A High-Performance Robust Reversible Data Hiding Algorithm Based on Polar Harmonic Fourier Moments

被引:20
作者
Ma, Bin [1 ]
Tao, Zhongquan [1 ]
Ma, Ruihe [2 ]
Wang, Chunpeng [1 ]
Li, Jian [1 ]
Li, Xiaolong [3 ]
机构
[1] Qilu Univ Technol, Shandong Acad Sci, Sch Comp Sci & Technol, Jinan 250353, Peoples R China
[2] Jilin Univ, Sch Econ, Changchun 130015, Peoples R China
[3] Beijing Jiaotong Univ, Sch Comp & Informat Technol, Beijing 100044, Peoples R China
基金
中国国家自然科学基金;
关键词
Histograms; Distortion; Transforms; Prediction algorithms; Watermarking; Visualization; Deformation; Robust reversible data hiding; polar harmonic Fourier moments; geometric deformation; quantization index modulation algorithm; two-dimensional; IMAGE WATERMARKING; TRANSFORM;
D O I
10.1109/TCSVT.2023.3311483
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Aiming at the problem of most Robust Reversible Data Hiding (RRDH) schemes failing to anti geometric deformation attacks, a new RRDH algorithm based on Polar Harmonic Fourier Moments (PHFMs) is presented in this paper, thereby enhancing both the robustness of the embedded data and perceptual quality of the data-embedded image. Firstly, by leveraging the anti-geometric transformation and high-fidelity features of PHFMs, the image is transformed into its frequency domain for RRDH. Then, a quantitation index modulation (QIM) algorithm is designed to embed secret data into the integer part of PHFMs coefficients. By minimizing the differences between the secret-data-embedded image and the original image, the amount of compensation data is reduced. Meanwhile, a two-dimensional RDH scheme is further adopted to embed the compensation data, thus reducing the distortion of the full data-embedded image. Finally, the robustness of the embedded data and the fidelity of the full data-embedded image are both improved. The combination of PHFMs transformation and two-dimensional RDH enables the proposed RRDH algorithm to achieve high visual quality and strong resistance capability against geometric transformation attacks. Extensive experimental results demonstrate that the proposed RRDH algorithm outperforms other state-of-the-art techniques.
引用
收藏
页码:2763 / 2774
页数:12
相关论文
共 39 条
[1]   Robust watermarking based on modified Pigeon algorithm in DCT domain [J].
AlShaikh, Muath ;
Alzaqebah, Malek ;
Jawarneh, Sana .
MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (02) :3033-3053
[2]   Lossless generalized-LSB data embedding [J].
Celik, MU ;
Sharma, G ;
Tekalp, AM ;
Saber, E .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2005, 14 (02) :253-266
[3]   DCT-based image watermarking using subsampling [J].
Chu, WC .
IEEE TRANSACTIONS ON MULTIMEDIA, 2003, 5 (01) :34-38
[4]  
Coltuc D, 2007, PROC SPIE, V6505
[5]   An Improved Watermarking Technique for Copyright Protection Based on Tchebichef Moments [J].
Ernawan, Ferda ;
Kabir, Muhammad Nomani .
IEEE ACCESS, 2019, 7 :151985-152003
[6]   Lossless robust image watermarking by using polar harmonic transform [J].
Hu, Runwen ;
Xiang, Shijun .
SIGNAL PROCESSING, 2021, 179
[7]   Cover-Lossless Robust Image Watermarking Against Geometric Deformations [J].
Hu, Runwen ;
Xiang, Shijun .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2021, 30 :318-331
[8]   Difference Expansion Based Reversible Data Hiding Using Two Embedding Directions [J].
Hu, Yongjian ;
Lee, Heung-Kyu ;
Chen, Kaiying ;
Li, Jianwei .
IEEE TRANSACTIONS ON MULTIMEDIA, 2008, 10 (08) :1500-1512
[9]   A Robust Image Watermarking Scheme Using Z-Transform, Discrete Wavelet Transform and Bidiagonal Singular Value Decomposition [J].
Jayashree, N. ;
Bhuyaneswaran, R. S. .
CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 58 (01) :263-285
[10]   A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression [J].
Kang, XG ;
Huang, JW ;
Shi, YQ ;
Lin, Y .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2003, 13 (08) :776-786