IJRIT International Journal of Research in Information Technology, Volume 1, Issue 4, April 2013, Pg. 31-37

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com

ISSN 2001-5569

Comparative Study of Reversible Image Watermarking: Fragile Watermarking Hiren R. Soni 1 1

PG Student, Department of Electronics and Communication, Gujarat Technological University Chandkheda, Gujarat, India 1

[email protected]

Abstract

Reversible watermarking is a novel category of watermarking schemes. It not only can strengthen the ownership of the original media but also can completely recover the original media from the watermarked media. This feature is suitable for some important media, such as medical and military images, because these kinds of media do not allow any losses. The reversible watermarking schemes should have to give better embedding capacity and higher visual quality in terms of PSNR. The aim of this paper is to define the purpose of reversible watermarking, reflecting recent progress, and provide some research issues in terms of higher embedding capacity without degrading visual quality.

Keywords: Difference expansion based method, histogram shifting based method, Interpolation based technique.

1. Introduction Digital watermarking has been widely used to protect the copyright of digital images. In order to strengthen the intellectual property right of a digital image, a trademark of the owner could be selected as a watermark and embedded into the protected image, so that the embedded image is called a watermarked image. Then the watermarked image could be published, and the owner can prove the ownership of a suspected image by extracting the watermark from the watermarked image. There are different kinds of digital watermarking schemes, in that reversible watermarking has become a very popular recently. Compared to traditional watermarking, it can restore the original image through the watermark extracting process; thus, this feature is suitable for some important media, such as medical, biometric, satellite and military images, because these types of media do not allow any losses. Broadly we can classify reversible into three categories: 1) fragile watermarking 2) semi fragile watermarking and 3) robust watermarking. From the literature review we have seen that most of the RW scheme belongs to fragile watermarking schemes. Fragile watermarking means, if the any content gets altered by any kind of intentional or unintentional attacks after embedding, then suspected image is not readable anymore.

Hiren R. Soni , IJRIT

161

There so many reversible watermarking methods have been reported in the literature and classified into three categories: reversible watermarking using data compression, reversible watermarking using difference expansion (DE), and reversible watermarking using histogram shifting operation. In all these categories, the first scheme has complex computation and limited capacity. Tian,[2] has proposed second kind, in that we calculate the differences of neighbouring pixel values, and select some difference values for the difference expansion (DE), so that we have required location map for selection of difference. Third watermarking scheme with low embedding capacity is based on modifying the histogram of an image before embedding,[9]. Intuitively, if the pixel values in a gray scale image do not cover the whole dynamic range, then an erasable watermark can be embedded by using the missing gray scale values. Here, we have implemented basic two methods: Difference expansion based method and Histogram shifting based method. Another method has been implemented which is reversible watermarking scheme using an interpolation technique,[1,3] which can embed a large amount of covert data into images with imperceptible modification. Different from previous watermarking schemes, we utilize the interpolation-error, the difference between interpolation value and corresponding pixel value,

2. Difference expansion based method 2.1. Watermark embedding process 2.1.1 Reversible Integer Transform Here, from (1) to (4) can be used for embedding process, and (5) to (6) can be used for extraction process ,[2] We start with a simple reversible integer transform, which is for an 8 bits gray scale valued pair (x,y), x ,y∈ Z, 0 ≤ x , y ≤ 255 , define their integer average and difference h as,

l = floor((x + y)/2), h = x - y

Eq. (1)

the inverse transform of (1) is

x = l + floor((h + 1)/2) , y=l - floor(h/2)

Eq. (2)

The reversible integer transforms (1) and (2) are also called integer Haar wavelet transform, or the S transform. The reversible integer transforms set up a one-to-one correspondence between (x,y) and (l,h).

