Reversible Contrast Enhancement

Similar documents
Robust Steganography Using Texture Synthesis

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement

Reversible Data Hiding VIA Optimal Code for Image

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

A reversible data hiding based on adaptive prediction technique and histogram shifting

An improved reversible image watermarking algorithm based on difference expansion

A Reversible Data Hiding Scheme for BTC- Compressed Images

Multilayer Data Embedding Using Reduced Difference Expansion

Enhancing the Image Compression Rate Using Steganography

REVERSIBLE DATA HIDING SCHEME BASED ON PREDICTION ERROR SORTING AND DOUBLE PREDICTION.

High capacity data hiding scheme based on (7, 4) Hamming code

Reversible Watermarking in JPEG Images Based on Modified RZL Codes and Histogram Shift

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

International Journal of Innovative Research in Computer and Communication Engineering

Image Error Concealment Based on Watermarking

An Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility

Robust Lossless Data Hiding. Outline

MRT based Fixed Block size Transform Coding

User-Friendly Sharing System using Polynomials with Different Primes in Two Images

Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing

MRT based Adaptive Transform Coder with Classified Vector Quantization (MATC-CVQ)

Improved Non-Local Means Algorithm Based on Dimensionality Reduction

An Improved Reversible Data-Hiding Scheme for LZW Codes

Improved Reversible Data Hiding in Encrypted Images Based on Reserving Room After Encryption and Pixel Prediction

A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu

Concealing Information in Images using Progressive Recovery

Digital image steganography using LSB substitution, PVD, and EMD

Reversible Blind Watermarking for Medical Images Based on Wavelet Histogram Shifting

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

LETTER Improvement of JPEG Compression Efficiency Using Information Hiding and Image Restoration

Digital Image Steganography Techniques: Case Study. Karnataka, India.

A Flexible Scheme of Self Recovery for Digital Image Protection

A Framework to Reversible Data Hiding Using Histogram-Modification

A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME

A Novel Reversible Digital Watermark Based on 2D Difference Histogram Pair Mapping

A new approach to the secret image sharing with steganography and authentication

Interleaving Max-Min Difference Histogram Shifting Data Hiding Method

Block-Matching based image compression

CHAPTER 6. 6 Huffman Coding Based Image Compression Using Complex Wavelet Transform. 6.3 Wavelet Transform based compression technique 106

CHAPTER-6 WATERMARKING OF JPEG IMAGES

Digital Image Steganography Using Bit Flipping

Image Compression Algorithm and JPEG Standard

High Capacity Reversible Watermarking Scheme for 2D Vector Maps

Iterative Removing Salt and Pepper Noise based on Neighbourhood Information

Hiding Depth Map in JPEG Image and MPEG-2 Video

COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE *

Separable Reversible Data Hiding in Encrypted JPEG Bitstreams

A Robust Watermarking Algorithm For JPEG Images

Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques

Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique Using Hadamard Transform Domain

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB

Improved Qualitative Color Image Steganography Based on DWT

ROI Based Image Compression in Baseline JPEG

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method

Adaptive Pixel Pair Matching Technique for Data Embedding

A Novel Reversible Data Hiding Scheme Based on Two-Dimensional Difference-Histogram Modification

Analysis of Reversible Data Hiding Technique In Encrypted Domain

Use of Local Minimization for Lossless Gray Image Compression

Reversible Data Hiding Based on Median Difference Histogram

Temperature Calculation of Pellet Rotary Kiln Based on Texture

IMAGE COMPRESSION USING HYBRID QUANTIZATION METHOD IN JPEG

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

High Density Salt and Pepper Noise Filter based on Shepard Interpolation Method

Modified No Search Scheme based Domain Blocks Sorting Strategies for Fractal Image Coding

IMPROVED RHOMBUS INTERPOLATION FOR REVERSIBLE WATERMARKING BY DIFFERENCE EXPANSION. Catalin Dragoi, Dinu Coltuc

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program

Reference Sharing Mechanism for Watermark Self-Embedding Xinpeng Zhang, Shuozhong Wang, Zhenxing Qian, and Guorui Feng

Feature Based Watermarking Algorithm by Adopting Arnold Transform

CHAPTER-5 WATERMARKING OF COLOR IMAGES

SIGNAL COMPRESSION. 9. Lossy image compression: SPIHT and S+P

An Adaptive Data Hiding Method Using Neighborhood Pixels Differencing Based On Modulus Function

