DOI QR코드

DOI QR Code

Reversible Binary Image Watermarking Method Using Overlapping Pattern Substitution

  • Dong, Keming (Graduate School of Information Management and Security, Korea University) ;
  • Kim, Hyoung Joong (Graduate School of Information Management and Security, Korea University) ;
  • Choi, Yong Soo (Division of Liberal Arts and Teaching (Multimedia), Sungkyul University) ;
  • Joo, Sang Hyun (SW & Contents Research Laboratory, ETRI) ;
  • Chung, Byung Ho (SW & Contents Research Laboratory, ETRI)
  • 투고 : 2014.09.24
  • 심사 : 2015.06.08
  • 발행 : 2015.10.01

초록

This paper presents an overlapping pattern substitution (PS) method. The original overlapping PS method as a reversible data hiding scheme works well with only four pattern pairs among fifteen possible such pairs. This paper generalizes the original PS method so that it will work well with an optimal pair from among the fifteen possible pattern pairs. To implement such an overlapping PS method, changeable and embeddable patterns are first defined. A class map is virtually constructed to identify the changeable and embeddable pairs. The run-lengths between consecutive least probable patterns are recorded. Experiments show that an implementation of our overlapping PS method works well with any possible type of pairs. Comparison results show that the proposed method achieves more embedding capacity, a higher PSNR value, and less human visual distortion for a given embedding payload.

