A Novel Image Degradation Scheme Based on Reversible Watermarking

Article Preview

Abstract:

In some business applications, the rough content of a digital image can be accessed through public channel, but the detailed image can only be achieved by some interested buyers who pay for the key. Reversible visible watermarking provides a kind of protection, but covers parts of image. In this paper, we utilize the relationship between embedding capacity and visual distortion, and proposed a novel image degradation scheme for copyright protection based on reversible difference expansion watermarking. Experiment results show that our scheme degrades the images uniformly, and the general content is still available. And the legal users with key can restore the original image with full details and extract the copyright proof.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

958-962

Citation:

Online since:

July 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Y. Hu, S. Kwong, J. Huang, An algorithm for removable visible watermarking, IEEE Trans. Circuits Syst. Video Technol., 16(1), 2006, p.129–133.

DOI: 10.1109/tcsvt.2005.858742

Google Scholar

[2] Y. Hu, B. Jeon, Reversible visible watermarking and lossless recovery of original images, IEEE Trans. Circuits Syst. Video Technol., 16(11), 2006, p.1423–1429.

DOI: 10.1109/tcsvt.2006.884011

Google Scholar

[3] J. Tian, Reversible watermarking using a difference expansion, IEEE Trans. Circuits Syst. Video Technol., 13(8), 2003, p.890–896.

DOI: 10.1109/tcsvt.2003.815962

Google Scholar

[4] D. M. Thodi, J. J. Rodriguez, Reversible watermarking by prediction-error expansion, In: Proceedings of the 2004 Southwest Symposium on Image Analysis and Interpretation, 2004, pp.21-25.

DOI: 10.1109/iai.2004.1300937

Google Scholar

[5] Hyoung Joong Kim, Vasiliy Sachnev, Yun Qing Shi, Jeho Nam, and Hyon-Gon Choo, A novel difference expansion transform for reversible data embedding, IEEE Trans. Inf. Forensics Security, 3(3), 2008, pp.456-465.

DOI: 10.1109/tifs.2008.924600

Google Scholar