A Novel Approach for Deblocking JPEG Images

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

Hierarchical Image Authentication Based on Reversible Data Hiding

ISSN (ONLINE): , VOLUME-3, ISSUE-1,

IMAGE DIGITIZATION BY WAVELET COEFFICIENT WITH HISTOGRAM SHAPING AND SPECIFICATION

Haar Wavelet Image Compression

Fast restoration of natural images corrupted by high-density impulse noise

DOI: /jos Tel/Fax: by Journal of Software. All rights reserved. , )

Breaking the OutGuess

Error-free Authentication Watermarking Based on Prediction-Error-Expansion Reversible Technique

Multibit Embedding Algorithm for Steganography of Palette-Based Images

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

Literature Survey on Performance of Reversible Data Hiding Algorithm

Image Denoising Based on Hybrid Fourier and Neighborhood Wavelet Coefficients Jun Cheng, Songli Lei

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

Secured Double Layer Data Hiding Using Encryption and Decryption Techniques

Embedded Descendent-Only Zerotree Wavelet Coding for Image Compression

Pattern Recognition 41 (2008) Contents lists available at ScienceDirect. Pattern Recognition

CHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction

An Efficient Information Hiding Scheme with High Compression Rate

Efficient VLSI Huffman encoder implementation and its application in high rate serial data encoding

Fingerprint Image Compression

A Formula Diamond Encoding Data Hiding Scheme

Image Inpainting Using Sparsity of the Transform Domain

SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES

GA Based Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption

Topic 5 Image Compression

Enhanced Hybrid Compound Image Compression Algorithm Combining Block and Layer-based Segmentation

Transcription:

Reversible Contrast Enhancement Zhenxing Qian 1(&), Xinpeng Zhang 1, Weiming Zhang 2, and Yimin Wang 3 1 School of Communication and Information Engineering, Shanghai University, Shanghai 200444, China zxqian@shu.edu.cn 2 School of Information Science and Technology, University of Science and Technology of China, Hefei 230026, China 3 School of Computer Science and Engineering, Shanghai University, Shanghai 200444, China Abstract. This paper proposes a novel idea of reversible contrast enhancement (RCE) for digital images. Different from the traditional methods, we aim to embed the reversible feature into image contrast enhancement, making sure that the processed image can be losslessly turned back to the original. The original image is enhanced by histogram shrink and contrast stretching. Meanwhile, side information is generated and then embedded into the contrast enhanced image. On the other end, we extract side information from the processed image and reconstruct the original content without any error. Experimental results show that good contrast and good quality can be achieved in the RCE processed image. Keywords: Reversible image processing Reversible contrast enhancement Reversible data hiding Steganography 1 Introduction Traditional image processing achieves a specified image by modifying the pixel values, e.g., image enhancement, denoising and restoration. Meanwhile, different assessment algorithms are developed to evaluate the processing capability, like the human visual effect, the minimal square errors, and so on. In the past few decades, a huge amount of methods have been proposed to promote the research field [1]. Nowadays, more and more images are used in social networks like Facebook, Twitter, Flickr, and so on. With many processing tools, people can prettify their contents before image uploading or storage. In this situation, one problem emerges. If one hopes to possess both the original and the processed images, he/she has to save two copies, which requires more storage overhead. To resolve this problem, we propose a novel idea of reversible image processing (RIP). As shown in Fig. 1, the processing method guarantees that the processed image can be reversibly processed to the original without any errors. Hence, the image owner only needs to save one copy of the image. To the best of our knowledge, few image processing works have been done in the field of RIP. One work might be semantic image compression [2]. An image is compressed to a visible one with smaller size, and the original can be decompressed with lossy or lossless quality. This work can be viewed as a generalized RIP. Springer International Publishing AG 2016 X. Sun et al. (Eds.): ICCCS 2016, Part I, LNCS 10039, pp. 18 27, 2016. DOI: 10.1007/978-3-319-48671-0_2

