×

Reversible watermarking method based on adaptive thresholding and companding technique. (English) Zbl 1218.68189

Summary: Embedding and extraction of secret information as well as the restoration of the original un-watermarked image are highly desirable in sensitive applications such as military, medical, and law enforcement imaging. This paper presents a novel reversible watermarking approach for digital images using integer-to-integer wavelet transform, companding technique, and adaptive thresholding, enabling it to embed and recover the secret information as well as restore the image to its pristine state. The proposed method takes advantage of block-based watermarking and iterative optimization of threshold for companding which avoids histogram pre- and postprocessing. Consequently, it reduces the associated overhead usually required in most of the reversible watermarking techniques. As a result, it generates less distortion between the watermarked and the original image. Experimental results on regular as well as medical images show that the proposed method outperforms the existing reversible watermarking approaches reported in the literature.

MSC:

68U10 Computing methodologies for image processing
94A62 Authentication, digital signatures and secret sharing
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] DOI: 10.1109/TIP.2004.828418 · Zbl 05452734 · doi:10.1109/TIP.2004.828418
[2] Alattar, A. M. 2004.Reversible watermark using difference expansion of quadsVol. 3, 377–380. Montreal, Canada Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing
[3] DOI: 10.1007/978-3-642-02900-4_19 · doi:10.1007/978-3-642-02900-4_19
[4] Boucherkha, S. and Benmohamed, M. 2005.A Lossless Watermarking based Authentication System for Medical Images, Vol. 1, 100–103. World Academy of Science and Engineering (WASET).
[5] Celik, M. U., Sharma, G., Tekalp, M. A. and Saber, E. 2002.Reversible data hidingVol. 2, 157–160. Rochester, NY, USA, Vol Proceedings of IEEE International Conference on Image Processing
[6] DOI: 10.1109/TIP.2004.840686 · Zbl 05452807 · doi:10.1109/TIP.2004.840686
[7] Cox I. J., Digital Image Watermarking (2004)
[8] Feng J. B., Int. J. Netw. Secur. 2 pp 161– (2006)
[9] Fotopoulos, V., Starvrinou, M. L. and Skodras, A. N. 8–10 October 2008.Medical image authentication and self correction through an adaptive reversible watermarking technique8–10 October, 1–5. Athens Proceedings of 8th International Conference on Bio-informatics and Bio-Engineering (BIBE’2008), Available athttp://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=4696803
[10] Fraser, S. I. and Allen, A. R. August 2008.A high capacity reversible watermarking technique based on difference expansionAugust, 18–20. Kailua-Kona, HI, USA Proceedings of Signal and Image Processing (SIP 2008)
[11] Fridrich, J., Goljan, M. and Du, R. 2001.Invertible authenticationVol. 3971, 197–208. San Jose, CA, USA Proceedings of SPIE, Security and Watermarking of Multimedia Contents III
[12] Fridrich J., Lossless data embedding for all image formats (2002)
[13] Fridrich G. J., EURASIP J. Appl. Signal Process. 2 pp 185– (2002) · Zbl 1001.68910 · doi:10.1155/S1110865702000537
[14] DOI: 10.1007/BF02830603 · doi:10.1007/BF02830603
[15] Karras D. A., ICGST Int. J. Graph. Vision Image Process. (GVIP) 5 pp 19– (2005)
[16] DOI: 10.1109/TIFS.2007.905146 · doi:10.1109/TIFS.2007.905146
[17] DOI: 10.1016/S0165-1684(01)00026-3 · Zbl 1098.94563 · doi:10.1016/S0165-1684(01)00026-3
[18] Memon, N. A. and Gilani, S. A.M. 23–24 December 2008.NROI watermarking of medical images for content authentication23–24 December, 106–110. Karachi, Pakistan Proceedings of 12th IEEE International Multitopic Conference (INMIC’08)
[19] Memon, N. A., Gilani, S. A.M. and Ali, A. 15–16 August 2009.Watermarking of chest CT scan medical images for content authentication15–16 August, 175–180. Karachi, Pakistan IEEE 3rd International Conference on Information and Communication Technologies (ICICT’2009) · Zbl 1209.92031
[20] Mintzer F., D-Lib Mag. 3 (1997)
[21] DOI: 10.3788/COL20090707.0580 · doi:10.3788/COL20090707.0580
[22] Tian J., Reversible watermarking by difference expansion (2002)
[23] DOI: 10.1109/TCSVT.2003.815962 · Zbl 05451441 · doi:10.1109/TCSVT.2003.815962
[24] Vleeschouver C. D., Circular interpretation of histogram for reversible watermarking pp 345– (2001)
[25] DOI: 10.1109/TMM.2003.809729 · doi:10.1109/TMM.2003.809729
[26] DOI: 10.1007/s10278-007-9011-1 · Zbl 05463095 · doi:10.1007/s10278-007-9011-1
[27] DOI: 10.1049/el:20021131 · doi:10.1049/el:20021131
[28] Xuan, G., Shi, Y. Q., Yang, C., Zheng, Y., Zou, D. and Chai, P. 2005.Lossless data hiding using integer wavelet transform and threshold embedding technique1520–1523. IEEE International Conference on Multimedia and Expo, Amsterdam, July, Available athttp://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=1521722
[29] Xuan G., IWDW 2004 3304 pp 115– (2005)
[30] Xuan G., IWDW 2006 4283 pp 323– (2006)
[31] Yuehua, Z., GuiXuan, C. and Yunhai, D. 2004.A image watermarking algorithm based on discrete cosine transform block classifyingVol. 85, 234–235. Proceedings of ACM 3rd International Conference on Information Security, Shanghai
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.