Skip to main content
Log in

Threshold controlled scheme of difference expansion techniques for reversible watermarking

  • Published:
Journal of Shanghai Jiaotong University (Science) Aims and scope Submit manuscript

Abstract

Since Tian Jun proposed the difference expansion embedding technique, based on which, many reversible watermarking techniques were proposed. However, these methods do not perform well when the payload is high. In this paper, we proposed an expandable difference threshold controlled scheme for these three methods. Experiments show that our scheme improves the performance of these three methods for heavy payload.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Thodi D M, Rodriguez J J. Expansion embedding techniques for reversible watermarking [J]. IEEE Transactions on Image Processing, 2007, 16(3): 721–730.

    Article  MathSciNet  Google Scholar 

  2. Macq B. Lossless multiresolution transform for image authenticating watermarking [C]// Proceedings of the 10th European Signal Processing Conference. Tampere, Finland: EUSIPCO, 2000: 533–536.

    Google Scholar 

  3. Honsinger C W, Jones P W, Rabbani M, et al. Lossless recovery of an original image containing embedded data [P]. U.S. Patent: 6 278 791. 2001-01-01.

  4. Bender W, Gruhl D, Morimoto N, et al. Techniques for data hiding [J]. IBM Systems Journal, 1996, 35(3–4): 313–335.

    Article  Google Scholar 

  5. Fridrich J, Goljan M, Du R. Invertible authentication [J]. Proc SPIE, 2001, 4314: 197–208.

    Article  Google Scholar 

  6. Celik M U, Sharma G, Tekalp M, et al. Lossless generalized-LSB data embedding [J]. IEEE Transactions on Image Processing, 2005, 14(2): 253–266.

    Article  Google Scholar 

  7. Fridrich J, Goljan M, Du R. Lossless data embedding for all image formats [J]. Proc SPIE, 2002, 4675: 572–583.

    Article  Google Scholar 

  8. Kalker T, Willems F M J. Capacity bounds and constructions for reversible data-hiding [J]. Proc SPIE, 2003, 5020: 604–611.

    Article  Google Scholar 

  9. Tian J. Reversible data embedding using a difference expansion [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2003, 13(8): 890–896.

    Article  Google Scholar 

  10. Alattar A M. Reversible watermark using the difference expansion of a generalized integer transform [J]. IEEE Transactions on Image Processing, 2004, 13(8): 1147–1156.

    Article  MathSciNet  Google Scholar 

  11. Kamstra L, Heijmans H J A M. Reversible data embedding into images using wavelet techniques and sorting [J]. IEEE Transactions on Image Processing, 2005, 14(12): 2082–2090.

    Article  MathSciNet  Google Scholar 

  12. Giakoumaki A, Pavlopoulos S, Koutsouris D. Multiple image watermarking applied to health information management [J]. IEEE Transactions on Information Technology in Biomedicine, 2006, 10(4): 722–732.

    Article  Google Scholar 

  13. Kuhn M. JBIG-KIT [EB/OL]. (2009-11-20) [2000-05-06]. http://www.cl.cam.ac.uk/~mgk25/jbigkit/.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jun Zhao  (赵 俊).

Additional information

Foundation item: the National High Technology Research and Development Program (863) of China (No. 2007AA02Z452) and the National Natural Science Foundation of China (Nos. 30570511 and 30770589)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Jiang, Lj., Guo, Xt., Yang, H. et al. Threshold controlled scheme of difference expansion techniques for reversible watermarking. J. Shanghai Jiaotong Univ. (Sci.) 15, 541–548 (2010). https://doi.org/10.1007/s12204-010-1046-7

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12204-010-1046-7

Key words

CLC number

Navigation