Evaluation of Lossless Watermarking Techniques

International Journal of Computer Trends and Technology (IJCTT)          
© - April Issue 2013 by IJCTT Journal
Volume-4 Issue-4                           
Year of Publication : 2013
Authors :Dr.Smitha Rao


Dr.Smitha Rao "Evaluation of Lossless Watermarking Techniques"International Journal of Computer Trends and Technology (IJCTT),V4(4):467-471 April Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: -One of the mechanisms to deter unauthorized copy and distribution of digital media is Digital Watermarking. Digital watermarking involves embedding of identifying information into the digital content which can be later recovered for verification and authentication. In conventional watermarking schemes certain amount of distortion to the recovered image is acceptable. This does not apply to all applications, particularly in military applications, space and medical imagery etc., loss of a single bit of information from the original image is not acceptable. Reversible watermarking is a novel category of watermarking schemes that can not only strengthen the ownership of the original media but also can completely recover the original media from the watermarked media. In reversible watermarking, the embedding process has an additional burden of embedding extra information in the payload that includes the recovery data that is used by the decoder to reconstruct the original image bit by bit. Thus the payload consists of the authentication information and recovery data. Reversible watermarking is especially suitable for the applications that require high quality images like for certain applications of digital media such as for legal evidence, digital commerce, security surveillance etc. any modification/tampering done to media has to be detected. Various lossless watermarking schemes are discussed in this paper.


[1] Tian, J.: ‘Reversible data embedding using a difference expansion’, IEEE Trans. Circuits Syst. Video Technol., 2003,13, (8), pp. 890–896.
[2] Honsinger, C.W., Jones, P., Rabbani, M., and Stoffel, J.C.:‘Lossless recovery of an original image containing embedded data’. US patent no. 6278791, 2001.
[3] Sunil Lee, Chang D. Yoo and Ton Kalker, “Reversible Image Watermarking Based on Integer to Integer wavelet Transform,” IEEE Transactions on Information Forensics and Security, Vol. 2 No. 3, [September 2007].
[4] Krishnan, N.; Selvakumar, R.K.; Rajapandian, S.; Arul Mozhi, K.; Nelson Kennedy Babu, C.; , "A Wavelet Transform Based Digital Image Watermarking and Authentication," India Conference, 2006 Annual IEEE , vol., no., pp.1-6,[Sept. 2006].
[5] Ni Z, Shi Y, Ansari N, Su W. Reversible data hiding. In: IEEE proceedings of ISCAS’03, vol. 2. 2003. p. II-912–915
[6] Zhao, Z., H. Luo, Z.M. Lu and J.S. Pan, 2011. Reversible data hiding based on multilevel histogram modification and sequential recovery. AEU-Int. J. Electron. Commun., 65: 814-826.

Keywords — Reversible Coding, PSNR, Histogram modification, Difference Expansion, DWT, Fragile Watermarking, Blind Watermarking