Browse > Article
http://dx.doi.org/10.3745/KIPSTA.2010.17B.4.275

High-Capacity Reversible Watermarking through Predicted Error Expansion and Error Estimation Compensation  

Lee, Hae-Yeoun (국립금오공과대학교 컴퓨터공학부)
Kim, Kyung-Su (KT 네트워크연구소)
Abstract
Reversible watermarking which can preserve the original quality of the digital contents and protect the copyright has been studied actively. Especially, in medical, military, and art fields, the need for reversible watermarking is increasing. This paper proposes a high-capacity reversible watermarking through predicted error expansion and error estimation compensation. Watermark is embedded by expanding the difference histogram between the original value and the predicted value. Differently from previous methods calculating the difference between adjacent pixels, the presented method calculates the difference between the original value and the predicted value, and that increases the number of the histogram value, where the watermark is embedded. As a result, the high capacity is achieved. The inserted watermark is extracted by restoring the histogram between the original value and the predicted value. To prove the performance, the presented algorithm is compared with other previous methods on various test images. The result supports that the presented algorithm has a perfect reversibility, a high image quality, and a high capacity.
Keywords
Reversible watermarking; High capacity; High quality; Predicted error expansion; Error estimation compensation;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 "USC-SIPI Image Database - Miscellaneous," Available: {http://sipi.usc.edu/database/database.cgi?volume=misc}.
2 L. Kamstra and H.J.A.M. Heijmans, "Reversible data embedding into images using wavelet techniques and sorting," IEEE Trans. on Image Processing, Vol.14, No.12, pp.2082-2090, 2005.   DOI   ScienceOn
3 D.M. Thodi and J.J. Rodriguez, "Expansion embedding techniques for reversible watermarking," IEEE Trans. on Image Processing, Vol.16, No.3, pp.721-730, 2007.   DOI   ScienceOn
4 Z. Ni, Y.-Q. Shi, N. Ansari and W. Su, "Reversible data hiding," IEEE Trans. on Circuits and Systems for Video Technology, Vol.16, No.3, pp.354-362, 2006.   DOI   ScienceOn
5 J.H. Hwang, J.W. Kim and J.U. Choi, "A reversible watermarking based on histogram shifting," International Workshop on Digital Watermarking, Lecture Notes in Computer Science, Vol.4283, pp.348-361, 2006.
6 W.-C. Kuo, D.-J. Jiang and Y.-C. Huang, "Reversible data hiding based on histogram," International Conference on Intelligent Computing, Lecture Notes in Artificial Intelligence, Vol.4682, pp.1152-1161, 2007.
7 S.-K. Lee, Y.-H. Suh and Y.-S. Ho, "Lossless data hiding based on histogram modification of difference images," Pacific Rim Conference on Multimedia, Lecture Notes in Computer Science, Vol.3333, pp.340-347, 2005.
8 C.-C. Lin, W.-L. Tai and C.-C. Chang, "Multilevel reversible data hiding based on histogram modification of difference images," Pattern Recognition, Vol.41, No.12, pp.3582-3591, 2008.   DOI   ScienceOn
9 P. Tsai, Y.-C. Hu and H.-L. Yeh, "Reversible image hiding scheme using predictive coding and histogram shifting," Signal Processing, Vol.89, No.6, pp.1129-1143, 2009.   DOI   ScienceOn
10 C.W. Honsinger, P. Jones, M. Rabbani and J.C. Stoffel, "Lossless recovery of an original image containing embedded data," US Patent application, Docket No: 77102/E-D, 1999.
11 "JBIG-KIT lossless image compression library," (online), Available: {http://www.cl.cam.ac.uk/~mgk25/jbigkit/}.
12 S. Lee, C.D. Yoo and T. Kalker, "Reversible image watermarking based on integer-to-integer wavelet transform," IEEE Trans. on Information Forensics and Security, Vol.2, No.3, pp.321-330, 2007.   DOI   ScienceOn
13 J.Y. Kim, H.-Y. Lee, D.-H. Im, S.-J. Ryu, J.-H. Choi, and H.-K. Lee, "Print-Scan Resilient Curve Watermarking using B-Spline Curve Model and Its 2D Mesh Spectral Transform," 한국정보처리학회 논문지, Vol.15-B(4), pp.307-314, 2008.   과학기술학회마을   DOI   ScienceOn
14 B. Yang, M. Schmucker, C.B.W. Funk and S. Sun, "Integer DCT-based reversible watermarking for images using compounding technique," Proc. of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, Vol.5306, pp.405-415, 2004.
15 G. Xuan, Q. Yao, C. Yang, J. Gao, P. Chai, Y.Q. Shi and Z. Ni, "Lossless data hiding using histogram shifting method based on integer wavelets," International Workshop on Digital Watermarking, Lecture Notes in Computer Science, Vol.4283, pp.323-332, 2006.
16 J. Tian, "Reversible data embedding using a difference expansion," IEEE Trans. on Circuits and Systems for Video Technology, Vol.13, No.8, pp.890-896, Aug. 2003.   DOI   ScienceOn
17 A.M. Alattar, "Reversible watermark using difference expansion of triplets," Proc. of the IEEE International Conference on Image Processing, Vol.1, pp.501-504, 2003.
18 A.M. Alattar, "Reversible watermark using difference expansion of quads," Proc. of the IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol.3, pp.377-380, 2004.
19 A.M. Alattar, "Reversible watermark using the difference expansion of a generalized integer transform," IEEE Trans. on Image Processing, Vol.13, No.8, pp.1147-1156, 2004.   DOI   ScienceOn
20 I. Cox, M. Miller, J. Bloom, J. Fridrich and T. Kalker, "Digital Watermarking and Steganography," Morgan Kaufmann Publishers Inc., San Francisco, CA, 2007.
21 H.-Y. Lee, H. Kim, and H.-K. Lee, "Robust image watermarking using local invariant features," Optical Engineering, Vol.45. No.3, 2006.
22 S.Y. Choi, H.-Y. Lee, I. K. Kang, and H.-K. Lee, "Video Fingerprinting System through Zero-based Code Modulation Technique," 한국정보처리학회 논문지, Vol.12-B(4), pp.443-450, 2005.   과학기술학회마을   DOI   ScienceOn
23 K.-S. Kim, M.-J. Lee, H.-Y. Lee and H.-K. Lee, "Reversible data hiding exploiting spatial correlation between subsampled images," Pattern Recognition, Vol.42, No.11, pp.3083-3096, 2009.   DOI   ScienceOn
24 C.D. Vleeschouwer, J.-F. Delaigle, and B. Macq, "Circular interpretation of Bijective transformations in lossless watermarking for media asset management," IEEE Trans. on Multimedia, Vol.5, No.1, pp. 97-105, 2003.   DOI   ScienceOn
25 J. Fridrich, J. Goljan and R. Du, "Invertible authentication," Proc. of the SPIE, Security and Watermarking of Multimedia Contents, San Jose, CA, Vol.4314, pp.197-208, 2001.
26 M.U. Celik, G. Sharma, A.M. Tekalp and E. Saber, "Lossless generalized-LSB data embedding," IEEE Trans. on Image Processing, Vol.14, No.2, pp.253-266, 2005.   DOI   ScienceOn