A Reversible Watermarking Scheme for 2D Vector Maps

Conference paper
Part of the Advances in Intelligent and Soft Computing book series (AINSC, volume 115)


Reversible watermarking is suitable for hiding data in 2D vector maps, because it can remove the embedding-induced distortions after extracting the hidden bits. This paper proposes a novel reversible watermarking scheme based on the difference shifting. Since the vector map includes a sequence of vertices, we embed the watermark into the vertex coordinates by modifying the differences between the adjacent vertex coordinates. The scheme need not record the extra information. The experimental results show that the proposed scheme achieves good performance of the imperceptibility and is robust against some attacks, such as slightly adding noise, translating, slight scaling and rotating.


digital watermark reversible watermarking difference expansion difference shifting histogram shifting robust 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Honsinger, C.W., Jones, P.W., Rabbani, M., Stoffel, J.C.: Lossless recovery of an original image containing embedded data. US Patent, Docket No: 77102 (1999)Google Scholar
  2. 2.
    Goljan, M., Fridrich, J.J., Du, R.: Distortion-Free Data Embedding for Images. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 27–41. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  3. 3.
    Fridrich, J.: Lossless data embedding—new paradigm in digital watermarking. EURASIP Journal on Applied Signal Processing, 185–196 (2002)Google Scholar
  4. 4.
    Celik, M.U., Sharma, G., Tekalp, A.M., Saber, E.: Reversible data hiding. In: Proceedings of International Conference on Image Processing, pp. 157–160 (2002)Google Scholar
  5. 5.
    Xuan, G., Zhu, J., Chen, J., Shi, Y.Q., Ni, Z.C., Su, W.: Distortionless data hiding based on integer wavelet transform. Electronics Letters 38(25), 1646–1648 (2003)CrossRefGoogle Scholar
  6. 6.
    De Vleeschouwer, C., Delaigle, J.F., Macq, B.: Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Transactions on Multimedia 5(1), 97–105 (2003)CrossRefGoogle Scholar
  7. 7.
    Tian, J.: Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology 13(8), 890–896 (2003)CrossRefGoogle Scholar
  8. 8.
    Alattar, A.M.: Reversible watermark using the difference expansion of a generalized integer transform. IEEE Transactions on Image Processing 13(8), 1147–1156 (2004)MathSciNetCrossRefGoogle Scholar
  9. 9.
    Chang, C.C., Lu, T.C.: A difference expansion oriented data hiding scheme for restoring the original host images. The Journal of Systems & Software 79(12), 1754–1766 (2006)CrossRefGoogle Scholar
  10. 10.
    Cho, J., Prost, R., Jung, H.: An oblivious watermarking for 3-D polygonal meshes using distribution of vertex norms. IEEE Transactions on Signal Processing 55(1), 142–155 (2007)MathSciNetCrossRefGoogle Scholar
  11. 11.
    Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology 16(3), 354–362 (2006)CrossRefGoogle Scholar
  12. 12.
    Thodi, D.M., Rodriguez, J.J.: Expansion embedding techniques for reversible watermarking. IEEE Transactions on Image Processing 16(3), 721–730 (2007)MathSciNetCrossRefGoogle Scholar
  13. 13.
    Voigt, M., Yang, B., Busch, C.: Reversible watermarking of 2d-vector data. In: Proc. ACM Int. Workshop on Multimedia and Security, Magdeburg, Germany, pp. 160–165 (2004)Google Scholar
  14. 14.
    Gou, H., Wu, M.: Data hiding in curves with applications to map fingerprinting. IEEE Trans. Signal Process. 53(4), 3988–4005 (2005)MathSciNetGoogle Scholar
  15. 15.
    Gou, H., Wu, M.: Fingerprinting Curves. In: Cox, I., Kalker, T., Lee, H.-K. (eds.) IWDW 2004. LNCS, vol. 3304, pp. 13–28. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  16. 16.
    Wang, X.T., Shao, C.Y., Xu, X.G., Niu, X.M.: Reversible Data-Hiding Scheme for 2-D Vector Maps Based on Difference Expansion. IEEE Transactions on Information Forensics and Security 2(3 Part 1), 311–320 (2007)Google Scholar

Copyright information

© Springer-Verlag GmbH Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.Department of MathematicsChina Jiliang UniversityHangzhouP.R. China

Personalised recommendations