Multimedia Tools and Applications

, Volume 76, Issue 6, pp 8517–8545 | Cite as

A prediction based reversible image watermarking in Hadamard domain

  • Zahra Pakdaman
  • Saeid Saryazdi
  • Hossein Nezamabadi-pour
Article

Abstract

Reversible watermarking is a special kind of the lossless data hiding techniques which allows lossless recovering of both the watermark and the host image. In this paper, a new reversible watermarking scheme based on error prediction in Hadamard domain is presented. In the proposed method, the original image is divided into blocks and transformed to Hadamard domain. If a block is in a smooth area, its AC coefficients will be predicted using a linear predictor function. Then the value of error between the original and the predicted coefficient is computed. At last, a watermark bit will be embedded in the error. To reduce the error value, an Adaline neural network is used to determine coefficients of the predictor function. The experimental results show that the proposed method provides higher capacity and quality in comparison to some well-known methods.

Keywords

Reversible watermarking Reversible Hadamard transform Prediction error Adaline neural network 

References

  1. 1.
    Al-Qershi OM, Khoo BE (2013) Two-dimensional difference expansion (2D-DE) scheme with a characteristics-based threshold. Signal Process 93(1):154–162Google Scholar
  2. 2.
    An L, Gao X, Li X, Tao D, Cheng D, Li J (2012) Robust reversible watermarking via clustering and enhanced pixel-wise masking. IEEE Trans Image Process 21(8):3598–3611MathSciNetCrossRefGoogle Scholar
  3. 3.
    An L, Gao X, Yuan Y, Tao D, Cheng D, Ji F (2012) Content-adaptive reliable robust lossless data embedding. Neurocomputing 79:1–11CrossRefGoogle Scholar
  4. 4.
    An L, Gao X, Yuan Y, Tao D (2012) Robust lossless data hiding using clustering and statistical quantity histogram. Neurocomputing 77:1–11CrossRefGoogle Scholar
  5. 5.
    Arsalan M, Malik SA, Khan A (2012) Intelligent reversible watermarking in integer wavelet domain for medical images. J Syst Softw 85:883–894CrossRefGoogle Scholar
  6. 6.
    Aznaveh AM, Torkamani-Azarn F, Mansouri A, Kurugollu F (2010) Reversible watermarking using statistical information. EURASIP J Adv Signal Process 2010, 738972. doi:10.1155/2010/738972
  7. 7.
    Barton JM (1997) Method and apparatus for embedding authentication information within digital data. U S Patent 5646:997Google Scholar
  8. 8.
    Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized LSB data embedding. IEEE Trans Image Process 14(2):253–266CrossRefGoogle Scholar
  9. 9.
    Chan YK, Chen WT, Yu SS, Ho YA, Tsai CS, Chu YP (2009) A HDWT-based reversible data hiding method. J Syst Softw 82:411–421CrossRefGoogle Scholar
  10. 10.
    Chang CC, Pai PY, Yeh CM, Chan YK (2010) A high payload frequency-based reversible image hiding method. Inf Sci 180:2286–2298CrossRefGoogle Scholar
  11. 11.
    Coltuc D, Chassery JM (2007) Very fast watermarking by reversible contrast mapping. IEEE Sig Process Lett 14(4):255–258CrossRefGoogle Scholar
  12. 12.
    De Vleeschouwer C, Delaigle JF, Macq B (2003) Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans Multimedia 5:97–105CrossRefGoogle Scholar
  13. 13.
    Du Y, Zhang T (2009) A reversible and fragile watermarking algorithm based on DCT, Proceeding of the IEEE International Conference on Artificial Intelligence and Computational Intelligence, 301–304Google Scholar
  14. 14.
    Feng JB, Lin IC, Tsai CS, Chu YP (2006) Reversible watermarking: current status and key issues. Int J Netw Secur 2(3):161–171Google Scholar
  15. 15.
    Gao X, An L, Li X, Tao D (2009) Reversibility improved lossless data hiding. Signal Process 89:2053–2065CrossRefMATHGoogle Scholar
  16. 16.
    Gao X, An L, Yuan Y, Tao D, Li X (2011) Lossless data embedding using generalized statistical quantity histogram. IEEE Trans Circuits Syst Video Technol 21(8):1061–1070CrossRefGoogle Scholar
  17. 17.
    Gao L, Gao T, Sheng G, Cao Y, Fan L (2012) A new reversible watermarking scheme based on integer DCT for medical images, Proceeding of the IEEE International Conference on Wavelet Analysis and Pattern Recognition, 33–37Google Scholar
  18. 18.
