ACM Transactions on Information Systems (TOIS)
Distortion-Free Data Embedding for Images
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
IEEE Transactions on Multimedia
Secret and public key image watermarking schemes for image authentication and ownership verification
IEEE Transactions on Image Processing
Reversible watermark using the difference expansion of a generalized integer transform
IEEE Transactions on Image Processing
Lossless generalized-LSB data embedding
IEEE Transactions on Image Processing
Reversible data embedding into images using wavelet techniques and sorting
IEEE Transactions on Image Processing
Lossless watermarking for image authentication: a new framework and an implementation
IEEE Transactions on Image Processing
Reversible data embedding using a difference expansion
IEEE Transactions on Circuits and Systems for Video Technology
IEEE Transactions on Circuits and Systems for Video Technology
Reversible Visible Watermarking and Lossless Recovery of Original Images
IEEE Transactions on Circuits and Systems for Video Technology
High capacity data hiding schemes for medical images based on difference expansion
Journal of Systems and Software
Hi-index | 0.00 |
In sensitive imagery, such as deep space exploration, military reconnaissance and medical diagnosis, traditional watermarks can be hardly found useful. The main reason is that the users are too worried about the loss of original information after the image being embedded with other data. Although early watermarking methods only distort the host signal imperceptibly, there is still some host information that may be permanently (irreversibly) lost. To avoid this disadvantage, some researchers (e.g. [1]-[3]) proposed the concept of reversible (lossless) watermark. Recently, more and more reversible watermarking methods have been proposed. However, the influence of [1]-[3] is obvious. In this paper, we focus on analyzing and comparing these three reversible watermarking methods. Our investigation covers several aspects including data hiding capacity, image quality, capacity resilience and control, computational complexity, security, and blind data extraction. Such analysis and comparison provide indispensable information for the design of new reversible watermarking techniques.