Reversible Contrast Enhancement 19 Original Processing Processed Inverse Processing Original Fig. 1. Reversible image processing The proposed idea of RIP is inspired by the works [3, 4]. Purpose of steganography works is to embed additional message into digital images [8, 9]. Alternatively, we change the aim from steganography to reversible image processing. In this paper, we provide a method of reversible contrast enhancement (RCE). To this end, we propose an algorithm based on state-of-the-art contrast enhancement method in [5] to indicate that RCE with good processing results can be achieved by combing image processing with data hiding [6]. We also believe that the proposed work would be of some help to the development of image processing, and more works like reversible image denoising and reversible image restoration can be developed in the future. Framework of the proposed RCE method is shown in Fig. 2. Wefirst enhance the original image by histogram shrink and global image enhancement, and then embed the generated side information into the processed image. On the recovery end, we extract side information from processed image and reconstruct the original content without any error. Experimental results show that the processed image with good contrast and quality can be achieved using the proposed method. Original Histogram Shrink Contrast Enhancement Data Hiding Processed Side-Information Generation Original Lossless Reconstruction Data Extraction Fig. 2. Framework of reversible image processing 2 Proposed Method 2.1 Histogram Shrink Given a digital image X ¼fXi; ð jþjxi; ð jþ 2 ½0; 255Š; i ¼ 1; 2;...; M; j ¼ 1; 2;...; Ng with M N pixels, we first calculate its histogram as h X ¼ fh X ðþjk k ¼ 0; 1;...; 255g, where h X ðþ2½0; k Z þ Š is the number of occurrences of the gray-level k in X. Let A ¼ fa 1 ; a 2 ;...; a K g be the set of all possible gray-levels in X, where a 1 \a 2 \... \a k, and K is the number of existing gray-levels.

20 Z. Qian et al. We further choose a threshold T satisfying 1 T 128. Let S = 255 K. IfS < T, find T S gray-levels from A. Initially we let A 0 ¼Aand B¼fg. Find the gray-level a i ði 2 ½1; KŠÞ that satisfies ha ð i Þ ¼ minfh X ða k Þja k 2 A 0 g, and remove a i from A 0.If a i >1,h(a i 1) 6¼ 0 and a i 1 62 B, we add a i to B, i.e., B¼ B þ fa i g. Repeat the operation until there are T S elements in B. Assuming B ¼fb 1 ; b 2 ;...; b T S g,we modify the original image to construct a new image X 0 by X 0 ði; jþ ¼ Xi; ð j Þ 1; if Xi; ð j Þ 2 B ð1þ Xi; ð jþ; otherwise where i ¼ 1; 2;...; M; j ¼ 1; 2;...; N. Meanwhile, generate a binary map M to record the modification by Mi; ð jþ ¼ 1; if Xi; ð j Þ 2 B 0; otherwise If S T, the binary map is not required and X 0 ¼ X. Thus, there are J = max(255 K, T) zeros in the histogram h X 0. Denote the gray-levels that does not exist in X 0 as a set Z ¼fz i jz i 2 ½0; 255Š; i ¼ 0; 1;...; J 1g. Let fp 0 ; p 1 ;...; p 255 J 1 g be the set of all gray-levels that exist in X 0, where p 0 \p 1 \...\p 255 J 1. Next, we construct a new image Y by ð2þ Yi; ð jþ ¼ k; if X 0 ði; jþ ¼ p k ð3þ where k ¼ 0; 1;...; 255 J 1; i ¼ 1; 2;...; M and j ¼ 1; 2;...; N. This way, existing gray-levels in X 0 shrinks from fp 0 ; p 1 ;...; p 255 J 1 g to f0; 1;...; 255 J 1g. 2.2 Global Contrast Enhancement Based on the global contrast enhancement method in [5], we propose a modified algorithm that is suitable for RCE. To enhance the contrast of image Y, we first calculate the spatial entropy of the image. Divide the image Y into non-overlapped blocks, each of which contains m n pixels. Thus, there are [M/m] [N/n] blocks, where [ ] is the rounding operator. Next we generate the spatial histogram of gray-levels in each block by H ¼ fh k ði; jþjk ¼ 0; 1;...; 255 J 1g where H k (i,j) is the number of occurrence of the gray-level k in the (i,j)-th block, i ¼ 1; 2;...; ½M=mŠ and j ¼ 1; 2;...; ½N=nŠ. The size of each block can be identified by h i m ¼ ðð255 JÞ=ðM=NÞÞ 1=2 h i n ¼ ðð255 JÞðM=NÞÞ 1=2

