Machine learning based adaptive watermark decoding in view of anticipated attack
Pattern Recognition
Reversible Data Hiding Based on Histogram Shifting of Prediction Errors
IITAW '08 Proceedings of the 2008 International Symposium on Intelligent Information Technology Application Workshops
Information Sciences: an International Journal
Reversibility improved lossless data hiding
Signal Processing
Reversible data hiding exploiting spatial correlation between sub-sampled images
Pattern Recognition
A new data hiding scheme for binary image authentication with small image distortion
Information Sciences: an International Journal
Reversible Data Hiding Based on Histogram
ICIC '07 Proceedings of the 3rd International Conference on Intelligent Computing: Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence
A fragile watermarking scheme for detecting malicious modifications of database relations
Information Sciences: an International Journal
Technical Communication: Authentication and recovery of images using multiple watermarks
Computers and Electrical Engineering
Geometric distortion insensitive image watermarking in affine covariant regions
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Information Sciences: an International Journal
Reversible data hiding based on block median preservation
Information Sciences: an International Journal
Watermarking and authentication of quantum images based on restricted geometric transformations
Information Sciences: an International Journal
Reversible data hiding using integer wavelet transform and companding technique
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
Intelligent reversible watermarking in integer wavelet domain for medical images
Journal of Systems and Software
Lossless data hiding using histogram shifting method based on integer wavelets
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
A reversible watermarking based on histogram shifting
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
IEEE Transactions on Multimedia
Lossless generalized-LSB data embedding
IEEE Transactions on Image Processing
Reversible data embedding into images using wavelet techniques and sorting
IEEE Transactions on Image Processing
Reversible data embedding using a difference expansion
IEEE Transactions on Circuits and Systems for Video Technology
A Sequential Quantization Strategy for Data Embedding and Integrity Verification
IEEE Transactions on Circuits and Systems for Video Technology
Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication
IEEE Transactions on Circuits and Systems for Video Technology
Lossless Data Embedding Using Generalized Statistical Quantity Histogram
IEEE Transactions on Circuits and Systems for Video Technology
Intelligent reversible watermarking and authentication: Hiding depth map information for 3D cameras
Information Sciences: an International Journal
Journal of Systems and Software
Reversible watermarking scheme for medical image based on differential evolution
Expert Systems with Applications: An International Journal
Hi-index | 0.07 |
Amongst the various data hiding schemes, lossless data hiding has achieved substantial attention in the recent years. Lossless watermarking also known as reversible watermarking, not only ensures the extraction of the hidden information, called watermark, but also the complete recovery of the original image as well. Recently, several interesting reversible block-based watermarking approaches using histogram processing have been reported. These approaches offer substantial watermarking capacity for a fixed image quality measure. However, there is considerable margin of improvement as regards the imperceptibility versus capacity tradeoff is concerned. Some of the watermarking applications such as those related to integrity-control need high capacity. Therefore, we present a high capacity reversible watermarking approach based on histogram processing and block selection (RW-HPBS). The proposed RW-HPBS approach exploits the concept of down sampling for effectively increasing the capacity and is useful for integrity control and authentication related applications. Two down-sampled versions, the reference and the data hiding, are obtained to create space for embedding. Authentication property is achieved by taking a secondary advantage of the location map before being compressed and embedded as an auxiliary information. The effectiveness of the proposed method is shown through comparison with the existing techniques. Experimental results show that the proposed RW-HPBS approach provides better imperceptibility versus capacity tradeoff and can detect tampering and collage attack.