Reversible Data Hiding Exploiting Coefficients Histogram in Wavelet Transform Domain

Article Preview

Abstract:

Reversible data hiding has drawn lots of interest in the last a few years. With reversibility, original media can be recovered without any distortion from the marked media after the embedded data has been extracted. In this paper, we present a new scheme which utilizes the wavelet transform and better exploited large variance of wavelet coefficient differences to achieve high capacity and imperceptibility. With the particularity of minor changes in the wavelet coefficients after embedding data, low visual distortion can therefore be obtained in the marked image. Furthermore, an extraordinary attribute of our scheme is that the use of embedding level differs greatly from previous schemes. Experimental results showed that the performance our scheme outperforms the state-of-the-art reversible data hiding schemes.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3164-3167

Citation:

Online since:

January 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] M. Awrangjeb: Proc. Sixth International Conf. on Computer and Information Technology, Jahangirnagar University, Bangladesh, p.75–79, (2003).

Google Scholar

[2] J. Fridrich, M. Goljan, and R. Du: Proc. of the SPIE, Security and Watermarking of Multimedia Contents, San Jose, Vol. 4314, CA, p.197–208, (2001).

Google Scholar

[3] M.U. Celik, G. Sharma, and A.M. Tekalp: Proc. IEEE International Conf. on Image Processing, Rochester, NY, p.157–160, (2002).

Google Scholar

[4] M.U. Celik, G. Sharma, A.M. Tekalp, and E. Saber,: IEEE Trans. on Image Proc. Vol. 14, No. 2, p.253–266, (2005).

Google Scholar

[5] Z. Ni, Y.Q. Shi, N. Ansari, and W. Su: IEEE Transactions on Circuits and Systems for Video Technology Vol. 16, No. 3, p.354–362, (2006).

DOI: 10.1109/tcsvt.2006.869964

Google Scholar

[6] J. Hwang, J.W. Kim, and J.U. Choi: International Workshop on Digital Watermarking, Lecture Notes in Computer Science, Korea, Vol. 4283, p.348–361, (2006).

Google Scholar

[7] W.-C. Kuo, D.-J. Jiang, and Y.-C. Huang: International Conf. on Intelligent Computing, Lecture Notes in Artificial Intelligence, Qing Dao, China, Vol. 4682, p.1152–1161, 2007.

Google Scholar

[8] K.-S. Kim, M.-J. Lee, H.-Y. Lee, and H.-K. Lee: Pattern Recognition, Vol. 42, pp.3083-3096, (2009).

Google Scholar

[9] G. Xuan, Y.Q. Shi, J. Chen, J. Zhu, and Z. Ni, W. Su: IEEE International Workshop on Multimedia Signal Processing, St. Thomas, Virgin Islands, USA, (2002).

Google Scholar

[10] J. Tian: IEEE Trans. on Circuits and Systems for Video Technology Vol. 13, No. 8, p.890–896, (2003).

Google Scholar

[11] S. Lee, C.D. Yoo, and T. Kalker: IEEE Trans. on Information Forensics and Security Vol. 2, No. 3, p.321–330, (2007).

Google Scholar