Reversible data hiding

被引:1870
作者
Ni, ZC
Shi, YQ
Ansari, N
Su, W
机构
[1] New Jersey Inst Technol, Dept Elect & Comp Engn, Newark, NJ 07102 USA
[2] USA, Commun Elect RD&E Ctr, Intelligence & Informat Warfare Directorate, Ft Monmouth, NJ 07703 USA
关键词
histogram modification; reversible (lossless) data hiding; watermarking;
D O I
10.1109/TCSVT.2006.869964
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A novel reversible data hiding algorithm, which can recover the original image without any distortion from the marked image after the hidden data have been extracted, is presented in this paper. This algorithm utilizes the zero or the minimum points of the histogram of an image and slightly modifies the pixel grayscale values to embed data into the image. It can embed more data than many of the existing reversible data hiding algorithms. It is proved analytically and shown experimentally that the peak signal-to-noise ratio (PSNR) of the marked image generated by this method versus the original image is guaranteed to be above 48 dB. This lower bound of PSNR is much higher than that of all reversible data hiding techniques reported in the literature. The computational complexity of our proposed technique is low and the execution time is short. The algorithm has been successfully applied to a wide range of images, including commonly used images, medical images, texture images, aerial images and all of the 1096 images in CorelDraw database. Experimental results and performance comparison with other reversible data hiding schemes are presented to demonstrate the validity of the proposed algorithm.
引用
收藏
页码:354 / 362
页数:9
相关论文
共 20 条
[1]  
[Anonymous], DATA COMMUNICATIONS
[2]  
Bender W., 1996, IBM SYST J, V35, DOI DOI 10.1147/SJ.353.0313
[3]   Wavelet transforms that map integers to integers [J].
Calderbank, AR ;
Daubechies, I ;
Sweldens, W ;
Yeo, BL .
APPLIED AND COMPUTATIONAL HARMONIC ANALYSIS, 1998, 5 (03) :332-369
[4]  
Celik MU, 2002, 2002 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL II, PROCEEDINGS, P157
[5]   Quantization index modulation: A class of provably good methods for digital watermarking and information embedding [J].
Chen, B ;
Wornell, GW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (04) :1423-1443
[6]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[7]   Factoring wavelet transforms into lifting steps [J].
Daubechies, I ;
Sweldens, W .
JOURNAL OF FOURIER ANALYSIS AND APPLICATIONS, 1998, 4 (03) :247-269
[8]   Circular interpretation of histogram for reversible watermarking [J].
De Vleeschouwer, C ;
Delaigle, JF ;
Macq, B .
2001 IEEE FOURTH WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, 2001, :345-350
[9]   Invertible authentication [J].
Fridrich, J ;
Gojan, M ;
Du, R .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS III, 2001, 4314 :197-208
[10]  
Goljan M., 2001, 4th Information Hiding Workshop, LNCS, V2137, P27, DOI DOI 10.1007/3-540-45496-9