A Reversible Watermarking Based on Histogram Shifting
In this paper, we propose a reversible watermarking algorithm where an original image can be recovered from watermarked image data. Most watermarking algorithms cause degradation of image quality in original digital content in the process of embedding watermark. In the proposed algorithm, the original image can be obtained when the degradation is removed from the watermarked image after extracting watermark information. In the proposed algorithm, we utilize a peak point of image histogram and the location map and modify pixel values slightly to embed data. Because the peak point of image histogram and location map are employed in this algorithm, there is no need of extra information transmitted to receiving side. Also, because a slight modification on pixel values is conducted, highly imperceptibly images can be achieved. As locations of watermark embedding are identified using location map, amount of watermark data can dramatically increases through recursive embedding. Experimental results show that it can embed 5K to 130K bits of additional data.
KeywordsOriginal Image Minimum Point Maximum Point Watermark Image Information Hiding
Unable to display preview. Download preview PDF.
- 1.Ni, Z., Shi, Y.Q., Ansari, N., Wei, S.: Reversible data Hiding. In: ISCAS Proceedings of the 2003 International Symposium on Circuits and Systems, Thailand, May 2003, vol. 2, pp. II-912–II-915 (2003)Google Scholar
- 2.Fridrich, J., Goljan, J., Du, R.: Invertible authentication. In: SPIE Proceedings of Security and Watermarking of Multimedia Content, San Jose, pp. 197–208 (January 2002)Google Scholar
- 3.Fridrich, J., Goljan, M.: Lossless data embedding for all image formats. In: SPIE Proceedings of Photonics West, Electronic Imaging, Security and Watermarking of Multimedia Contents, San Jose, vol. 4675, pp. 572–583 (January 2002)Google Scholar
- 4.Tian, J.: High capacity reversible data embedding and content authentication. In: IEEE Proceedings of International Conference on Acoustics, Speech, and Signal Processing, Hong Kong, vol. 3, pp. III-517–520 (April 2003)Google Scholar
- 6.Tian, J.: Wavelet-based reversible watermarking for authentication. In: Proceedings of SPIE Sec. and Watermarking of Multimedia Contents IV, vol. 4675 (January 2002)Google Scholar
- 7.Celik, M.U., Sharma, G., Tekalp, A.M., Saber, E.: Reversible data hiding. In: Proc. Of the IEEE International Conference on Image Processing, vol. II, pp. 157–160 (September 2002)Google Scholar
- 8.Xuan, G., Zhu, J., Chen, J., Shi, Y.Q., Ni, Z., Su, W.: Distortionless Data Hiding Based on Integer Wavelet Transform. IEE Electronics Letters, 1646–1648 (December 2002)Google Scholar
- 9.Feng, J., Lin, I., Tsai, C., Chu, Y.: Reversible Watermarking: Current Status and Key Issues. International Journal of Network Security 2(3), 161–171 (2006)Google Scholar