Reversible visible watermarking and lossless recovery of original images

被引:74
作者
Hu, Yongjian [1 ]
Jeon, Byeungwoo
机构
[1] Sungkyunkwan Univ, Sch Informat & Commun Engn, Suwon 440746, South Korea
[2] S China Univ Technol, Coll Automat Sci & Engn, Guangzhou 510641, Peoples R China
基金
中国国家自然科学基金;
关键词
data compression; data hiding; lossless watermark; reversible watermarking; visible watermark;
D O I
10.1109/TCSVT.2006.884011
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we propose a reversible visible watermarking algorithm to satisfy a new application scenario where the visible watermark serves as a tag or ownership identifier, but can be completely removed to resume the original image data. It includes two procedures: data hiding and visible watermark embedding. In order to losslessly recover both the watermark-covered and nonwatermark-covered image contents at the receiver end, the payload consists of two reconstruction data packets, one for recovering the watermark-covered region, and the other for the nonwatermark-covered region. The data hiding technique reversibly hides the payload in the image region not covered by the visible watermark. To satisfy the requirements of large capacity and high image quality, our hiding technique is based on data compression and uses a payload-adaptive scheme. It further adopts error diffusion for improving subjective image quality and arithmetic compression using a character-based model for increasing computational efficiency. The visible watermark is securely embedded based on a user-key-controlled embedding mechanism. The data hiding and the visible watermark embedding procedures are integrated into a secure watermarking system by a specially designed user key.
引用
收藏
页码:1423 / 1429
页数:7
相关论文
共 15 条
  • [1] Awrangjeb M, 2004, LECT NOTES COMPUT SC, V2939, P581
  • [2] Lossless watermarking for image authentication: A new framework and an implementation
    Celik, MU
    Sharma, G
    Tekalp, AM
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2006, 15 (04) : 1042 - 1049
  • [3] Celik MU, 2005, IEEE T IMAGE PROCESS, V12, P157
  • [4] Circular interpretation of bijective transformations in lossless watermarking for media asset management
    De Vleeschouwer, C
    Delaigle, JF
    Macq, B
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2003, 5 (01) : 97 - 105
  • [5] FRIDRICH J, P SPIE SEC WAT MULT, V4314, P197
  • [6] Fridrich J., 2001, PROC ACM WORKSHOP MU, P27, DOI DOI 10.1145/1232454.1232466
  • [7] Honsinger C. W., 2001, 6 278 79, Patent No. [6278791, 6,278,791]
  • [8] An algorithm for removable visible watermarking
    Hu, YJ
    Kwong, S
    Huang, JW
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2006, 16 (01) : 129 - 133
  • [9] Attacking visible watermarking schemes
    Huang, CH
    Wu, JL
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2004, 6 (01) : 16 - 30
  • [10] Reversible data embedding into images using wavelet techniques and sorting
    Kamstra, L
    Heijmans, HJAM
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2005, 14 (12) : 2082 - 2090