skip to main content
10.1145/1937728.1937742acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicimcsConference Proceedingsconference-collections
research-article

Reliable embedding for robust reversible watermarking

Published:30 December 2010Publication History

ABSTRACT

It has been demonstrated that De. Vleeschouwer's histogram rotation (HR) scheme suffers from serious "salt-and-pepper" noise in the watermarked images. Recently, some improved methods are proposed to handle this problem. However they are at the cost of capacity. For this purpose, we first develop a reliable histogram rotation method based on block selection (RHR-BS) to avoid the flipping of pixels and to improve the invisibility and reversibility of HR. In view of a little reduction of capacity in RHR-BS, a reliable HR method based on pixel adjustment (RHR-PA) is then proposed, which modulates the range of grayscale values of pixels to remove the "salt-and-pepper" noise in HR, and to avoid the decrease of capacity in RHR-BS. Extensive experiments are conducted to show the effectiveness of the proposed RHR-BS and RHR-PA.

References

  1. L. An, X. Gao, C. Deng, and F. Ji. Reversible watermarking based on statistical quantity histogram. Lecture Notes in Computer Science, vol. 5879, pp. 1300--1305, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. L. An, X. Gao, C. Deng, and F. Ji. Robust lossless data hiding: analysis and evaluation. In Proc. Int. Conf. High Performance Computing & Simulation, pp. 512--516, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  3. C. De Vleeschouwer, J. Delaigle, and B. Macq. Circular interpretation of histogram for reversible watermarking. In Proc. IEEE Workshop Multimedia Signal Processing, pp. 345--350, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  4. C. De Vleeschouwer, J. Delaigle, and B. Macq. Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans. Multimedia, vol. 5, no. 1, pp. 97--105, Mar. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. C. Deng, X. Gao, X. Li, and D. Tao. A local Tchebichef moments-based robust image watermarking. Signal Processing, vol. 89, no. 8, pp. 1531--1539, Aug. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. X. Gao, L. An, X. Li, and D. Tao. Reversibility improved lossless data hiding. Signal Processing, vol. 89, no. 10, pp. 2053--2065, Oct. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Z. Ni, Y. Shi, N. Ansari, W. Su, Q. Sun, and X. Lin. Robust lossless image data hiding designed for semi-fragile image authentication. IEEE Trans. Circuits Syst. Video Technol., vol. 18, no. 4, pp. 497--509, Apr. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. G. Xuan, Y. Shi, P. Chai, X. Cui, Z. Ni, and X. Tong. Optimum histogram pair based image lossless data embedding. Lecture Notes in Computer Science, vol. 5510, pp. 84--102, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. Zou, Y. Shi, Z. Ni, and W. Su. A semi-fragile lossless digital watermarking scheme based on integer wavelet transform. IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 10, pp. 1294--1300, Oct. 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Reliable embedding for robust reversible watermarking

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICIMCS '10: Proceedings of the Second International Conference on Internet Multimedia Computing and Service
      December 2010
      218 pages
      ISBN:9781450304603
      DOI:10.1145/1937728
      • General Chairs:
      • Yong Rui,
      • Klara Nahrstedt,
      • Xiaofei Xu,
      • Program Chairs:
      • Hongxun Yao,
      • Shuqiang Jiang,
      • Jian Cheng

      Copyright © 2010 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 30 December 2010

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate163of456submissions,36%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader