Advertisement

A New Robust Reversible Watermarking Method in the Transform Domain

  • Rasha ThabitEmail author
  • Bee Ee Khoo
Conference paper
  • 1.7k Downloads
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 291)

Abstract

Robust (or semi-fragile) reversible watermarking methods have been proposed to provide robustness against unintentional attacks (e.g., noise addition, JPEG compression). This kind of watermarking schemes has recently attracted more attention. This paper presents a new robust reversible watermarking scheme in the transform domain. In the proposed method, the Slantlet transform (SLT) matrix has been used to transform small blocks of the original image and the mean values of the SLT coefficients in the high frequency subbands have been shifted to carry the watermark bits. The problem of overflow/underflow has been avoided by using the histogram modification according to specific rules. The results prove that the proposed method is completely reversible with improved capacity, robustness, and invisibility.

Keywords

Robust reversible watermarking (RRW) Histogram modification Reversibility Slantlet transform (SLT) Matrix multiplication 

References

  1. 1.
    Kuo W, Jiang D, Huang Y (2007) Reversible data hiding based on histogram. In: Huang D.-S, Heutte L, Loog M (eds) ICIC 2007, LNCS(LNAI) 4682. Springer, Berlin, pp 1152–1161Google Scholar
  2. 2.
    An L, Gao X, Deng C, Ji F (2009) Reversible watermarking based on statistical quantity histogram. In: Muneesawang P et al (eds) PCM 2009, LNCS 5879. Springer, Berlin pp 1300–1305Google Scholar
  3. 3.
    Xuan G, Shi YQ, Chai P, Cui X, Ni Z, Tang X (2008) Optimum histogram pair based image lossless data embedding. In: Shi YQ, Kim H-j, Katzebeisser S (eds) IWDW 2007, LNCS 5041. Springer, Berlin, pp 264–278Google Scholar
  4. 4.
    De Vleeschouwer C, Delaigle J, Macq B (2003) Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans Multimedia 5(1):97–105CrossRefGoogle Scholar
  5. 5.
    Ni Z, Shi YQ, Ansari N, Su W, Sun Q, Lin X (2008) Robust lossless image data hiding designed for semi-fragile image authentication. IEEE Trans Circuits Syst Video Technol 18(4):497–509CrossRefGoogle Scholar
  6. 6.
    An L, Gao X, Deng C (2010) Reliable embedding for robust reversible watermarking. In: Proceedings of the second international conference on internet multimedia computing and service (ICIMCS’10), Harbin, China, pp 57–60Google Scholar
  7. 7.
    Zou D, Shi Y, Ni Z, Su W (2006) A semi-fragile lossless digital watermarking scheme based on integer wavelet transform. IEEE Trans Circuits Syst Video Technol 16(10):1294–1300CrossRefGoogle Scholar
  8. 8.
    An L, Gao X, Deng C, Ji F (2010) Robust lossless data hiding: analysis and evaluation. In: Proceedings of international conference on high performance computing and simulation (HPCS 2010), Caen, France, pp 512–516Google Scholar
  9. 9.
    Selesnick IW (1999) The slantlet transform. IEEE Trans Signal Process 47(2):1304–1313CrossRefzbMATHMathSciNetGoogle Scholar
  10. 10.
    Mulcahy C (1997) Image compression using the haar wavelet transform. Spelman Sci Math J 1:22–31Google Scholar

Copyright information

© Springer Science+Business Media Singapore 2014

Authors and Affiliations

  1. 1.School of Electrical and Electronic EngineeringUniversity Sains MalaysiaPenangMalaysia

Personalised recommendations