From (2), to prevent the overflow and underflow problems, i.e., to restrict x,y, in the range of [0, 255], it is equivalent to have

Hiren R. Soni , IJRIT

162

0 ≤ l + floor((h + 1)/2) ≤ 255 and 0 ≤ l - floor(h/2) ≤ 255,

Since both l and h are integers, one can derive that the above inequalities are equivalent to

|h| ≤ 2(255 - l), and |h| ≤ 2l + 1,

Eq. (3)

It is easy to see that Condition (3) is equivalent to

|h| ≤ 2(255 - l), if 128 ≤ l ≤ 255, |h| ≤ 2l + 1, if 0 ≤ l ≤ 127.

2. Expandable and Changeable Difference Values As we embed a bit into the difference value h by the DE, the new, expanded difference value h' will be

h' = (2 × h) + b,

Eq. (4)

According to Condition (5), to prevent overflow and underflow, h' should satisfy

|h'| ≤ min(2(255 - l),2l + 1)

Eq. (5)

We formulate it as the following. Now, difference value is expandable under the integer average value l if

|2 × h + b| ≤ min(2(255 - l),2l + 1) for both 0 and 1.

As the DE does not change the integer average value l, for simplicity, we will say h is expandable, as an abbreviation of h is expandable under l. For an expandable difference value h, if we embed a bit by the DE, the expanded difference value h' still satisfies Condition (3).

Hiren R. Soni , IJRIT

163

2.2 Watermark extraction process The new pair computed from l and h' via (2) is guaranteed to have grayscale values. Thus expandable difference values are the candidates for the DE. As each integer can be represented by the sum of a multiple of 2 and its LSB, for the new, expanded difference value h' is given by,

h'=2 × floor(h'/2) + LSB(h') where, LSB(h') = 0 or 1.

l = floor ((x' + y')/2), h' = x' - y'

Eq. (5)

the inverse transform of (5) is

x = l + floor ((h' + 1)/2), y = l - floor(h'/2)

Eq. (6)

3. Histogram shifting based method Denoting by h[i], i=0,...,255, the histogram of a gray scale image, let us assume first that the histogram contains an empty bin with index ie, so that h[ie]=0. We first locate the most frequent value in the histogram, imax. without loss of generality, let us assume that the most frequent occurring gray level value, imax, is darker than the gray level values in the range imax to ie(i.e. imax < ie). If we now add 1 to all gray level values in the range imax to ie, then the histogram, is such that , h'[i]=h[i] for i=1,...,imax-1, and for i = ie +1,...,255,since these values are untouched, We also have that h'[imax]=0, since all pixels that formerly had this value have now been incremented by 1. for those level values in the range imax< I ≤ ie, we have h'[i]=h[i-1]. this is achieved by adding 1 to all pixels in the work that have gray level values in the range [imax, ie-1]. the histogram value h'[imax] equals zero. In this new image, we can embed an erasable watermark consisting of h'[imax] bits simply by reserving the value imax for 0 and imax +1 for 1. Note that in the watermarked image, we know that gray level values imax and imax+ 1 were originally equal to imax in the un-watermarked image, [9]. The decoder extracts the massage by following the same embedding path though the watermark work, extracting the bits from gray scale values imax, imax+ 1. After extraction, all pixels with values in the set {imax, imax+ 1} are changed to imax, and all pixels with values imax+ 1 < i ≤ ie are decreased by 1. This restores the original work. The capacity of scan is h[imax] bits and can be increased by applying the same process again to the embedded image.[9] This method requires communication of some overhead the location of the maximum and minimum (gap) in the histogram, which would be 16 bits for greyscale image. This can be done in several different ways. For example, 16 pixels from the work can be put aside using a secret key. These pixels will hold the overhead bit and will not participate in the erasable scheme. The overhead is then embedded in a noninvertible manner in the LSB of the reserved pixels. To reconstruct the original, 16 LSB need to be added to the total payload.

Hiren R. Soni , IJRIT

164

4. Interpolation based technique 4.1 Additive Interpolation-Error Expansion

Essentially, the data embedding approach of the proposed reversible watermarking scheme, namely additive interpolation-error expansion, is a kind of DE. But it is different from most DE approaches:,[1] 1) It uses interpolation errors; instead of inter pixel difference or prediction- error, to embed data. 2) It expands difference, which is interpolation-error here, by addition instead of bit-shifting.

First, interpolation values of pixels are calculated using interpolation technique, which works by guessing a pixel value from its surrounding pixels. Then interpolation-errors are obtained via. e = x - x'

Eq. (7)

Here from (7) to (12) can be used for embedding process and from (13) to (16) can be used for extraction process, [1]. where, x = original image, x' = interpolated image, e = error between x and x'. Let LM and RM denote the corresponding values of the two highest points of interpolation errors histogram and be formulated as LM = arg max (hist(e)),

where, e ∈ E,.

RM = arg max (hist(e)),

where, e ∈ E - {LM}

Eq. (8)

where E is set of error. Where, hist(e) is the number of occurrence when the interpolation-error is equal to e and E denotes the set of interpolation errors. Without loss of generality, assume LM
The additive interpolation error expansion is formulated as e’ = e + sign(e) × b,

where, e = LM or RM

= e + sign(e) × 1,

where, e ∈ (LN,LM) U (RM,RN)

=e

otherwise

Eq. (9)

Where e' is the expanded interpolation-error, b is the bit to be embedded, and sign(.) is a sign function defined as

Hiren R. Soni , IJRIT

165

Sign(e) = 1

where, e ∈ RE

-1

where, e ∈ LE

LN = arg min (hist(e))

where, e ∈ LE

RN = arg min (hist(e))

where, e ∈ RE

Eq. (10)

Eq. (11)

Usually, LM is a very small integer and in most cases 0, while LN is a smaller integer that with no interpolation-error satisfying e = LN. Similarly, in most cases, RM is equal to 1 and RN is a larger integer with no interpolation-error satisfying e = RN. After expansion of interpolation-errors, the watermarked pixels x" become x" = x' + e'

Eq. (12)

During the extracting process, with the same interpolation algorithm we can obtain the same interpolation values x' and the corresponding interpolation-errors via

e' = x" - x'

Eq. (13)

where, x" is watermarked image and x' is interpolated image

Note that (7) is the deformation of (6). Once the same LM, LN, RM, and RN are known, embedded data can be extracted through

b = 0 if e' = LM or RM b = 1 if e' = LM - 1 or RM + 1

Eq. (14)

Then the inverse function of additive interpolation-error expansion is applied to recover the original interpolation-errors

e = e' – sign(e') × b,

where e' ∈ [LM-1,LM] U [RM,RM+1]

e = e' – sign(e') × 1,

where e' ∈ [LN,LM-1) U (RM+1,RN]

e = e',

otherwise

Hiren R. Soni , IJRIT

Eq. (15)

166

Finally, we can restore the original pixels through

x = x' + e

Eq. (16)

The additive interpolation-error expansion is advantageous in three aspects: 1) The distortion of additive expansion is smaller since each pixel is altered at most by 1. 2) No location map is needed to tell between expanded interpolation errors and non expanded ones since they are distinguishable with LM,LN,RM, and RN 3) Interpolation-errors are more expandable than inter pixel differences or prediction-errors, which will be explained in the following section.

4.2 Watermark embedding process This method is mainly composed of two parts for the embedding of the watermark: interpolation and embedding. In the interpolation process, we estimate the interpolated values with the above-mentioned algorithm and calculate the interpolation-errors in the raster scan order. In the embedding process, we will apply additive expansion to interpolation errors and embed the watermark information. The detailed description of the embedding process is given as follows, [1]. 1) Record some original LSB bits of the marginal area as overhead and add “0” to the beginning of boundary map B as a label. Then, assemble overhead and watermark information to form payload. 2) Using (1), calculate interpolation-errors e of the non sample pixels. 3) Work out the frequency of every interpolation-error and find out LM, LN, RM, and RN. Next, scan the coverimage from the beginning and start to undertake the embedding operation. 4) If x ∈{0,255}, put a “0” into the boundary map B and move to the next one. Else, expand e through additive expansion and work out the watermarked pixel x". If x" ∈ {0,255}, put a “1” into the boundary map B. 5) For convenience, let C1 denote the condition when W is not completely embedded, and C2 denote the condition when the current pixel is not the end of non sample pixels. If C1 and C2 are both satisfied, go to Step 4). If C1 is satisfied but C2 is not satisfied, record the length of the boundary map B (denoted by L) and replace the header of B with “1”, Then, calculate the interpolation-errors of the sample pixels and go to Step 3). 6) Embed B, L, LMs, LNs, RMs, and RNs into marginal area of the cover-image using LSB replacement.

4.3 Watermark extraction process The corresponding extracting process is described as follows, [1]. Obtain LMs, LNs, RMs, and RNs, L, the boundary map B from the LSB of marginal area of the watermarked image. Next, scan the watermarked image and undertake the following steps. 1) Extract the first bit of the boundary map B, if it is equal to 0, go to Step (5). 2) Using (1), work out the expanded interpolation-errors e' of the watermarked sample pixels. 3) If x2 ∈ [1,254], recover the interpolation-error e through inverse additive expansion and put the extracted bit into W2. Else, x2 ∈ {0,255}, remove the Lth bit b from B, here, if b is equal to 0, move to the next one, else process like x2 ∈ [1,254]. Do this step until the latter part of payload is extracted. 4) Using (1), calculate the expanded interpolation-errors e' of the watermarked non sample pixels x1. 5) If x1 ∈ [1,254], recover the interpolation-error e using (9) and put the extracted bit into W1, else remove the second bit from B, here, if it is equal to 0, move to the next one, else operate like x1 ∈ [1,254].

Hiren R. Soni , IJRIT

167

6) Decode overhead information and restore the pixels in marginal area once their LSBs are extracted. 7) Go to Step (6) if the former part of payload is not completely extracted. 8) Merge the bits in W1 and W2 to form the watermark information.

5. Experimental results and comparison We have implemented the all three reversible watermarking scheme using MATLAB, and have successfully applied it to standard test images. In all this methods reversibility also proved. In our experiments, we take a random bit string as the watermark message and adopt peak signal-to noise ratio (PSNR) value and bit number (or bpp) as measurements of image quality and embedding capacity, respectively. The watermarked versions of test images (sized 256 x 256, 8-bit grayscale) are placed as examples in Fig.1, Fig.2 and Fig.3, where the visual qualities of them are satisfactory.

Fig. 1 watermarked version of image for difference expansion based method. (a) Lena (31.46 dB with 0.48 bpp); (b) Cameraman (37.62 dB with 0.49 bpp); (c) Medical (30.01 dB with 0.49 bpp)

Fig. 2 watermarked version of image for histogram shifting based method. (a) Lena (44.15 dB with 0.0315 bpp); (b) Cameraman (39.06 dB with 0.0715 bpp); (c) Medical (38.80 dB with 0.135 bpp)

Hiren R. Soni , IJRIT

168

Fig. 3 watermarked version of image for Interpolation expansion based method. (a) Lena (48.61 dB with 0.183 bpp); (b) Cameraman (48.85dB with 0.283 bpp); (c) Medical (48.82 dB with 0.285 bpp)

As shown in Fig.4, Fig.5, and Fig.6 have plotted comparison among all three methods for different images.

(a)

(b)

(c)

Fig. 4 For Lena image. (a) DE based method (b) Histogram shifting based method (c) Interpolation based method

(a)

(b)

(c)

Fig. 5 For Cameraman image. (a) DE based method (b) Histogram shifting based method (c) Interpolation based method

Hiren R. Soni , IJRIT

169

(a)

(b)

(c)

Fig. 6 For Medical image. (a) DE based method (b) Histogram shifting based method (c) Interpolation based method

6. Conclusion and Future work In this paper, reversible watermarking schemes have been presented. The third scheme uses an interpolation technique to embed bit “1” or“0” by expanding it additively or leaving it unchanged. Due to the slight modification of pixels, high image quality is preserved. Experimental results also demonstrate that the third scheme can provide greater payload capacity and higher image fidelity compared with other state-of-the-art schemes. By applying additive expansion to these interpolation errors, we achieve a highly efficient reversible watermarking scheme, which can guarantee high image quality without sacrificing embedding capacity and no any location map is required as an overhead. In future we can find the new interpolation technique which can give the higher embedding capacity and greater visual quality in terms of PSNR.

7. References [1] Lixin luo, Zhenyong Chen, Ming chen, Xiao Zeng, and Zhang Xiong, "Reversible image watermarking using interpolation technique", IEEE transaction on information forensic and security, Vol. 5,1,March 2010. [2] J. Tian, "Reversible data embedding using a difference expansion", IEEE transction circuit system video technol., Vol. 13, no. 8,pp. 890-896, Aug. 2003. [3] Yi Luo, Fei Peng, Xiaolong Li, and Bin Yang, "Reversible image watermarking based on prediction-error expansion and compensation", 978-1-61284-350-6/11 IEEE 2011. [4] Chin-Chen Chang, Wei-Liang Tai, and Kuo-Nan Chen," Lossless Data Hiding Based on Histogram Modification for Image Authentication", IEEE International conference on embedded and ubiquitous computing 2008. [5] Diljith M. Thodi and Jeffrey J. Rodríguez, "Expansion Embedding Techniques for Reversible Watermarking", By Senior Member, IEEE transactions on image processing, vol. 16, no. 3, march 2007. [6] Masoumeh Khodaei, Karim Faez,Reversible, "Reversible Data Hiding By Using Modified Difference Expansion", 2nd International Conference on Signal Processing Systems (ICSPS) 2010. [7] J. Hwang, J. W. Kim, and J. U. Choi, "A reversible watermarking based on histogram shifting", in Int. workshop on digital watermarking, Lecture notes in computer science, Jeju Island, Korea, 2006,Vol. 4283, pp 348-361,Springer-Verlag. [8] Jen-Bang Feng, Iuon-Chang Lin, Chwei-Shyong Tsai, and Yen-Ping Chu,"Reversible Watermarking: Current Status and Key Issues", International Journal of Network Security, Vol.2, No.3, PP.161–171, May 2006. [9] Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom, Jessica Fridrich, Ton Kalker, Book, "Digital watermarking and steganography".

Hiren R. Soni , IJRIT

170

Comparative Study of Reversible Image Watermarking: Fragile ...

1 PG Student, Department of Electronics and Communication, Gujarat ... this paper is to define the purpose of reversible watermarking, reflecting recent progress ...

1MB Sizes 1 Downloads 321 Views

Recommend Documents

Comparative Study of Reversible Image Watermarking: Fragile ...
Status and Key Issues", International Journal of Network Security, Vol.2, No.3, PP.161–171, May 2006. [9] Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom, ...

Comparative Study of Reversible Image Watermarking
1 PG Student, Department of Electronics and Communication, Gujarat Technological University. Chandkheda, Gujarat, India. 1 [email protected]. Abstract.

Comparative Study of Reversible Image ...
Hiren R. Soni , IJRIT. 161. IJRIT International Journal of Research in Information Technology, Volume 1, Issue 4, April 2013, Pg. 31-37. International Journal of ...

Comparative Study of Reversible Image ...
Reversible watermarking is a novel category of watermarking schemes. It not only can strengthen the ownership of the original media but also can completely recover the original media from the watermarked media. This feature is suitable for some impor

Variable Threshold Based Reversible Watermarking
Similarly, Bilal et al. proposed a fast method based on Dynamic Programming. (DP) [6]. ... able to embed depth maps generated through other advanced approaches [21]. ..... [25] http://www.securityhologram.com/about.php. [26] ENHANCING ...

Intelligent reversible watermarking and authentication ...
Jun 29, 2012 - ... Korea University of Technology and Education Cheonan, Chungnam, ...... A. Khan et al. / Information Sciences 216 (2012) 155–175. 171 ...

Reversible Watermarking for 3D Cameras: Hiding ...
DCT is applied on a small window around a pixel and the focus val- ue is calculated by accumulating ... versible data hiding technique using adaptive threshold for depth map hiding in its cover image, in section 6 we ..... by controlling the lens pos

A COMPARATIVE STUDY OF NURSING EDUCATIONAL SYSTEM ...
Retrying... Whoops! There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Main menu. Whoops! There was a problem previewing A COMPARATIVE STUDY OF NURSING EDUCATI

A COMPARATIVE STUDY OF DISCRIMINATIVE ...
Center for Signal and Image Processing, Georgia Institute of Technology. 75 Fifth ... we call cross-layer acoustic modeling in that the model discrimina- tion is often at ..... lated cross-layer error cost embedded on the WSJ0 LVCSR database.

Reversible Image Data Hiding With Contrast Enhancement ieee.pdf ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Reversible ...

Separable Reversible Data Hiding in Encrypted Image - International ...
issues, general overview of cryptography approaches and about the different steganographic algorithms like Least. Significant Bit (LSB) algorithm. It also compares those algorithms in means of speed, accuracy and security. Keywords: Data hiding, Data

Separable Reversible Data Hiding in Encrypted Image - International ...
It also compares those algorithms in means of speed, accuracy and security. Keywords: ... reversible data hiding technique is in IPR protection, authentication, military, medical and law .... Engineering Department for their support and help.

Color Image Watermarking Based on Fast Discrete Pascal Transform ...
It is much more effective than cryptography as cryptography does not hides the existence of the message. Cryptography only encrypts the message so that the intruder is not able to read it. Steganography [1] needs a carrier to carry the hidden message

Robust Image Watermarking Based on Local Zernike ...
Signal Processing Laboratory, School of Electrical Engineering and INMC, ..... to check whether the suspect image is corrupted by resizing or scal- ing attacks.

A STUDY OF Comparative anatomy of papillary muscles of human ...
A STUDY OF Comparative anatomy of papillary muscles of human, sheep, cow and pig.pdf. A STUDY OF Comparative anatomy of papillary muscles of human, ...

comparative study of the micro-structure of quenched ...
Treatment 2006; 48: 405 - 411. 8. Callister Jr WD ... The best earning is that coming from a man's work with his hands and every (lawful) business transaction.

SECTION IV. Current Problems of Comparative-Typological Study of ...
Apr 5, 2013 - ... from the screen. Solinger Bote online: URL: ... as the Australian or Canadian ones) with multiplicity of media, geographical area due to ..... changes in education: sink schools (schools situated in deprived areas in inner city).

SECTION IV. Current Problems of Comparative-Typological Study of ...
Apr 5, 2013 - separation of functioning forms in British and American English (in comparison with Ukrainian), a .... role of definition [Дубенец 2003: 13]. ... substantivization and apocope), pop from 1) popular music „популярна (м

Comparative Study of the Innervation Patterns of the ...
latus are presented in Figure 1, of P. sinaitus in Figure 2, and of C. jacksonii in .... trigeminal before this nerve enters the mandible, and runs medioventrally to the lower jaw to innervate the IMP. Fig. 2. Ventral view of the hyobranchial muscle

Comparative Study of Congestion Control Mechanism of Tcp Variants ...
IJRIT International Journal of Research in Information Technology, Volume 1, Issue 11, November, 2013, Pg. 505-513. International Journal of Research in Information ... Student ,Guru Tegh Bahadur Institute of Technology. Guru Gobind Singh Indraprasth

Comparative Study of Congestion Control Mechanism of Tcp Variants ...
Guide- Mr. Puneet Singh. Student ,Guru Tegh Bahadur Institute of Technology. Guru Gobind Singh Indraprastha University. Sector-16C, Dwarka, New Delhi, ...

A comparative study of ranking methods, similarity ...
An illustration of eA 6 eB is shown in Fig. 6. The following ...... 0. 9. Low amount .31 .31 .36 .37 .40 .40 .99 .99 .99 .81 .50 .50 .38 .29 .29 .15 .15 .15 .02 .02 .02. 0.