A Tamper Localization Approach for Reversible Watermarking based on Histogram Bin Shifting

被引:0
作者
Yadav, Awadhesh Kumar [1 ]
Naskar, Ruchira [1 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Rourkela, Odisha, India
来源
2015 IEEE POWER, COMMUNICATION AND INFORMATION TECHNOLOGY CONFERENCE (PCITC-2015) | 2015年
关键词
Digital watermarking; Hash; Image histogram; Reversible watermarking; Tamper localization;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we have proposed a tamper localization approach for histogram bin shifting based reversible watermarking algorithm, where original image can be obtained from the watermarked image without any distortion. The tamper localization approach finds out the tampered region of the image, which is used for the selective rejection of the cover image. General application of reversible watermarking procedure says that the entire image gets rejected at receiver side due to the hash mismatch and authentication failure. By using our approach when the hash mismatch occurs the selected part of the image is rejected. This will reduce the retransmission overhead on the communication channel and limited bandwidth is required due to small subpart of retransmission of the image. We are taking the advantage of the minimum and maximum point of the histogram for embedding purpose. This will increase the embedding capacity. We have embedded the hash into smaller subpart of the image until embedding is possible. This will help us to find out the tampered region at the receiver end while extracting the hash. The case of hash mismatch in cover image which will lead to selective rejection of the cover image.
引用
收藏
页码:721 / 726
页数:6
相关论文
共 10 条
[1]   Techniques for data hiding [J].
Bender, W ;
Gruhl, D ;
Morimoto, N ;
Lu, A .
IBM SYSTEMS JOURNAL, 1996, 35 (3-4) :313-336
[2]  
Feng J.B., 2006, IJ Network Security, V2, P161
[3]   Invertible authentication [J].
Fridrich, J ;
Gojan, M ;
Du, R .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS III, 2001, 4314 :197-208
[4]   Embedding image watermarks in DC components [J].
Huang, JW ;
Shi, YQ ;
Shi, Y .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2000, 10 (06) :974-979
[5]   Reversible image authentication based on watermarking [J].
Lee, Sang-Kwang ;
Suh, Young-Ho ;
Ho, Yo-Sung .
2006 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO - ICME 2006, VOLS 1-5, PROCEEDINGS, 2006, :1321-1324
[6]  
Liang X., 2008, P WORLD C ENG COMP S, P22
[7]   A Generalized Tamper Localization Approach for Reversible Watermarking Algorithms [J].
Naskar, Ruchira ;
Chakraborty, Rajat Subhra .
ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2013, 9 (03)
[8]   Reversible data hiding [J].
Ni, ZC ;
Shi, YQ ;
Ansari, N ;
Su, W .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2006, 16 (03) :354-362
[9]   Image-adaptive watermarking using visual models [J].
Podilchuk, CI ;
Zeng, WJ .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) :525-539
[10]  
Tian J., 2002, Proceedings of workshop on multimedia and security p, P19