Home   >   CSC-OpenAccess Library   >    Manuscript Information
Reversible Data Hiding Using Contrast Enhancement Approach
Amjed S. Al-Fahoum, Mohammed Yaser
Pages - 248 - 265     |    Revised - 15-05-2013     |    Published - 30-06-2013
Volume - 7   Issue - 3    |    Publication Date - June 2013  Table of Contents
MORE INFORMATION
KEYWORDS
Reversible Data Hiding, Histogram, Stenography, Performance, Watermarking.
ABSTRACT
Reverse Data Hiding is a technique used to hide the object's data details. This technique is used to ensure the security and to protect the integrity of the object from any modification by preventing intended and unintended changes. Digital watermarking is a key ingredient to multimedia protection. However, most existing techniques distort the original content as a side effect of image protection. As a way to overcome such distortion, reversible data embedding has recently been introduced and is growing rapidly. In reversible data embedding, the original content can be completely restored after the removal of the watermark. Therefore, it is very practical to protect legal, medical, or other important imagery. In this paper a novel removable (lossless) data hiding technique is proposed. This technique is based on the histogram modification to produce extra space for embedding, and the redundancy in digital images is exploited to achieve a very high embedding capacity. This method has been applied to various standard images. The experimental results have demonstrated a promising outcome and the proposed technique achieved satisfactory and stable performance both on embedding capacity and visual quality. The proposed method capacity is up to 129K bits with PSNR between 42-45dB. The performance is hence better than most exiting reversible data hiding algorithms.
1 CiteSeerX 
2 refSeek 
3 Scribd 
4 SlideShare 
5 PdfSR 
. A. van Leest, M. van der Veen, and F. Bruekers, “Reversible Image Watermarking,” in Proc.Int. Conf. Image Processing, Vol. 2, pp. 731-734, 2003.
. B. Chen and G. W. Wornell, “Quantization index modulation: a class of provably good methods for digital watermarking and information embedding,” IEEE Trans. Inf. Theory, vol.47, no. 4, pp. 1423–1443, May 2001.
. B. Macq and F. Deweyand, “Trusted headers for medical images,” presented at the DFG VIII-D II Watermarking Workshop, Erlangen, Germany, Oct. 1999.
. B.Macq and J.Quisquater. "Cryptology for Digital TV broadcasting," Proc. Of IEEE. Vol. 83.No.6, pp 944-957, June 1995.
. C. De Vleeschouwer, J. F. Delaigle, and B. Macq, “Circular interpretation on histogram for reversible watermarking,” in IEEE Int. Multimedia Signal Process. Workshop, France, pp.345–350, Oct. 2001.
. C. T. Hsu and J. L. Wu: Hidden Digital Watermarks in Images, IEEE Transactions on Image Processing,,58-68, 1999.
. C. W. Honsinger, P. Jones, M. Rabbani, and J. C. Stoffel, “Lossless Recovery of an Original Image Containing Embedded Data,” U.S. Patent 6 278 791 B1, Aug. 21, 2001.
. Ch. Ch. Chang, Y. H. Huang, H. Y. Tsai, and Ch. Qin," Prediction-based reversible data hiding using the difference of neighboring pixels" International Journal of Electronics and Communication (AEU),vol. 66. issue 9, pp:758:766, 2012.
. Daubechies and W. Sweldens, “Factoring wavelet transforms into lifting steps,” J. Fourier Anal. Appl., vol. 4, pp. 247–269, 1998.
. F. Perez-Gonzlez and F. Balado, “Quantized projection data hiding,” in Proc. IEEE Int. Conf.Image Process., vol. 2, pp. 889–892, Sep. 2002.
. G. Xuan, J. Zhu, J. Chen, Y. Q. Shi, Z. Ni, and W. Su, “Distortion less data hiding based on integer wavelet transform,” IEE Electron. Lett., vol. 38, no. 25, pp. 1646–1648, Dec. 2002.
. G.Braudway, K. Magerlin. And F. Mintezer. "protecting publicity available images with a visual image watermark," Proc. SPIE: optical security and Counterfeit Deterrence Techniques, Vol.2659. pp.126-133, 1996.
. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673–1687, Dec. 1997.
. J. Fridrich, M. Goljan, and R. Du, “Invertible authentication,” in Proc. SPIE Security Watermarking Multimedia Contents, San Jose, CA, pp. 197–208, Jan. 2001,.
. J. Huang and Y. Q. Shi, “An adaptive image watermarking scheme based on visual masking,”Electron. Lett., vol. 34, no. 8, pp. 748–750, 1998.
. J. Huang, Y. Q. Shi, and Y. Shi, “Embedding image watermarks in DC component,” IEEE Trans. Circuits Syst.: Video Technol., vol. 10, no. 6, pp. 974–979, Sep. 2000.
