Robust lossless image data hiding designed for semi-fragile image authentication

被引:149
作者
Ni, Zhicheng [1 ]
Shi, Yun Q. [1 ]
Ansari, Nirwan
Su, Wei [2 ]
Sun, Qibin [3 ]
Lin, Xiao [3 ]
机构
[1] New Jersey Inst Technol, Dept Elect & Comp Engn, Newark, NJ 07102 USA
[2] USA, Commun Elect RD&E Ctr, Ft Monmouth, NJ 07703 USA
[3] Inst Infocomm Res, Singapore 119613, Singapore
关键词
lossless data hiding; reversible data hiding; robust lossless data hiding; semi-fragile authentication; watermarking;
D O I
10.1109/TCSVT.2008.918761
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recently, among various data hiding techniques, a new subset, lossless data hiding, has received increasing interest. Most of the existing lossless data hiding algorithms are, however, fragile in the sense that the hidden data cannot be extracted out correctly after compression or other incidental alteration has been applied to the stego-image. The only existing semi-fragile (referred to as robust in this paper) lossless data hiding technique, which is robust against high-quality JPEG compression, is based on modulo-256 addition to achieve losslessness. In this paper, we first point out that this technique has suffered from the annoying salt-and-pepper noise caused by using modulo-256 addition to prevent overflow/underflow. We then propose a novel robust lossless data hiding technique, which does not generate salt-and-pepper noise. By identifying a robust statistical quantity based on the patchwork theory and employing it to embed data, differentiating the bit-embedding process based on the pixel group's distribution characteristics, and using error correction codes and permutation scheme, this technique has achieved both losslessness and robustness. It has been successfully applied to many images, thus demonstrating its generality. The experimental results show that the high visual quality of stego-images, the data embedding capacity, and the robustness of the proposed lossless data hiding scheme against compression are acceptable for many applications, including semi-fragile image authentication. Specifically, it has been successfully applied to authenticate losslessly compressed JPEG2000 images, followed by possible transcoding. It is expected that this new robust lossless data hiding algorithm can be readily applied in the medical field, law enforcement, remote sensing and other areas, where the recovery of original images is desired.
引用
收藏
页码:497 / 509
页数:13
相关论文
共 15 条
[1]   Techniques for data hiding [J].
Bender, W ;
Gruhl, D ;
Morimoto, N ;
Lu, A .
IBM SYSTEMS JOURNAL, 1996, 35 (3-4) :313-336
[2]  
Celik MU, 2002, 2002 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL II, PROCEEDINGS, P157
[3]   Circular interpretation of bijective transformations in lossless watermarking for media asset management [J].
De Vleeschouwer, C ;
Delaigle, JF ;
Macq, B .
IEEE TRANSACTIONS ON MULTIMEDIA, 2003, 5 (01) :97-105
[4]  
FRIDRICH J, 2001, P SPIE PHOTONICS W 3, V397, P197
[5]  
Goljan M., 2001, 4th Information Hiding Workshop, LNCS, V2137, P27, DOI DOI 10.1007/3-540-45496-9
[6]  
Honsinger C. W., 2001, 6 278 79, Patent No. [6278791, 6,278,791]
[7]  
*ISO IEC, 2000, 1544482007 ISOIEC
[8]   Robust lossless image data hiding [J].
Ni, ZC ;
Shi, YQ ;
Ansari, N ;
Su, W ;
Sun, QB ;
Lin, X .
2004 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXP (ICME), VOLS 1-3, 2004, :2199-2202
[9]  
Ni ZC, 2003, PROCEEDINGS OF THE 2003 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL II, P912
[10]  
Proakis J. G., 2008, Digital communications, V5th