Abstract
Reversible data hiding, in which the stago-media can be reversed to the original cover media exactly, has attracted increasing interests from the data hiding community. In this study, the existing reversible data hiding algorithms, including some newest schemes, have been classified into three categories: 1) Those developed for fragile authentication; 2) Those developed for achieving high data embedding capacity; 3) Those developed for semi-fragile authentication. In each category, some prominent representatives are selected. The principles, merits, drawbacks and applications of these algorithms are analyzed and addressed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. on Image Processing 6(12), 1673–1687 (1997)
Huang, J., Shi, Y.Q.: An adaptive image watermarking scheme based on visual masking. Electronics Letters 34(8), 748–750 (1998)
Chen, B., Wornell, G.W.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Transaction on Information Theory 47(4), 1423–1443 (2001)
Barton, J.M.: Method and apparatus for embedding authentication information within digital data. U.S. Patent 5, 646, 997 (1997)
Honsinger, C.W., Jones, P., Rabbani, M., Stoffel, J.C.: Lossless recovery of an original image containing embedded data. US Patent 6, 278,791 (2001)
Gonzalez, R.C., Woods, R.E.: Digital Image Processing. Prentice Hall, Upper Saddle River (2001)
Fridrich, J., Goljan, M., Du, R.: Invertible authentication. In: Proc. SPIE, Security and Watermarking of Multimedia Contents, San Jose, CA, January 2001, pp. 197–208 (2001)
Fridrich, J., Goljan, M., Du, R.: Invertible Authentication Watermark for JPEG Images. In: Proc. IEEE ITCC 2001, Las Vegas, Nevada, April 2001, pp. 223–227 (2001)
Fridrich, J., Du, R.: Lossless Authentication of MPEG-2 Video. In: Proc. IEEE ICIP 2002, Rochester, NY (2002)
Goljan, M., Fridrich, J., Du, R.: Distortion-free data embedding. In: Proceedings of 4th Information Hiding Workshop, Pittsburgh, PA, April 2001, pp. 27–41 (2001)
Xuan, G., Zhu, J., Chen, J., Shi, Y.Q., Ni, Z., Su, W.: Distortionless Data Hiding Based on Integer Wavelet Transform. IEE journal, ELECTRONICS LETTERS 38(25), 1646–1648 (2002)
Xuan, G., Shi, Y.Q., Ni, Z.C., Chen, J., Yang, C., Zhen, Y., Zhen, J.: High capacity lossless data hiding based on integer wavelet transform. In: IEEE International Symposium on Circuits and Systems, Vancouver, Canada (May 2004)
Celik, M., Sharma, G., Tekalp, A.M., Saber, E.: Reversible data hiding. In: Proceedings of the International Conference on Image Processing 2002, Rochester, NY (September 2002)
Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. In: IEEE International Symposium on Circuits and Systems, Bangkok, Thailand (May 2003)
Tian, J.: Reversible data embedding using a difference expansion. IEEE Transaction on Circuits and Systems for Video Technology 13(8) (August 2003)
Xuan, G., Shi, Y.Q., Ni, Z.: Lossless data hiding using integer wavelet transform and spread spectrum. In: IEEE International Workshop on Multimedia Signal Processing, Siena, Italy (September 2004)
Yang, B., Schmucker, M., Funk, W., Busch, C., Sun, S.: Integer DCT-based reversible watermarking for images using companding technique. In: Proceedings of SPIE, January 2004, vol. 5306 (2004)
Xuan, G., Shi, Y.Q., Ni, Z.: Reversible data hiding using integer wavelet transform and companding technique. In: Cox, I., Kalker, T., Lee, H.-K. (eds.) IWDW 2004. LNCS, vol. 3304, pp. 1–12. Springer, Heidelberg (2005)
Zhang, Z., Sun, Q., Lin, X., Shi, Y.Q., Ni, Z.: A unified authentication framework for JPEG 2000 images. In: IEEE International Conference and Expo., Taipei, Taiwan (June 2004)
De Vleeschouwer, C., Delaigle, J.F., Macq, B.: Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Tran. Multimedia 5, 97–105 (2003)
Bender, W., Gruhl, D., Mprimoto, N., Lu, A.: Techniques for data hiding. IBM Systems Journal 35(3,4), 313–336 (1996)
Ni, Z., Shi, Y.Q., Ansari, N., Su, W., Sun, Q., Lin, X.: Robust lossless data hiding. In: IEEE International Conference and Expo., Taipei, Taiwan (June 2004)
Zou, D., Shi, Y.Q., Ni, Z.: lossless data hiding. In: IEEE International Workshop on Multimedia Signal Processing, Siena, Italy (September 2004)
Thodi, M., RodrÃguez, J.J.: Reversible watermarking by prediction-error expansion. In: Proceedings of 6th IEEE Southwest Symposium on Image Analysis and Interpretation, Lake Tahoe, CA, USA, March 28-30, pp. 21–25 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shi, Y.Q. (2005). Reversible Data Hiding. In: Cox, I.J., Kalker, T., Lee, HK. (eds) Digital Watermarking. IWDW 2004. Lecture Notes in Computer Science, vol 3304. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31805-7_1
Download citation
DOI: https://doi.org/10.1007/978-3-540-31805-7_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24839-2
Online ISBN: 978-3-540-31805-7
eBook Packages: Computer ScienceComputer Science (R0)