International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 4 | Issue 4 | Year 2013 | Article Id. IJCTT-V4I4P104 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I4P104

Evaluation of Lossless Watermarking Techniques


Dr.Smitha Rao

Citation :

Dr.Smitha Rao, "Evaluation of Lossless Watermarking Techniques," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 4, pp. 467-471, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I4P104

Abstract

One of the mechanisms to deter unauthorized copy and distribution of digital media is Digital Watermarking. Digital watermarking involves embedding of identifying information into the digital content which can be later recovered for verification and authentication. In conventional watermarking schemes certain amount of distortion to the recovered image is acceptable. This does not apply to all applications, particularly in military applications, space and medical imagery etc., loss of a single bit of information from the original image is not acceptable. Reversible watermarking is a novel category of watermarking schemes that can not only strengthen the ownership of the original media but also can completely recover the original media from the watermarked media. In reversible watermarking, the embedding process has an additional burden of embedding extra information in the payload that includes the recovery data that is used by the decoder to reconstruct the original image bit by bit. Thus the payload consists of the authentication information and recovery data. Reversible watermarking is especially suitable for the applications that require high quality images like for certain applications of digital media such as for legal evidence, digital commerce, security surveillance etc. any modification/tampering done to media has to be detected. Various lossless watermarking schemes are discussed in this paper.

Keywords

Reversible Coding, PSNR, Histogram modification, Difference Expansion, DWT, Fragile Watermarking, Blind Watermarking.

References

[1] Tian, J.: ‘Reversible data embedding using a difference expansion’, IEEE Trans. Circuits Syst. Video Technol., 2003,13, (8), pp. 890–896.
[2] Honsinger, C.W., Jones, P., Rabbani, M., and Stoffel, J.C.:‘Lossless recovery of an original image containing embedded data’. US patent no. 6278791, 2001.
[3] Sunil Lee, Chang D. Yoo and Ton Kalker, “Reversible Image Watermarking Based on Integer to Integer wavelet Transform,” IEEE Transactions on Information Forensics and Security, Vol. 2 No. 3, [September 2007].
[4] Krishnan, N.; Selvakumar, R.K.; Rajapandian, S.; Arul Mozhi, K.; Nelson Kennedy Babu, C.; , "A Wavelet Transform Based Digital Image Watermarking and Authentication," India Conference, 2006 Annual IEEE , vol., no., pp.1-6,[Sept. 2006]. 
[5] Ni Z, Shi Y, Ansari N, Su W. Reversible data hiding. In: IEEE proceedings of ISCAS’03, vol. 2. 2003. p. II-912–915  
[6] 
Zhao, Z., H. Luo, Z.M. Lu and J.S. Pan, 2011. Reversible data hiding based on multilevel histogram modification and sequential recovery. AEU-Int. J. Electron. Commun., 65: 814-826.
[7]   A.M. Alattar, ”Reversible Watermarking Using the Difference Expansion of a Generalized Interger Transform”, IEEE Transactions on Image Processing, Vol. 13, No. 8, pp. 1147-1156, 2004
[8]   Hong, W., J. Chen and T.S. Chen, 2009. Blockwise reversible data hiding by contrast mapping. Inform. Technol. J., 8: 1287-1291.
[9]   L. T. Ko, J. E. Chen, H. C. Hsin, Y. S. Shieh, and T. Y. Sung, “A unified algorithm for subband-based discrete cosine transform,” Mathematical Problems in Engineering, vol. 2012, Article ID