With the spatial histogram, the entropy measure for each level k is computed by EðkÞ ¼ X ½M=mŠ i¼1 X ½N=nŠ j¼1 Reversible Contrast Enhancement 21 H k ði; jþlog 2 H k ði; jþ ð4þ where k ¼ 0; 1;...; 255 J 1. Accordingly, the importance of each gray-level with respect to the other gray-levels is calculated using f ðkþ ¼EðkÞ= X 255 J 1 EðlÞ l¼0;k6¼l ð5þ The measure f(k) is further normalized using f ðkþ f ðkþ= X 255 J 1 f ðlþ l¼0 ð6þ Then, we find J gray-levels fk 1 ; k 2 ;...; k J gðk 1 \k 2 \...\k J Þ corresponding to J minimal f(k) values. Accordingly, we construct a contrast-enhanced image Z by Zi; ð jþ ¼ 8 Yi; ð jþþj; if Yi; ð jþ[ k J >< Yi; ð jþþt 1; if Yi; ð jþ ¼ k t Yi; ð jþþt; if k t \Yi; ð jþ\k >: t þ 1 Yi; ð jþ; otherwise where t ¼ 1; 2;...; J 1; i ¼ 1; 2;...; M and j ¼ 1; 2;...; N. After contrast enhancement, all existing gray-levels in Z is shifted to the range of [0, 255], and the gray-levels fk 1 ; k 2 ;...; k J g are modified to fk 1 ; k 2 þ 1;...; k i þ i 1;...; k J þ J 1g. ð7þ 2.3 Data Hiding During the procedure of contrast enhance, we have to record the side information including the set of gray-levels Z ¼fz i jz i 2 ½0; 255Š; i ¼ 0; 1;...; J 1g and the binary map M. We record J gray-levels in Z using 8 (J + 1) bits containing an 8-bit header representing the number J. Meanwhile, we compress the binary map M to m a bits using the arithmetic encoding algorithm. Next, the 8(J +1)+m a bits are embedded into the contrast-enhanced image Z. To accommodate the encoded bits, we select L gray-levels from fk 1 ; k 2 þ 1;...; k i þ i 1;...; k J þ J 1g that have the largest values of f ðiþði ¼ k 1 ; k 2 ;...; k J Þ, such that X KJ þ j 1 h l¼k J þ j L zðlþ8lþ8ðj þ 1Þþm a ð8þ where h z is the histogram of image Z excluding eight pixels. Denote the selected gray-levels as fs 1 ; s 2 ;...; s L gðs 1 \s 2 \...\s L Þ. We hide the value s L into the least significant bits (LSB) of the excluded eight pixels by bit replacement. Meanwhile, the values of fs 1 ; s 2 ;...; s L 1 g and LSBs of the

22 Z. Qian et al. excluded pixels are recorded. This way, we have 8L +8(J +1)+m a bits to be embedded into Z. A marked image W can be generated by data hiding, Wi; ð jþ ¼ Zi; ð jþþb k; if Zi; ð jþ 2 S ð9þ Zi; ð jþ; otherwise where S ¼fs 1 ; s 2 ;...; s L g, b k is the k-th bit (0 or 1) to be hidden, k ¼ 1; 2;...; 8L þ 8 J þ 1 ð Þþm a ; i ¼ 1; 2;...; M and j ¼ 1; 2;...; N. 2.4 Recovery With the marked contrast-enhanced image W, the original image X can be losslessly recovered. We first extract the LSBs from the excluded eight pixels and recover the value s L. With this value, part of the hidden bits can be extracted from W by 1; if Zi; j b k ¼ ð Þ ¼ s L þ 1 ð10þ 0; if Zi; ð jþ ¼ s L where k ¼ 1; 2;...; h Z ðs L Þþh Z ðs L þ 1Þ. From these bits, we can recover the values of fs 1 ; s 2 ;...; s L 1 g. Accordingly, the other hidden bits can be extracted by 1; if Zi; j b k ¼ ð Þ ¼ g þ 1 ; g 2fs 0; if Zi; ð jþ ¼ g 1 ;...; s L 1 g ð11þ where k 2½h Z ðs L Þþh Z ðs L þ 1Þþ1; 8L þ 8ðJ þ 1Þþm a Š. Meanwhile, we remove the hidden bits from W to reconstruct the image Z by Zi; ð jþ ¼ Wi; ð j Þ 1; if Wi; ð j Þ 2 S0 ð12þ Wi; ð jþ; otherwise where S 0 ¼fs 1 þ 1; s 2 þ 1;...; s L þ 1g. According to the values of fk 1 ; k 2 þ 1;...; k i þ i 1;...; k J þ J 1g, we shrink the histogram of image Z by Yi; ð jþ ¼ 8 Zi; ð jþ J; if Zi; ð jþ[ k J þ J 1 >< Zi; ð jþ t þ 1; if Zi; ð jþ ¼ k t þ t 1 Zi; ð jþþt; if k t þ t 1\Zði; jþ\k t þ 1 þ t >: Zði; jþ; otherwise ð13þ where t 2½1; J 1Š; i ¼ 1; 2;...; M and j ¼ 1; 2;...; N. Thus, the existing gray-levels in Y belongs to f0; 1;...; 255 J 1g. From the extracted bits, we can identify the set Z ¼fz i jz i 2 ½0; 255Š; i ¼ 0; 1;...; J 1g. Accordingly, the supplementary set fp 0 ; p 1 ;...; p 255 J 1 g can be identified, where p 0 \p 1 \...\p 255 J 1. Thus, the image X 0 can be reconstructed by