키워드

참고문헌

  1. J. Tian, "Reversible Data Embedding Using a Difference Expansion," IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, Aug. 2003, pp. 890-896. https://doi.org/10.1109/TCSVT.2003.815962
  2. Z. Ni et al., "Reversible Data Hiding," IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, Mar. 2006, pp. 354-362. https://doi.org/10.1109/TCSVT.2006.869964
  3. H.J. Kim et al., "A Novel Difference Expansion Transform for Reversible Data Embedding," IEEE Trans. Inf. Forensics Security, vol. 3, no. 3, 2008, pp. 456-465. https://doi.org/10.1109/TIFS.2008.924600
  4. V. Sachnev et al., "Reversible Watermark Algorithm Using Sorting and Prediction," IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 7, July 2009, pp. 989-999. https://doi.org/10.1109/TCSVT.2009.2020257
  5. C.-Y. Yang and W.-C. Hu, "High-Performance Reversible Data Hiding with Overflow/Underflow Avoidance," ETRI J., vol. 33, no. 4, Aug. 2011, pp. 580-588. https://doi.org/10.4218/etrij.11.0110.0534
  6. S. Kang, H.J. Hwang, and H.J. Kim, "Reversible Watermark Using an Accurate Predictor and Sorter Based on Payload Balancing," ETRI J., vol. 34, no. 3, June 2012, pp. 410-420. https://doi.org/10.4218/etrij.12.0111.0075
  7. H.-K. Pan, Y.-Y. Chen, and Y.-C. Tseng, "A Secure Data Hiding Scheme for Two-Color Images," IEEE Symp. Comput. Commun., Antibes, France, July 4-6, 2000, pp. 750-755.
  8. Y.-C. Tseng and H.-K. Pan, "Data Hiding in 2-Color Images," IEEE Trans. Comput., vol. 51, no. 7, July 2002, pp. 873-878. https://doi.org/10.1109/TC.2002.1017706
  9. M. Wu, E. Tang, and B. Lin, "Data Hiding in Digital Binary Image," IEEE Int. Conf. Multimedia Expo, New York, USA, Aug. 1-3, 2000, pp. 393-396.
  10. M. Wu, "Multimedia Data Hiding," Ph.D. dissertation, Dept. Electr. Eng., Princeton Univ., Princeton, NJ, USA, Apr. 2001.
  11. M. Wu and B. Liu, "Data Hiding in Binary Images for Authentication and Annotation," IEEE Trans. Multimedia, vol. 6, no. 4, Aug. 2004, pp. 528-538. https://doi.org/10.1109/TMM.2004.830814
  12. H. Yang and A.C. Kot, "Data Hiding for Text Document Image Authentication by Connectivity-Preserving," IEEE Int. Conf. Acoust., Speech, Signal Process., Philadelphia, PA, USA, vol. 2, Mar. 18-23, 2005, pp. 505-508.
  13. H. Yang and A.C. Kot, "Pattern-Based Data Hiding for Binary Image Authentication by Connectivity-Preserving," IEEE Trans. Multimedia, vol. 9, no. 3, Apr. 2007, pp. 475-486. https://doi.org/10.1109/TMM.2006.887990
  14. H. Yang and A.C. Kot, "Binary Image Authentication with Tampering Localization by Embedding Cryptographic Signature and Block Identifier," IEEE Signal Process. Lett., vol. 13, no. 12, Dec. 2006, pp. 741-744. https://doi.org/10.1109/LSP.2006.879829
  15. Y. Lee, H. Kim, and Y. Park, "A New Data Hiding Scheme for Binary Image Authentication with Small Image Distortion," Inf. Sci., vol. 179, no. 22, Nov. 2009, pp. 3866-3884. https://doi.org/10.1016/j.ins.2009.07.014
  16. J. Cheng and A.C. Kot, "Objective Distortion Measure for Binary Text Image Based on Edge Line Segment Similarity," IEEE Trans. Image Process., vol. 16, no. 6, June 2007, pp. 1691-1695. https://doi.org/10.1109/TIP.2007.896619
  17. C.-H. Tzeng and W.-H. Tsai, "A New Approach to Authentication of Binary Images for Multimedia Communication with Distortion Reduction and Security Enhancement," IEEE Commun. Lett., vol. 7, no. 9, Sept. 2003, pp. 443-445. https://doi.org/10.1109/LCOMM.2003.815656
  18. H. Yang, A.C. Kot, and S. Rahardja, "Orthogonal Data Embedding for Binary Images in Morphological Transform Domain: A High-Capacity Approach," IEEE Trans. Multimedia, vol. 10, no. 3, Apr. 2008, pp. 339-351. https://doi.org/10.1109/TMM.2008.917404
  19. C.-L. Tsai et al., "Reversible Data Hiding and Lossless Reconstruction of Binary Images Using Pair-Wise Logical Computation Mechanism," Pattern Recogn., vol. 38, no. 11, Nov. 2005, pp. 1993-2006. https://doi.org/10.1016/j.patcog.2005.03.001
  20. Y.-A. Ho et al., "High-Capacity Reversible Data Hiding in Binary Images Using Pattern Substitution," Comput. Standards Interfaces, vol. 31, no. 4, June 2009, pp. 787-794. https://doi.org/10.1016/j.csi.2008.09.014
  21. G.R. Robertson, M.F. Aburdene, and R.J. Kozick, "Differential Block Coding of Bilevel Images," IEEE Trans. Image Process., vol. 5, no. 9, Sept. 1996, pp. 1368-1370. https://doi.org/10.1109/83.535849
  22. K. Dong and H.-J. Kim, "An Efficient Pattern Substitution Watermarking Method for Binary Images," Int. Workshop Digital Watermarking, Seoul, Rep. of Korea, vol. 6526, Oct. 1-3, 2010, pp. 181-188.
  23. G. Xuan et al., "Reversible Binary Image Data Hiding by Run-Length Histogram Modification," Int. Conf. Pattern Recogn., Tampa, FL, USA, Dec. 8-11, 2008, pp. 1-4.
  24. W.M. Zhang, B. Chen, and N.H. Yu, "Improving Various Reversible Data Hiding Schemes via Optimal Codes for Binary Covers," IEEE Trans. Image Process., vol. 21, no. 6, 2012, pp. 2991-3003. https://doi.org/10.1109/TIP.2012.2187667
  25. W.M. Zhang, B. Chen, and N.H. Yu, "Capacity-Approaching Codes for Reversible Watermarking," Int. Conf. Inf. Hiding, Prague, Czech Republic, May 18-20, 2011, pp. 255-269.

피인용 문헌

  1. Data Hiding in Binary Image with High Payload vol.43, pp.12, 2015, https://doi.org/10.1007/s13369-018-3130-5