Advertisement

Cluster Computing

, Volume 22, Supplement 5, pp 12313–12323 | Cite as

Reversible and robust image watermarking based on histogram shifting

  • R. RajkumarEmail author
  • A. Vasuki
Article
  • 156 Downloads

Abstract

In reversible watermarking, robustness of the watermark and the perceptual quality of the recovered host image has a major impact on the watermarking method. The proposed method provides improvement in the embedding capacity and the perceptual quality with a better robustness. Here, image pre-processing is performed by Gaussian filtering as a first step of the watermark embedding process. The peak points of the histogram are selected for embedding the secret data. In this method high frequency component modification is performed at the pixel position at which the watermark is embedded. A secret key is provided as an authentication process for the watermarked image, after adding the side information. At the extraction process, after the authentication and extraction of side information, Gaussian filter is applied. By using the side information the watermarked positions are identified, the secret data is extracted and the host image is recovered. The parameters such as embedding capacity, peak signal to noise ratio, Structural SIMilarity Index, bit rate and bit error rate are used for evaluation. The experimental results proves that, the proposed method provide better robustness and perceptual quality when compared with the existing method.

Keywords

Gaussian filtering Histogram shifting Image watermarking HFCM 

References

  1. 1.
    Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354–362 (2006)CrossRefGoogle Scholar
  2. 2.
    Fallahpour, M., Sedaaghi, M.H.: High capacity lossless data hiding based on histogram modification. IEICE Electronics Express 4(7), 205–210 (2007)CrossRefGoogle Scholar
  3. 3.
    Lee, S.K., Suh, Y.H., Ho, Y.S.: Reversible image authentication based on watermarking. Proc. IEEE International Conference on Multimedia Expo. 1321-1324 (2006)Google Scholar
  4. 4.
    Van Leest, A., Van der Veen, M., Bruekers, F.: Reversible image watermarking. Proc. IEEE International Conference on Information Process. 2(1). II-731-II-734 (2003)Google Scholar
  5. 5.
    Tai, W.L., Yeh, C.M., Chang, C.C.: Reversible data hiding based on histogram modification of pixel differences. IEEE Trans. Circuits Syst. Video Technol. 19(6), 906–910 (2009)CrossRefGoogle Scholar
  6. 6.
    Xuan, G., Shi, Y.Q., Chai, P., Cui, X., Ni, Z., Tong, X.: Optimum histogram pair based image lossless data embedding. Proceedings of International Workshop on Digital Watermarking. 264-278 (2007)Google Scholar
  7. 7.
    Gao, X., An, L., Yuan, Y., Tao, D., Li, X.: Lossless data embedding using generalized statistical quantity histogram. IEEE Trans. Circuits Syst. Video Technol. 21(8), 1062–1070 (2011)Google Scholar
  8. 8.
    Qin, C., Chang, C.C., Huang, Y.H., Liao, L.T.: An inpainting assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans. Circuits Syst. Video Technol. 23(7), 1109–1118 (2013)CrossRefGoogle Scholar
  9. 9.
    Dragoi, I.C., Coltuc, D., Wu, H.-T., Huang, J.: Reversible image watermarking on prediction errors by efficient histogram modification. Signal Processing Letters 92(12), 3000–3009 (2012)CrossRefGoogle Scholar
  10. 10.
    Chen, X., Sun, X., H. Zhou, Z., Zhang, J.: Reversible watermarking method based on asymmetric-histogram shifting of prediction errors. Journal of System. Software. 86(10), 2620-2626 (2013)Google Scholar
  11. 11.
    Zhang, X.: Reversible data hiding with optimal value transfer. IEEE Trans. Multimedia 15(2), 316–325 (2013)CrossRefGoogle Scholar
  12. 12.
    Zong, Tianrui, Xiang, Yong, Natgunanathan, Iynkaran, Guo, Song, Zhou, Wanlei, Beliakov, Gleb: Robust Histogram Shape-Based Method for Image Watermarking. IEEE Trans. Circuits Syst. Video Technol. 25(5), 717–729 (2015)CrossRefGoogle Scholar
  13. 13.
    Ito, Kazufumi, Xiong, Kaiqi: Gaussian Filters for Nonlinear Filtering Problems. IEEE Trans. Autom. Control 45(5), 910–927 (2000)MathSciNetCrossRefGoogle Scholar
  14. 14.
    Nisha., Sunil Kumar.: Image Quality Assessment Techniques. International Journal of Advanced Research in Computer Science and Software Engineering, 3(7), 636–640 (2010)Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of ECEDr.NGP Institute of TechnologyCoimbatoreIndia
  2. 2.Department of ECEKumaraguru College of TechnologyCoimbatoreIndia

Personalised recommendations