Reversible Contrast Enhancement 23 X 0 ði; jþ ¼ p k ; if Yi; ð jþ ¼ k ð14þ where k ¼ 0; 1;...; 255 J 1; i ¼ 1; 2;...; M and j ¼ 1; 2;...; N. Also, compressed bits of the binary map M can also be separated from the extracted bits. Using the arithmetic decoding algorithm, the original map M can be reconstructed. Subsequently, we recover the original image X using Xi; ð jþ ¼ X0 ði; jþþ1; if Mi; ð jþ ¼ 1 X 0 ð15þ ði; jþ; if Mi; ð jþ ¼ 0 where i ¼ 1; 2;...; M and j ¼ 1; 2;...; Nn. 3 Experimental Results To evaluate the proposed method, we implemented the reversible algorithm in many images. Two examples are shown in Figs. 3 and 4. In these experiments, we use the parameter T = 50. Figures 3(a) and 4(a) are the original images containing 512 512 10000 (a) 10000 (b) 8000 8000 6000 6000 4000 4000 2000 2000 0 0 50 100 150 200 250 (c) 0 0 50 100 150 200 250 (d) Fig. 3. Reversible contrast enhancement for airplane, (a) is the original image, (b) the processed, (c) the histogram of (a), and (d) the histogram of (b).

24 Z. Qian et al. 12000 (a) 12000 (b) 10000 10000 8000 8000 6000 6000 4000 4000 2000 2000 0 0 50 100 150 200 250 (c) 0 0 50 100 150 200 250 (d) Fig. 4. Reversible contrast enhancement for crowd, (a) is the original image, (b) the processed, (c) the histogram of (a), and (d) the histogram of (b). pixels, while Figs. 3(b) and 4(b) are the contrast-enhanced image. Histograms of the processed images are shown in Figs. 3(d) and 4(d). Compared with the original histograms in Figs. 3(c) and 4(c), contrasts of the processed images are better than the original images. The proposed method is reversible. After extracting the sided information from Figs. 3(b) and 4(b), the original image can be losslessly recovered, which are identical to Figs. 3(a) and 4(a), respectively. We use the expected measure of enhancement by gradient [5] (EMEG) to assess the contrast of the processed image. EMEG is computed as EMEGðAÞ ¼ 1 X k1 X k2 k 1 k i¼1 2 j¼1 1 b max A dx;h i;j A dx;l i;j þ e ; A dy;h i;j A dy;l i;j In (16), A is the image to be evaluated, which is divided into k 1 k 2 overlapping blocks of size 8 8. A dx;h i;j and A dx;l i;j are respectively the maximum and minimum of the absolute derivative values in x direction of block A i,j, while A dy;h i;j and A dy;l i;j are computed in y direction. b = 255 is the weighting coefficient and e is a constant to avoid division by zero. We use e = 1 in the experiments. The evaluation result EMEG(A)2[0,1]. þ e! ð16þ

