of Information Hiding and Multimedia Signal Processing c 010 ISSN 073-41 Ubiquitous International Volume 1, Number 3, July 010 High Capacity Data Hiding Scheme for DCT-based Images Chia-Chen Lin

More information

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction A Report on Genetic Algorithm based Steganography for Image Authentication by Amrita Khamrui Enrolled Scholar Department of Computer Science & Engineering, Kalyani University Prof. (Dr.) J K Mandal Professor

More information

Adaptive Quantization for Video Compression in Frequency Domain

Adaptive Quantization for Video Compression in Frequency Domain Adaptive Quantization for Video Compression in Frequency Domain *Aree A. Mohammed and **Alan A. Abdulla * Computer Science Department ** Mathematic Department University of Sulaimani P.O.Box: 334 Sulaimani

More information

High Capacity Reversible Watermarking Scheme for 2D Vector Maps

High Capacity Reversible Watermarking Scheme for 2D Vector Maps Scheme for 2D Vector Maps 1 Information Management Department, China National Petroleum Corporation, Beijing, 100007, China E-mail: jxw@petrochina.com.cn Mei Feng Research Institute of Petroleum Exploration

More information

LETTER Improvement of JPEG Compression Efficiency Using Information Hiding and Image Restoration

LETTER Improvement of JPEG Compression Efficiency Using Information Hiding and Image Restoration IEICE TRANS. INF. & SYST., VOL.E96 D, NO.5 MAY 2013 1233 LETTER Improvement of JPEG Compression Efficiency Using Information Hiding and Image Restoration Kazumi YAMAWAKI, Member, Fumiya NAKANO, Student

More information

COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE *

COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE * COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE * Pei-Pei Chen ( 陳佩貝 ) 1 and Wen-Hsiang Tsai ( 蔡文祥 ) 1, 2 1 Dept. of Computer Science, National Chiao Tung University,

More information

sensors ISSN

sensors ISSN Sensors 2011, 11, 9717-9731; doi:10.3390/s111009717 OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Article Authenticity Preservation with Histogram-Based Reversible Data Hiding and Quadtree

More information

Blind Scheme with Histogram Peak Estimation for Histogram Modification-Based Lossless Information Embedding

Blind Scheme with Histogram Peak Estimation for Histogram Modification-Based Lossless Information Embedding 98 ECTI TRANSACTIONS ON COMPUTER AND INFORMATION TECHNOLOGY VOL.7, NO.2 November 2013 Blind Scheme with Histogram Peak Estimation for Histogram Modification-Based Lossless Information Embedding Masaaki

More information

A Robust Image Hiding Method Using Wavelet Technique *

A Robust Image Hiding Method Using Wavelet Technique * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 22, 163-174 (2006) Short Paper A Robust Image Hiding Method Using Wavelet Technique * Department of Computer and Information Science National Chiao Tung University

More information

SELF-AUTHENTICATION OF NATURAL COLOR IMAGES IN PASCAL TRANSFORM DOMAIN. E. E. Varsaki, V. Fotopoulos and A. N. Skodras

SELF-AUTHENTICATION OF NATURAL COLOR IMAGES IN PASCAL TRANSFORM DOMAIN. E. E. Varsaki, V. Fotopoulos and A. N. Skodras SELF-AUTHENTICATION OF NATURAL COLOR IMAGES IN PASCAL TRANSFORM DOMAIN E. E. Varsaki, V. Fotopoulos and A. N. Skodras Digital Systems & Media Computing Laboratory School of Science and Technology, Hellenic

More information

Analysis of Reversible Data Hiding Technique In Encrypted Domain

Analysis of Reversible Data Hiding Technique In Encrypted Domain IJSTE International Journal of Science Technology & Engineering Vol. 1, Issue 6, December 2014 ISSN(online): 2349-784X Analysis of Reversible Data Hiding Technique In Encrypted Domain Sanju Sharma M.Tech

More information

An Efficient Algorithm for Reversible Data Hiding in Encrypted Images by RRBE

An Efficient Algorithm for Reversible Data Hiding in Encrypted Images by RRBE An Efficient Algorithm for Reversible Data Hiding in Encrypted Images by RRBE Revathi Nath H A, Jeena R S Abstract: Recently reversible data hiding in encrypted images is gaining importance as this technique

