Watermarking Capacity Control for Dynamic Payload Embedding

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 361)

Abstract

Despite significant improvements in capacity-distortion performance, a computationally efficient capacity control is still lacking in the recent watermarking schemes. In this paper, we propose an efficient capacity control framework to substantiate the notion of watermarking capacity control to be the process of maintaining “acceptable” distortion and running time, while attaining the required capacity. The necessary analysis and experimental results on the capacity control are reported to address practical aspects of the watermarking capacity problem, in dynamic (size) payload embedding.

Keywords

Capacity control dynamic payload embedding capacity fragile watermarking 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Alattar, A.M.: Reversible watermark using difference expansion of quads. In: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 3, pp. 377–380. IEEE (2004)Google Scholar
  2. 2.
    Celik, M.U., Sharma, G., Tekalp, A.M., Saber, E.: Lossless generalized-lsb data embedding. IEEE Transactions on Image Processing 14, 253–266 (2005)CrossRefGoogle Scholar
  3. 3.
    Chen, X., Li, X., Yang, B., Tang, Y.: Reversible image watermarking based on a generalized integer transform. In: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, pp. 2382–2385. IEEE (2010)Google Scholar
  4. 4.
    Coatrieux, G., Pan, W., Cuppens, B.N., Cuppens, F., Roux, C.: Reversible watermarking based on invariant image classification and dynamic histogram shifting. IEEE Transactions on Information Forensics and Security 8, 111–120 (2013)CrossRefGoogle Scholar
  5. 5.
    Coltuc, D., Chassery, J.M.: Very fast watermarking by reversible contrast mapping. IEEE Signal Processing Letters 14(4), 255–258 (2007)CrossRefGoogle Scholar
  6. 6.
    Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, ch. 2, 3rd edn. MIT Press (2011)Google Scholar
  7. 7.
    The USC-SIPI image database, http://sipi.usc.edu/database
  8. 8.
    De Vleeschouwer, C., Delaigle, J.F., Macq, B.: Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Transactions on Multimedia 5, 97–105 (2003)CrossRefGoogle Scholar
  9. 9.
    Fridrich, J., Goljan, M., Du, R.: Lossless data embedding-new paradigm in digital watermarking. EURASIP Journal on Applied Signal Processing 2002(1), 185–196 (2002)CrossRefMATHGoogle Scholar
  10. 10.
    Guo, X., Zhuang, T.G.: A region-based lossless watermarking scheme for enhancing security of medical data. Journal of Digital Imaging 22, 53–64 (2009)CrossRefGoogle Scholar
  11. 11.
    Hu, Y., Lee, H.K., Li, J.: DE-based reversible data hiding with improved overflow location map. IEEE Transactions on Circuits and Systems for Video Technology 19, 250–260 (2009)CrossRefGoogle Scholar
  12. 12.
    Kamstra, L., Heijmans, H.J.: Reversible data embedding into images using wavelet techniques and sorting. IEEE Transactions on Image Processing 14, 2082–2090 (2005)CrossRefMathSciNetGoogle Scholar
  13. 13.
    Kim, H.J., Sachnev, V., Shi, Y.Q., Nam, J., Choo, H.G.: A novel difference expansion transform for reversible data embedding. IEEE Transactions on Information Forensics and Security 3, 456–465 (2008)CrossRefGoogle Scholar
  14. 14.
    Kim, K.S., Lee, M.J., Lee, H.Y., Lee, H.K.: Reversible data hiding exploiting spatial correlation between sub-sampled images. Pattern Recognition 42, 3083–3096 (2009)CrossRefMATHGoogle Scholar
  15. 15.
    Lee, S., Yoo, C.D., Kalker, T.: Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Transactions on Information Forensics and Security 2, 321–330 (2007)CrossRefGoogle Scholar
  16. 16.
    Lin, C.C., Tai, W.L., Chang, C.C.: Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recognition 41, 3582–3591 (2008)CrossRefMATHGoogle Scholar
  17. 17.
    Ni, Z., Shi, Y.Q., Ansari, N., Su, W., Sun, Q., Lin, X.: Robust lossless image data hiding designed for semi-fragile image authentication. IEEE Transactions on Circuits and Systems for Video Technology 18, 497–509 (2008)CrossRefGoogle Scholar
  18. 18.
    Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology 16(3), 354–362 (2006)CrossRefGoogle Scholar
  19. 19.
    Nyeem, H.: A digital watermarking framework with application to medical image security. Ph.D. thesis, QUT, School of Electrical Eng. and Computer Science, Australia (July 2014)Google Scholar
  20. 20.
    Nyeem, H., Boles, W., Boyd, C.: Developing a digital image watermarking model. In: Proceedings of 13th International Conference on Digital Image Computing: Techniques and Applications, pp. 468–473. IEEE, Piscataway (2011)Google Scholar
  21. 21.
    Nyeem, H., Boles, W., Boyd, C.: A review of medical image watermarking requirements for teleradiology. Journal Digital Imaging 26, 326–343 (2013)CrossRefGoogle Scholar
  22. 22.
    Nyeem, H., Boles, W., Boyd, C.: Utilizing least significant bit-planes of roni pixels for medical image watermarking. In: Proceedings of 15th International Conference on Digital Image Computing: Techniques and Applications, pp. 1–8. IEEE, Piscataway (2013)Google Scholar
  23. 23.
    Nyeem, H., Boles, W., Boyd, C.: Content-independent embedding scheme for multi-modal medical image watermarking. BioMedical Engineering Online 14(7) (2015)Google Scholar
  24. 24.
    Peng, F., Li, X., Yang, B.: Adaptive reversible data hiding scheme based on integer transform. Signal Processing 92, 54–62 (2012)CrossRefGoogle Scholar
  25. 25.
    Sachnev, V., Kim, H.J., Nam, J., Suresh, S., Shi, Y.Q.: Reversible watermarking algorithm using sorting and prediction. IEEE Transactions on Circuits and Systems for Video Technology 19, 989–999 (2009)CrossRefGoogle Scholar
  26. 26.
    Simpson, M., Biswas, S., Barua, R.: Analysis of compression algorithms for program data. University of Maryland (2003)Google Scholar
  27. 27.
    Thodi, D.M., Rodríguez, J.: Expansion embedding techniques for reversible watermarking. IEEE Transactions on Image Processing 16, 721–730 (2007)CrossRefMathSciNetGoogle Scholar
  28. 28.
    Tian, J.: Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology 13(8), 890–896 (2003)CrossRefGoogle Scholar
  29. 29.
    Tsai, P., Hu, Y.C., Yeh, H.L.: Reversible image hiding scheme using predictive coding and histogram shifting. Signal Processing 89, 1129–1143 (2009)CrossRefMATHGoogle Scholar
  30. 30.
    Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: From error visibility to structural similarity. IEEE Transactions on Image Processing 13(4), 600–612 (2004)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Khulna University of Engineering and Technology (KUET)KhulnaBangladesh
  2. 2.Queensland University of Technology (QUT)BrisbaneAustralia
  3. 3.Norwegian University of Science and Technology (NTNU)TrondheimNorway

Personalised recommendations