Abstract
In most reversible watermarking methods, a compressed location map is exploited in order to ensure reversibility. Besides, in some methods, a header containing critical information is appended to the payload for the extraction and recovery process. Such schemes have a highly fragile nature; that is, changing a single bit in watermarked data may prohibit recovery of the original host as well as the embedded watermark. In this paper, we propose a new scheme in which utilizing a compressed location map is completely removed. In addition, the amount of auxiliary data is decreased by employing the adjacent pixels information. Therefore, in addition to quality improvement, independent authentication of different regions of a watermarked image is possible.
Highlights
Reversible watermarking, called lossless data hiding, embeds the watermark data into a digital image in a reversible manner, that is, one can restore the original image without any degradation
Lossless data embedding can be classified into the following categories: the first one utilizes additive spread spectrum [1, 2]; the second category compresses the selected image features for creating vacancy [3, 4], and employs this spare space for embedding; the third group, namely expansion-based methods [5,6,7,8,9,10,11,12,13,14,15,16], embeds the watermark data in some features by expanding them; these features are created by some decorrelation operator, and some methods are based on histogram modification [17, 18] in which peak/zero points of the histogram either in spatial domain or transform domain are utilized for embedding
Most of reversible watermarking methods, presented so far, have a highly fragile nature; there are some methods which can be deemed as semifragile techniques
Summary
Reversible watermarking, called lossless data hiding, embeds the watermark data into a digital image in a reversible manner, that is, one can restore the original image without any degradation. In most of the previous work, channel degradation is not allowed; as a result, such schemes are highly fragile. This limits the usability of reversible watermarking only in lossless environments. The restoration process would fail as well. This restricts the employing of reversible data hiding just to the cases in which there is a complete control over the watermarked data.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.