Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33090
A Novel Reversible Watermarking Method based on Adaptive Thresholding and Companding Technique
Authors: Nisar Ahmed Memon
Abstract:
Embedding and extraction of a secret information as well as the restoration of the original un-watermarked image is highly desirable in sensitive applications like military, medical, and law enforcement imaging. This paper presents a novel reversible data-hiding method for digital images using integer to integer wavelet transform and companding technique which can embed and recover the secret information as well as can restore the image to its pristine state. The novel method takes advantage of block based watermarking and iterative optimization of threshold for companding which avoids histogram pre and post-processing. Consequently, it reduces the associated overhead usually required in most of the reversible watermarking techniques. As a result, it keeps the distortion small between the marked and the original images. Experimental results show that the proposed method outperforms the existing reversible data hiding schemes reported in the literature.Keywords: Adaptive Thresholding, Companding Technique, Integer Wavelet Transform, Reversible Watermarking
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1080169
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1868References:
[1] I.J Cox,M.L. Miller, J. A. Blom, Digital image watermarking. Morgan Kaufman Publishers, 2004.
[2] A. Makur, S. Sethu Selvi, "Variable Dimension Vector Quantization based Image Watermarking," Journal of Signal Processing, vol. 81, no. 4, pp. 889-893, April 2001.
[3] Z. Shaomin, L. Jianming, "An Optimal Adaptive Quantization Index Modulation Watermarking Algorithm," Chinese Optics Letters, vol. 7, no. 7, pp. 580-584, July 01, 2009.
[4] N. A. Memon, S.A.M. Gilani, A. Ali, "Watermarking of Chest CT Scan Medical Images for Content Authentication," In the proceedings of IEEE 3rd International Conference on Information and Communication Technologies (ICICT-2009), pp. 175-180, August 15-16 2009.
[5] Z. Yuehua, C GuiXuan, D. Yunhai, "A Image Watermarking Algorithm based on Discrete Cosine Transform Block Classifying," In the Proceedings of 3rd International Conference on Information Security, Shanghai vol. 85, pp. 234-235, 2004.
[6] D. A. Karras "A Second order Spread Spectrum Modulation Scheme for Wavelet based Low Error Probability Digital Image Watermarking," ICGST International Journal on Graphics, Vision and Image Processing (GVIP), vol. 3, no. 5, February 2005.
[7] S. Hai-mei, M. Tian-can, Q. Qian -ging, "Spread Spectrum Watermak based on Wavelet Transform for Still Digital Image,", Wuhan University Journal of Natural Sciences, vol 9, No. 2, pp. 203-208, 2004.
[8] A. Khan, A.M. Mirza, "Genetic perceptual shaping: utilizing cover image and conceivable attack information during watermarking embedding, Information," Fusion, vol. 8, pp. 354-365, 2007.
[9] A. Khan, "Intelligent perceptual shaping of a digital watermark". PhD Thesis, Faculty of Computer Science and Engineering, GIK Institute, Pakistan, 2006.
[10] J. H. K. Wu, R.F. Chang, C. J. Chen, C. L. Wang, T. H. Kuo, W. K. Moon, W. K. Chen,"Tamper detection and recovery for medical images using near-lossless information hiding technique," Journal of Digital Imaging, vol. 21, no. 1, pp-59-76, 2008.
[11] N. A. Memon, S.A.M . Gilani, " NROI watermarking of medical images for content authentication," In the Proceedings of 12th IEEE International Mutitopic Conference (INMIC-08), Karachi, Pakistan, 2008. p. 106- 110.
[12] S.I. Fraser, A.R. Allen,"A high capacity reversible watermarking technique based on difference expansion," In the Proceedings of Signal and Image Processing, Kailua-Kona, HI, USA, 2008.
[13] J. Tian, "Reversible watermarking by difference expansion," In Proceedings of Workshop on Multimedia and Security, 2002. p. 19-22.
[14] G. Xuan, Y.Q. Shi, C. Yang, Y. Zheng, D. Zou, P. Chai," Lossless data hiding using wavelet transform and threshold embedding technique," Proceedings of IEEE International Conference on Multimedia and Expo, 2005. p. 1520-1523.
[15] G. Xuan, C. Yang, Y. Zhen, Y.Q. Shi, Z. Ni," Reversible data hiding using IWT and companding technique," I. J. Cox et al (Eds.) IWDW 2004, LNCS 3304. p. 115-124.