    Iliyaeu AM, Le PQ, Dong F, Hirota K (2012) Watermarking and authentication of quantum images based on restricted geometric transforms. Inf Sci 186:126–149CrossRefMATHGoogle Scholar
  19. 19.
    Kamran AK, Malik SA (2014) A high capacity reversible watermarking approach for authenticating images: exploiting down-sampling, histogram processing, and block selection. Inf Sci 256:162–183CrossRefGoogle Scholar
  20. 20.
    Kim KS, Lee MJ, Lee HY, Lee HK (2009) Reversible data hiding exploiting spatial correlation between sub-sampled images. Pattern Recogn 42:3083–3096CrossRefMATHGoogle Scholar
  21. 21.
    Lei B, Tan E-L, Chen S, Dong N, Wang T, Lei H (2014) Reversible watermarking scheme for medical image based on differential evolution. Expert Syst Appl 41:3178–3188CrossRefGoogle Scholar
  22. 22.
    Li C, Yang R, Liu Z, Li J, Guo Z (2016) Semi-fragile self-recoverable watermarking scheme for face image protection. Comput Electr Eng 1–10. doi:10.1016/j.compeleceng.2016.01.026
  23. 23.
    Lin Y-K (2012) High capacity reversible data hiding scheme based upon discrete cosine transformation. J Syst Softw 85:2395–2404CrossRefGoogle Scholar
  24. 24.
    Lin CC, Tai WL, Chang CC (2008) Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recogn 41:3582–3591CrossRefMATHGoogle Scholar
  25. 25.
    Lou DC, Chou CL, Tso HK, Chiu CC (2012) Active steganalysis for histogram-shifting based reversible data hiding. Opt Commun 285:2510–2518CrossRefGoogle Scholar
  26. 26.
    Mao Q, Li F, Chang C-C (2015) Reversible data hiding with oriented and minimized distortions using cascading trellis coding. Inf Sci 317:170–180CrossRefGoogle Scholar
  27. 27.
    Narawade N, Kanphade R (2011) Reversible watermarking: a complete review. Int J Comput Sci Telecom 2:46–50Google Scholar
  28. 28.
    Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354–362CrossRefGoogle Scholar
  29. 29.
    Sachnev V, Kim HJ, Nam J, Suresh S, Shi YQ (2009) Reversible watermarking algorithm using sorting and prediction. IEEE Trans Circuits Syst Video Technol 19(7):989–999CrossRefGoogle Scholar
  30. 30.
    Sarukhanyan H, Agaian S, Egiazarian K, Astola J (2007) Reversible Hadamard transform. Facta Univ (NIS) 20(3):309–330CrossRefMATHGoogle Scholar
  31. 31.
    Saryazdi S, Nezamabadi-pour H (2005) A blind digital watermark in hadamard domain. World Acad Sci Eng Technol 3:126–129Google Scholar
  32. 32.
    Thodi DM, Rodriguez JJ (2004) Reversible watermarking by prediction-error expansion, Image Analysis and Interpretation, 6th IEEE Southwest Symposium on, 21–25Google Scholar
  33. 33.
    Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circ Syst Video Technol 13(8):890–896CrossRefGoogle Scholar
  34. 34.
    Tsai H-M, Chang L-W (2010) Secure reversible visible image watermarking with authentication. Signal Process Image Commun 25:10–17CrossRefGoogle Scholar
  35. 35.
    Wang N, Men C (2012) Reversible fragile watermarking for 2-D vector map authentication with localization. Comput Aided Des 44:320–330CrossRefGoogle Scholar
  36. 36.
    Widrow B, Hoff ME Jr (1960) Adaptive switching circuits. IRE WESCON Convention Record, 96104Google Scholar
  37. 37.
    Wu X (1997) Lossless compression of continuous-tone images via context selection, quantization, and modeling. IEEE Trans Image Process 6(5):656–664CrossRefGoogle Scholar
  38. 38.
    Wu X, Liang X, Liu H, Huang J, Qiu G (2006) Reversible semi-fragile image authentication using zernike moments and integer Wavelete transform, Digital Rights Management. Technologies, Issues, Challenges and systems. LNCS in Computer Science 3919:135–145Google Scholar
  39. 39.
    Yang CY, Hu WC, Lin CH (2010) Reversible data hiding by coefficient-bias algorithm. J Inf Hiding Multimed Signal Process 1(2):91–100Google Scholar
  40. 40.
    Zhao Z, Luo H, Lu ZM, Pan JS (2011) Reversible data hiding based on multilevel histogram modification and sequential recovery. Int J Electron Commun 65:814–826CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  • Zahra Pakdaman
    • 1
  • Saeid Saryazdi
    • 1
  • Hossein Nezamabadi-pour
    • 1
  1. 1.Department of Electrical EngineeringShahid Bahonar University of KermanKermanIran

Personalised recommendations