. J. Irvine and D. Harle, Data Communications and Networks: An Engineering Approach. New York: Wiley, 2002.
. J. Tian, “Reversible Data Embedding Using a Difference Expansion,” IEEE Trans. Circuits and Systems for Video Technology, Vol. 13, No. 8, pp. 890-896, 2003.
. J. Y.Park, J. H. Lim, G.S. Kim, and C. S. Won, “Invertible Semi-Fragile Watermarking Algorithm Distinguishing MPEG-2 Compression from Malicious Manipulation,” in Proc. Int.Conf. Consumer Electronics (ICCE ’02), pp.18-19, 2002.
. M. Goljan, J. Fridrich, and R. Du, “Distortion-free data embedding,” in Proc. 4th Inf. Hiding Workshop, Pittsburgh, PA, pp. 27–41, , Apr. 2001.
. M. M. Yeung and F. C. Mintzer, “Invisible watermarking for image verification,” Electron.Imag., vol. 7, no. 3, pp. 578–591, Jul. 1998.
. M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, “Reversible data hiding,” in Proc. IEEE Int. Conf. Image Process., vol. 2, Sep. 2002, pp. 157–160.
. N. Zhichenge, ,Y. Q. Shi,N. Ansari, and W. Su,“ Reversible Data Hiding” IEEE Transactions on circuits and systems for video technology, vol.16, No. 3, March 2006.
. P. Roos, M. A. Viegerver, M.C.A Van Dijke, and J. A. Peters, “Reversible Intraframe of Medical Images,” IEEE Trans. Medical Image, Vol. 7, pp. 328-336, 1998.
. P. Tsai, Y. ChenHu, , H.L. Yeh, "Reversible image hiding scheme using predictive coding and histogram shifting" Signal Processing , pp: 1129-1143, 2009.
. Park, J. Y., Lim, J. H., Kim, G. S. and Won, C.S. “Invertible Semi-Fragile Watermarking Algorithm Distinguishing MPEG-2 Compression from Malicious Manipulation,” in Proc. Int.Conf. Consumer Electronics (ICCE ’02), pp.18-19, 2002.
. R. Calderbank, I. Daubechies, W. Sweldens, and B. Yeo, “Wavelet transforms that map integers to integers,” Appl. Comput. Harmonic Anal., vol. 5, no. 3, pp. 332–369, 1998.
. T. Kalker, and F.M.J Willems, “Capacity Bounds and Code Constructions for Reversible Data-Hiding,” in Proc. Electronic Imaging, Security, and Watermarking of Multimedia Contents V, 2003.
. W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Syst. J., vol.35, no. 3–4, pp. 313–336, 1996.
. W. Hong, T. S. Chen, " A local variance-controlled reversible data hiding method using prediction and histogram-shifting" The Journal of System and Software,vol. 83 (12), pp: 2653-2663, 2010.
. W. Zeng, “Digital watermarking and data hiding: technologies and applications,” in Proc. Int.Conf. Inf. Syst., Anal. Synth., vol. 3, pp. 223–229, , 1998.
. X. Luo, Q. Cheng, and J. Tan, “A Lossless Data Embedding Scheme for Medical Images in Application of E-Diagnosis,” in Proc. IEEE 25th Annual Int. Conf. Engineering in Medicine and Biology Society, Vol. 1, pp. 852-855, 2003.
. Y. K. Lin " High capacity reversible data hiding scheme based upon discrete cosine Transformation" , The Journal of System and Software, vol:85(10), pp:2395-2404, 2012.
. Y. Q. Shi, Z. Ni, D. Zou, and C. Liang, “Lossless data hiding: fundamentals, algorithms and applications,” in IEEE Int. Symp. Circuits Syst., Vancouver, Canada, pp. 33–36, May 2004.
. Yang, Y. and Bao, F. “An Invertible Watermarking Scheme for Authentication of Electronic Clinical Brain Atlas,” in Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing(ICASSP '03), Vol. 3, pp. 533-536, 2003.
. Z. Tirkel, C. F. Osborne, and R. G. Van Schyndel, “Image watermarking a spread spectrum application,” in Proc. IEEE 4th Int. Symp. Spread Spectrum Techn. Applicat., vol. 2, pp. 785–789, Sep. 1996.
. Zou D., Wu, C. W., Xuan, G. and Shi, Y.Q. “A Content-Based Image Authentication System with Lossless Data Hiding,” in Proc. Int. Conf. Multimedia and Expo (ICME '03), Vol. 2, pp.213-216, 2003.
Associate Professor Amjed S. Al-Fahoum
Hijjawi Faculty for Eng. Tech./Biomedi Yarmouk University Irbid,21163 - Jordan
afahoum@yu.edu.jo
Mr. Mohammed Yaser
Hijjawi Faculty for Eng. Tech./Biomedi Yarmouk University Irbid,21163 - Jordan


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS