Browse > Article
http://dx.doi.org/10.4218/etrij.12.0111.0312

High-Quality and Robust Reversible Data Hiding by Coefficient Shifting Algorithm  

Yang, Ching-Yu (Department of Computer Science and Information Engineering, National Penghu University of Science and Technology)
Lin, Chih-Hung (Graduate Institute of Mathematics and Science Education, National Chiayi University)
Publication Information
ETRI Journal / v.34, no.3, 2012 , pp. 429-438 More about this Journal
Abstract
This study presents two reversible data hiding schemes based on the coefficient shifting (CS) algorithm. The first scheme uses the CS algorithm with a mean predictor in the spatial domain to provide a large payload while minimizing distortion. To guard against manipulations, the second scheme uses a robust version of the CS algorithm with feature embedding implemented in the integer wavelet transform domain. Simulations demonstrate that both the payload and peak signal-to-noise ratio generated by the CS algorithm with a mean predictor are better than those generated by existing techniques. In addition, the marked images generated by the variant of the CS algorithm are robust to various manipulations created by JPEG2000 compression, JPEG compression, noise additions, (edge) sharpening, low-pass filtering, bit truncation, brightness, contrast, (color) quantization, winding, zigzag and poster edge distortion, and inversion.
Keywords
High-quality reversible data hiding; robust reversible data hiding; coefficients shifting; watermarking;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
Times Cited By Web Of Science : 1  (Related Records In Web of Science)
연도 인용수 순위
1 A.R. Calderbank et al., "Wavelet Transforms that Map Integers to Integers," Appl. Computational Harmonics Anal., vol. 5, no. 3, 1998, pp. 332-369.   DOI   ScienceOn
2 K. Yamamoto and M. Iwakiri, "Real-Time Audio Watermarking Based on Characteristics of PCM in Digital Instrument," J. Inf. Hiding Multimedia Signal Process., vol. 1, no. 2, 2010, pp. 59-71.
3 C.Y. Yang et al., "A Simple Digital Watermarking by the Adaptive Bit-Labeling Scheme," Int. J. Innovative Computing, Inf. Control, vol. 6, no. 3, 2010, pp. 1401-1410.
4 J. Tian, "Reversible Data Embedding Using a Difference Expansion," IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, 2003, pp. 890-896.   DOI   ScienceOn
5 A.M. Alattar, "Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform," IEEE Trans. Image Process., vol. 13, no. 8, 2004, pp. 1147-1156.   DOI   ScienceOn
6 D.M. Thodi and J.J. Rodriguez, "Expansion Embedding Techniques for Reversible Watermarking," IEEE Trans. Image Process., vol. 16, no. 3, 2007, pp. 721-730.
7 K.S. Kim et al., "Reversible Data Hiding Exploiting Spatial Correlation Between Sub-sampled Images," Pattern Recognition, vol. 42, 2009, pp. 3083-3096.   DOI   ScienceOn
8 W. Hong, T.S. Chen, and C.W. Shiu, "Reversible Data Hiding for High Quality Images Using Modification of Prediction Error," J. Syst. Software, vol. 82, 2009, pp. 1833-1842.   DOI   ScienceOn
9 V. Sachnev et al., "Reversible Watermark Algorithm Using Sorting and Prediction," IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 7, 2009, pp. 989-999.
10 C.F. Lee, H.L. Chen, and H.K. Tso, "Embedding Capacity Raising in Reversible Data Hiding Based on Prediction of Different Expansion," J. Syst. Software, vol. 83, 2010, pp. 1864-1872.   DOI   ScienceOn
11 X.R. Luo and T.L.Yin, "Reversible Data Hiding Exploiting Variance in Wavelet Coefficients," J. Computer Sci. Technol., vol. 11, no. 1, 2011, pp. 27-33.
12 C.Y. Yang and W.C. Hu, "High-Performance Reversible Data Hiding with Overflow/Underflow Avoidance," ETRI J., vol. 33, no. 4, Aug. 2011, pp. 580-588.   DOI   ScienceOn
13 Z. Ni et al., "Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication," IEEE Trans. Circuits Syst. Video Technol., vol. 18, no. 4, 2008, pp. 497-509.
14 X.T. Zeng, L.D. Ping, and X.Z. Pan, "A Lossless Robust Data Hiding Scheme," Pattern Recognition, vol. 43, 2010, pp. 1656- 1667.   DOI   ScienceOn
15 F.Y. Shih, Digital Watermarking and Steganography: Fundamentals and Techniques, Boca Raton, FL: CRC Press, 2008.
16 I.J. Cox et al., Digital Watermarking and Steganography, 2nd ed., Burlington, MA: Morgan Kaufmann, 2008.
17 S. Wang, B. Yang, and X. Niu, "A Secure Steganography Method Based on Genetic Algorithm," J. Inf. Hiding Multimedia Signal Process., vol. 1, no. 1, 2010, pp. 28-35.
18 Z.G. Qu et al., "Novel Quantum Steganography with Large Payload," Optics Commun., vol. 283, no. 13, 2010, pp. 4782-4786.