A Reversible Watermarking Algorithm Resistant to Image Geometric Transformation

A Reversible Watermarking Algorithm Resistant to Image Geometric Transformation

Jian Li, Jinwei Wang, Shuang Yu, Xiangyang Luo
Copyright: © 2019 |Pages: 14
DOI: 10.4018/IJDCF.2019010108
Article PDF Download
Open access articles are freely available for download

Abstract

This article proposes a novel robust reversible watermarking algorithm. The proposed watermarking scheme is reversible because the original image can be recovered after extracting watermarks from the watermarked image, as long as it is not processed by an attacker. The scheme is robust because watermarks can still be extracted from watermarked images, even if it is undergone some malicious or normal operations like rotation and JPEG compression. It first selects two circles, which are centred at the centroid and the centre of image. Then, statistic quantities of these two circles are employed for robust watermark embedding by altering the pixels' value. The side information generated by above embedding process will be embedded as fragile watermarks at another stage to ensure the recovery of original image. Experimental results verify the high performance of the proposed algorithm in resisting various attacks, including JPEG compression and geometric transformation.
Article Preview
Top

Introduction

Reversible watermarking has been one of the hottest research topics in information hiding domain over the past two decades. Unlike the traditional one (Wang and Zhu, 2015), this technique can extract the hidden data and recover host image to be its original condition losslessly. This reversibility feature is widely used in military, medical and other sensitive fields. Creating a new space by losslessly compressing one bit-plane of image to embed data was first proposed by (Fridrich, Goljan & Du, 2001). Tian (2003) proposed a difference expansion (DE) algorithm by calculating pixel difference to afford more capacity. In addition, prediction-error expansion (PEE) was proposed by Thodi and Rordriguez (2004). The existing reversible watermarking algorithms (Wang, Li, Yang & Guo, 2010; Li, Yang & Zeng, 2011; Chen, Sun, Sun, Zhou & Zhang, 2013; Li, Zhang, Gui & Yang, 2013; Ou, Li, Zhao, Ni & Shi, 2013; Wang & Zhu, 2015)) are mostly based on the aforementioned DE, PEE and histogram shift (HS) techniques. However, they are designed for lossless environment. That is the host image must be transmitted without any attacks such as image compression, geometric attacks, noise etc. Otherwise, the embedded information will no longer be extracted exactly.

Aiming at the problem above, Vleeschouwer et al. (Vleeschouwer, Delaigle & Macq, 2003) proposed a robust reversible method against JPEG compression. By a special circular interpretation of bijective transformation, this method embeds secret data losslessly. At the receiving end, if the host does no experience any attacks, the embedded data can be extracted correctly and the host can be restored to be the same as the initial state. Besides, the hidden data can be still extracted accurately after JPEG compression to some extent. Henceforth, we call such technology as robust lossless data hiding. The drawback of Vleeschouwe et al.’s algorithm is that it may generate salt-pepper noise and spoil the visual quality of host image. In 2008, Ni et al. (Ni, Shi, Ansari, Su, Sun & Lin, 2008) presented a robust lossless algorithm based on statistic histogram modification. The performance of Ni et al.’s method regarding PSNR and robustness is much better than the aforementioned one. Then, a similar scheme was presented by Li (2012). Besides these two schemes carried out in spatial domain, a framework for distortion-free robust image authentication was proposed by Coltuc (2007). This general framework embeds robust data in frequency domain and fragile ones in spatial domain with two stages, which provides inspiration to our work in this paper. Liu et al. (Liu, Ju, Hu, Ma & Zhao, 2015) adopted an intra-prediction model to embed data into integer DCT coefficients in frequency domain. Gao et al. (An, Gao, Li, Tao, Deng & Li, 2012) provided a robust reversible framework based on clustering and wavelet transformation. However, in these above robust lossless schemes, the most focus of robustness is resisting to image compression. Little attention is payed to geometric attacks such as rotation, scale and translation (RST).

Complete Article List

Search this Journal:
Reset
Volume 16: 1 Issue (2024)
Volume 15: 1 Issue (2023)
Volume 14: 3 Issues (2022)
Volume 13: 6 Issues (2021)
Volume 12: 4 Issues (2020)
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing