Advertisement

Reversible Data Hiding

  • Yun Q. Shi
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3304)

Abstract

Reversible data hiding, in which the stago-media can be reversed to the original cover media exactly, has attracted increasing interests from the data hiding community. In this study, the existing reversible data hiding algorithms, including some newest schemes, have been classified into three categories: 1) Those developed for fragile authentication; 2) Those developed for achieving high data embedding capacity; 3) Those developed for semi-fragile authentication. In each category, some prominent representatives are selected. The principles, merits, drawbacks and applications of these algorithms are analyzed and addressed.

Keywords

Data Hiding Marked Image Reversible Data Reversible Data Hiding Reversible Watermark 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. on Image Processing 6(12), 1673–1687 (1997)CrossRefGoogle Scholar
  2. 2.
    Huang, J., Shi, Y.Q.: An adaptive image watermarking scheme based on visual masking. Electronics Letters 34(8), 748–750 (1998)CrossRefGoogle Scholar
  3. 3.
    Chen, B., Wornell, G.W.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Transaction on Information Theory 47(4), 1423–1443 (2001)MathSciNetCrossRefzbMATHGoogle Scholar
  4. 4.
    Barton, J.M.: Method and apparatus for embedding authentication information within digital data. U.S. Patent 5, 646, 997 (1997)Google Scholar
  5. 5.
    Honsinger, C.W., Jones, P., Rabbani, M., Stoffel, J.C.: Lossless recovery of an original image containing embedded data. US Patent 6, 278,791 (2001)Google Scholar
  6. 6.
    Gonzalez, R.C., Woods, R.E.: Digital Image Processing. Prentice Hall, Upper Saddle River (2001)Google Scholar
  7. 7.
    Fridrich, J., Goljan, M., Du, R.: Invertible authentication. In: Proc. SPIE, Security and Watermarking of Multimedia Contents, San Jose, CA, January 2001, pp. 197–208 (2001)Google Scholar
  8. 8.
    Fridrich, J., Goljan, M., Du, R.: Invertible Authentication Watermark for JPEG Images. In: Proc. IEEE ITCC 2001, Las Vegas, Nevada, April 2001, pp. 223–227 (2001)Google Scholar
  9. 9.
    Fridrich, J., Du, R.: Lossless Authentication of MPEG-2 Video. In: Proc. IEEE ICIP 2002, Rochester, NY (2002)Google Scholar
  10. 10.
    Goljan, M., Fridrich, J., Du, R.: Distortion-free data embedding. In: Proceedings of 4th Information Hiding Workshop, Pittsburgh, PA, April 2001, pp. 27–41 (2001)Google Scholar
  11. 11.
    Xuan, G., Zhu, J., Chen, J., Shi, Y.Q., Ni, Z., Su, W.: Distortionless Data Hiding Based on Integer Wavelet Transform. IEE journal, ELECTRONICS LETTERS 38(25), 1646–1648 (2002)CrossRefGoogle Scholar
  12. 12.
    Xuan, G., Shi, Y.Q., Ni, Z.C., Chen, J., Yang, C., Zhen, Y., Zhen, J.: High capacity lossless data hiding based on integer wavelet transform. In: IEEE International Symposium on Circuits and Systems, Vancouver, Canada (May 2004)Google Scholar
  13. 13.
    Celik, M., Sharma, G., Tekalp, A.M., Saber, E.: Reversible data hiding. In: Proceedings of the International Conference on Image Processing 2002, Rochester, NY (September 2002)Google Scholar
  14. 14.
    Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. In: IEEE International Symposium on Circuits and Systems, Bangkok, Thailand (May 2003)Google Scholar
  15. 15.
    Tian, J.: Reversible data embedding using a difference expansion. IEEE Transaction on Circuits and Systems for Video Technology 13(8) (August 2003)Google Scholar
  16. 16.
    Xuan, G., Shi, Y.Q., Ni, Z.: Lossless data hiding using integer wavelet transform and spread spectrum. In: IEEE International Workshop on Multimedia Signal Processing, Siena, Italy (September 2004)Google Scholar
  17. 17.
    Yang, B., Schmucker, M., Funk, W., Busch, C., Sun, S.: Integer DCT-based reversible watermarking for images using companding technique. In: Proceedings of SPIE, January 2004, vol. 5306 (2004)Google Scholar
  18. 18.
    Xuan, G., Shi, Y.Q., Ni, Z.: Reversible data hiding using integer wavelet transform and companding technique. In: Cox, I., Kalker, T., Lee, H.-K. (eds.) IWDW 2004. LNCS, vol. 3304, pp. 1–12. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  19. 19.
    Zhang, Z., Sun, Q., Lin, X., Shi, Y.Q., Ni, Z.: A unified authentication framework for JPEG 2000 images. In: IEEE International Conference and Expo., Taipei, Taiwan (June 2004)Google Scholar
  20. 20.
    De Vleeschouwer, C., Delaigle, J.F., Macq, B.: Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Tran. Multimedia 5, 97–105 (2003)CrossRefGoogle Scholar
  21. 21.
    Bender, W., Gruhl, D., Mprimoto, N., Lu, A.: Techniques for data hiding. IBM Systems Journal 35(3,4), 313–336 (1996)CrossRefGoogle Scholar
  22. 22.
    Ni, Z., Shi, Y.Q., Ansari, N., Su, W., Sun, Q., Lin, X.: Robust lossless data hiding. In: IEEE International Conference and Expo., Taipei, Taiwan (June 2004)Google Scholar
  23. 23.
    Zou, D., Shi, Y.Q., Ni, Z.: lossless data hiding. In: IEEE International Workshop on Multimedia Signal Processing, Siena, Italy (September 2004)Google Scholar
  24. 24.
    Thodi, M., Rodríguez, J.J.: Reversible watermarking by prediction-error expansion. In: Proceedings of 6th IEEE Southwest Symposium on Image Analysis and Interpretation, Lake Tahoe, CA, USA, March 28-30, pp. 21–25 (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Yun Q. Shi
    • 1
  1. 1.Department of Electrical and Computer EngineeringNew Jersey Institute of TechnologyNewarkUSA

Personalised recommendations