More information

IN DIGITAL watermarking or steganography, a hardly noticeable

IN DIGITAL watermarking or steganography, a hardly noticeable IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL 13, NO 8, AUGUST 2004 1147 Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform Adnan M Alattar, Member, IEEE Abstract A reversible

More information

A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu

A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu International Journal of Innovative Computing, Information and Control ICIC International c 2016 ISSN 1349-4198 Volume 12, Number 2, April 2016 pp. 395 405 A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD

More information

Robust Lossless Data Hiding. Outline

Robust Lossless Data Hiding. Outline Robust Lossless Data Hiding Yun Q. Shi, Zhicheng Ni, Nirwan Ansari Electrical and Computer Engineering New Jersey Institute of Technology October 2010 1 Outline What is lossless data hiding Existing robust

More information

An Improved Performance of Watermarking In DWT Domain Using SVD

An Improved Performance of Watermarking In DWT Domain Using SVD An Improved Performance of Watermarking In DWT Domain Using SVD Ramandeep Kaur 1 and Harpal Singh 2 1 Research Scholar, Department of Electronics & Communication Engineering, RBIEBT, Kharar, Pin code 140301,

More information

A DWT Based Steganography Approach

A DWT Based Steganography Approach A DWT Based Steganography Approach EE604 Term Paper Instructor: Prof. Sumana Gupta Group No. 1 Group Members Anirudh Kumar Agrawal, 11907098 Pratik Likhar, 11531 Radhika Ravi, 11553 Introduction Image

More information

Secret Video Data Hiding with Images Embedding Using Media Data Chunking and Embedding Algorithms

Secret Video Data Hiding with Images Embedding Using Media Data Chunking and Embedding Algorithms I J C T A, 9(6), 2016, pp. 2923-2932 International Science Press ISSN: 0974-5572 Secret Video Data Hiding with Images Embedding Using Media Data Chunking and Embedding Algorithms Suresh G.* and K.A. Pathasarathy**

More information

Reversible Watermarking Technique using Histogram Shifting Modulations

Reversible Watermarking Technique using Histogram Shifting Modulations Reversible Watermarking Technique using Histogram Shifting Modulations Archana Jadhav, M. Omkar Sharma Abstract This paper proposes creating new reversible marking technique. This originally based on indentifying

More information

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014 Comparison of Digital Image Watermarking Algorithms Xu Zhou Colorado School of Mines December 1, 2014 Outlier Introduction Background on digital image watermarking Comparison of several algorithms Experimental

More information

A new approach to the secret image sharing with steganography and authentication

A new approach to the secret image sharing with steganography and authentication 1 A new approach to the secret image sharing with steganography and authentication C-C Wu a, M-S Hwang* b and S-J Kao a a Department of Computer Science and Engineering, National Chung Hsing University,

More information

Image Error Concealment Based on Watermarking

Image Error Concealment Based on Watermarking Image Error Concealment Based on Watermarking Shinfeng D. Lin, Shih-Chieh Shie and Jie-Wei Chen Department of Computer Science and Information Engineering,National Dong Hwa Universuty, Hualien, Taiwan,

More information

STEREOSCOPIC vision has an extensive range of applications, Reversible Watermarking on Stereo Image Sequences. John N. Ellinas

STEREOSCOPIC vision has an extensive range of applications, Reversible Watermarking on Stereo Image Sequences. John N. Ellinas Reversible Watermarking on Stereo mage Sequences John N. Ellinas Abstract n this paper, a new reversible watermarking method is presented that reduces the size of a stereoscopic image sequence while keeping

More information

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12086-12090 Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program Shruti

More information

An Optimum Approach for Image Compression: Tuned Degree-K Zerotree Wavelet Coding

An Optimum Approach for Image Compression: Tuned Degree-K Zerotree Wavelet Coding An Optimum Approach for Image Compression: Tuned Degree-K Zerotree Wavelet Coding Li Wern Chew*, Wai Chong Chia, Li-minn Ang and Kah Phooi Seng Abstract - This paper presents an image compression technique

More information

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain Chinmay Maiti a *, Bibhas Chandra Dhara b a Department of Computer Science & Engineering, College of Engineering & Management, Kolaghat,