Reversible Contrast Enhancement 25 Table 1. I contrast and quality of the enhanced images using EMEG, SSIM and PSNR Original Imadjust Histeq Adapthisteq SECE Proposed Lena EMEG 0.087 0.126 0.149 0.173 0.118 0.118 SSIM 0.91 0.87 0.78 0.95 0.95 PSNR 21.9 19.1 18.9 23.4 24.0 Baboon EMEG 0.206 0.314 0.434 0.387 0.275 0.270 SSIM 0.92 0.81 0.75 0.96 0.96 PSNR 19.6 17.6 17.1 21.9 23.5 Barbara EMEG 0.121 0.156 0.197 0.208 0.149 0.150 SSIM 0.93 0.91 0.81 0.96 0.96 PSNR 24.3 20.8 17.1 25.8 26.1 Crowd EMEG 0.121 0.142 0.204 0.196 0.155 0.155 SSIM 0.78 12.9 0.80 0.80 0.82 PSNR 18.6 12.9 18.7 19.8 21.0 Pepper EMEG 0.104 0.130 0.157 0.190 0.126 0.126 SSIM 0.97 0.91 0.80 0.98 0.98 PSNR 21.2 20.7 18.8 22.3 23.3 Sailboat EMEG 0.142 0.181 0.194 0.246 0.171 0.173 SSIM 0.94 0.91 0.79 0.98 0.97 PSNR 23.1 24.5 17.9 24.7 24.1 s with higher contrast have larger EMEG values. Meanwhile, we use SSIM [7] and PSNR to measure the quality of processed image. SSIM indicates the structure similarity between the processed image and the original image, and PSNR represents the modification of the processing. The larger values of SSIM and PSNR are, the better qualities of the processed images have. The proposed RCE method is compared with the traditional contrast enhancement methods, including imadjust, histeq, adapthisteq algorithms in Matlab system, and SECE in [5]. We use the parameter T = 30. Experimental results are shown in Table 1. Both contrast and quality of the proposed method are close to SECE, meaning that the RCE processed image preserves good contrast and good quality. Though the contrast of imadjust, histeq and adapthisteq are larger than the proposed method, quality of the processed method is better. Most importantly, the proposed method is reversible, i.e., the original image can be recovered. We also evaluate the impact when using different values of parameter T. The results are shown in Fig. 5, in which the parameter T ranges from 30 to 90. EMEG values in Fig. 5(a) show that the contrast increases when we use larger T. Contrarily, SSIM values in Fig. 5(b) show that larger T could result in the lower quality. This indicates that effect of RCE can be controlled by T.

26 Z. Qian et al. EMEG 0.5 0.4 0.3 0.2 Lena Baboon Pepper Couple Goldhill 0.1 0 30 40 50 60 70 80 90 T (a) 1 0.95 SSIM 0.9 Lena 0.85 Baboon Pepper Couple Goldhill 0.8 30 40 50 60 70 80 90 T (b) Fig. 5. Contrast and quality corresponding different parameters, (a) shows the EMEG measurement and (b) the SSIM 4 Conclusions In this paper, we propose a novel idea of reversible image processing, which is different from the traditional image processing. We provide an example of reversible contrast enhancement to show that RIP can be achieved by combining data hiding with image processing. We enhance the original image by histogram shrink and contrast stretching. Meanwhile, some side information is generated and hidden into the contrast-enhanced image. With the processed image, we can losslessly recover the original image. Experimental results show that the proposed method provides good contrast and quality for the contrast-enhanced image. We believe that RIP would be a new research topic for image processing. Other reversible methods for denoising and restoration can also be investigated in the future.

Reversible Contrast Enhancement 27 Acknowledgement. This work was supported by the Natural Science Foundation of China (Grant 61572308 and Grant U1536108, Grant 61572452 and Grant 61402279), Shanghai Rising-Star Program under Grant 14QA1401900, Shanghai Natural Science Foundation under Grant 14ZR1415900, and 2015 Shanghai University Filmology Summit Research Grant References 1. Gonzalez, R.C., Woods, R.: Digital Processing. Pearson Education, Upper Saddle River (2002) 2. Zhang, X., Zhang, W.: Semantic image compression based on data hiding. IET Proc. 9 (1), 54 61 (2014) 3. Wu, H.-T., Dugelay, J.-L., Shi, Y.-Q.: Reversible image data hiding with contrast enhancement. IEEE Sig. Process. Lett. 22(1), 81 85 (2015) 4. Gao, G., Shi, Y.-Q.: Reversible data hiding using controlled contrast enhancement and integer wavelet transform. IEEE Sig. Process. Lett. 22(11), 2078 2082 (2015) 5. Celik, T.: Spatial entropy-based global and local image contrast enhancement. IEEE Trans. Process. 23(12), 5298 5308 (2014) 6. Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, Cambridge (2009) 7. Wang, Z., et al.: quality assessment: from error visibility to structural similarity. IEEE Trans. Process. 13(4), 600 612 (2004) 8. Chen, B., Shu, H., Coatrieux, G., Chen, G., Sun, X., Coatrieux, J.-L.: Color image analysis by quaternion-type moments. J. Math. Imaging Vis. 51(1), 124 144 (2015) 9. Xia, Z., Wang, X., Sun, X., Wang, B.: Steganalysis of least significant bit matching using multi-order differences. Secur. Commun. Netw. 7(8), 1283 1291 (2014)

http://www.springer.com/978-3-319-48670-3