More information

A Novel Approach for Deblocking JPEG Images

A Novel Approach for Deblocking JPEG Images A Novel Approach for Deblocking JPEG Images Multidimensional DSP Final Report Eric Heinen 5/9/08 Abstract This paper presents a novel approach for deblocking JPEG images. First, original-image pixels are

More information

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2009, Article ID 187874, 11 pages doi:10.1155/2009/187874 Research Article Improvements in Geometry-Based Secret Image Sharing

More information

A Reversible Data Hiding Scheme For JPEG Images

A Reversible Data Hiding Scheme For JPEG Images A Reversible Data Hiding Scheme For JPEG Images Qiming Li, Yongdong Wu, and Feng Bao Institute for Infocomm Research, A*Star, Singapore {qli,wydong,baofeng}@i2r.a-star.edu.sg Abstract. When JPEG images

More information

User-Friendly Sharing System using Polynomials with Different Primes in Two Images

User-Friendly Sharing System using Polynomials with Different Primes in Two Images User-Friendly Sharing System using Polynomials with Different Primes in Two Images Hung P. Vo Department of Engineering and Technology, Tra Vinh University, No. 16 National Road 53, Tra Vinh City, Tra

More information

Adaptive Pixel Pair Matching Technique for Data Embedding

Adaptive Pixel Pair Matching Technique for Data Embedding Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

CHAPTER-6 WATERMARKING OF JPEG IMAGES

CHAPTER-6 WATERMARKING OF JPEG IMAGES CHAPTER-6 WATERMARKING OF JPEG IMAGES 6.1 INTRODUCTION In the Chapter 4, we have discussed that we can improve the robustness of DCT and DWT based watermarking schemes against some well known attacks by

More information

Copyright Protection for Digital Images using Singular Value Decomposition and Integer Wavelet Transform

Copyright Protection for Digital Images using Singular Value Decomposition and Integer Wavelet Transform I. J. Computer Network and Information Security, 2016, 4, 14-21 Published Online April 2016 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2016.04.02 Copyright Protection for Digital Images using

More information

A Formula Diamond Encoding Data Hiding Scheme

A Formula Diamond Encoding Data Hiding Scheme Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 6, November 2015 A Formula Diamond Encoding Data Hiding Scheme Wen-Chung Kuo

More information

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS Anita Pradhan Department of CSE, Sri Sivani College of Engineering, Srikakulam, Andhra Pradesh, India anita.pradhan15@gmail.com

More information

DOI: /jos Tel/Fax: by Journal of Software. All rights reserved. , )

DOI: /jos Tel/Fax: by Journal of Software. All rights reserved. , ) ISSN 1000-9825, CODEN RUXUEW E-mail: jos@iscasaccn Journal of Software, Vol17, No2, February 2006, pp315 324 http://wwwjosorgcn DOI: 101360/jos170315 Tel/Fax: +86-10-62562563 2006 by Journal of Software

More information

Digital Signal Processing

Digital Signal Processing Digital Signal Processing 20 (2010) 1629 1636 Contents lists available at ScienceDirect Digital Signal Processing wwwelseviercom/locate/dsp High capacity lossless data embedding technique for palette images

More information

Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique Using Hadamard Transform Domain

Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique Using Hadamard Transform Domain Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique Using Hadamard Transform Domain YAHYA E. A. AL-SALHI a, SONGFENG LU *b a. Research Scholar, School of computer science, Huazhong

More information

WHILE classical watermarking introduces permanent

WHILE classical watermarking introduces permanent IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 23, NO. 4, APRIL 2014 1779 Local-Prediction-Based Difference Expansion Reversible Watermarking Ioan-Catalin Dragoi, Member, IEEE, and Dinu Coltuc, Senior Member,

More information

A NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM

A NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM A NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM Siva Prasad K, Ganesh Kumar N PG Student [DECS], Assistant professor, Dept of ECE, Thandrapaparaya Institute of science

More information

DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS

DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS DICTA22: Digital Image Computing Techniques and Applications, 2 22 January 22, Melbourne, Australia. DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS *Yuk Ying CHUNG, Man To WONG *Basser Department of Computer

More information