Forward Modified Histogram Shifting based Reversible Watermarking with Reduced Pixel Shifting and High Embedding Capacity

Similar documents
Histogram Modification Based Reversible Data Hiding Using Neighbouring Pixel Differences

Local prediction based reversible watermarking framework for digital videos

A Reversible Data Hiding Scheme Based on Prediction Difference

Contrast Enhancement Based Reversible Image Data Hiding

Digital Image Watermarking

Reversible Data Hiding in JPEG Images Based on Adjustable Padding

Steganalytic methods for the detection of histogram shifting data-hiding schemes

Reversible Watermarking on Histogram Pixel Based Image Features

DATA HIDING [1] is referred to as a process to hide data

Fragile Watermarking With Error-Free Restoration Capability Xinpeng Zhang and Shuozhong Wang

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

REVERSIBLE data hiding, or lossless data hiding, hides

A Lossless Large-Volume Data Hiding Method Based on Histogram Shifting Using an Optimal Hierarchical Block Division Scheme *

Data Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform

Watermarking patient data in encrypted medical images

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method

DATA hiding has recently been proposed as one of the

Lossless Image Watermarking for HDR Images Using Tone Mapping

Commutative reversible data hiding and encryption

HYBRID MATRIX CODING AND ERROR-CORRECTION CODING SCHEME FOR REVERSIBLE DATA HIDING IN BINARY VQ INDEX CODESTREAM

Armor on Digital Images Captured Using Photoelectric Technique by Absolute Watermarking Approach

An Implementation of LSB Steganography Using DWT Technique

REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING

Compendium of Reversible Data Hiding

Reversible Data Hiding in Encrypted Images based on MSB. Prediction and Huffman Coding

Copyright Warning & Restrictions

Threshold-based Steganography: A Novel Technique for Improved Payload and SNR

Block Wise Data Hiding with Auxilliary Matrix

A New Secure Image Steganography Using Lsb And Spiht Based Compression Method M.J.Thenmozhi 1, Dr.T.Menakadevi 2

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers

Digital Watermarking Using Homogeneity in Image

Application of Histogram Examination for Image Steganography

Color PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method

A Reversible Data Hiding Method with Contrast Enhancement for Medical Images by Preserving Authenticity

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

Digital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel)

Comparative Histogram Analysis of LSB-based Image Steganography

A ROI-based high capacity reversible data hiding scheme with contrast enhancement for medical images

Journal of mathematics and computer science 11 (2014),

An Efficient Data Security System Using Reserve Room Approach on Digital Images for Secret Sharing

A Modified Image Template for FELICS Algorithm for Lossless Image Compression

Emerging Applications of Reversible Data Hiding

Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD

International Journal of Advance Research in Computer Science and Management Studies

Image Steganography using Sudoku Puzzle for Secured Data Transmission

A Modified Image Coder using HVS Characteristics

A Rumination of Error Diffusions in Color Extended Visual Cryptography P.Pardhasaradhi #1, P.Seetharamaiah *2

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON

Authentication of grayscale document images using shamir secret sharing scheme.

Level-Successive Encoding for Digital Photography

An Overview of Image Steganography Techniques

Steganography using LSB bit Substitution for data hiding

AN IMAGE COMPRESSION TECHNIQUE USING PIXEL BASED LEVELING

Data Embedding Using Phase Dispersion. Chris Honsinger and Majid Rabbani Imaging Science Division Eastman Kodak Company Rochester, NY USA

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

An Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images

VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES

ON PACKING LASER SCANNING MICROSCOPY IMAGES BY REVERSIBLE WATERMARKING: A CASE STUDY

Robust Invisible QR Code Image Watermarking Algorithm in SWT Domain

A Survey of Substantial Digital Image Watermarking Techniques

Reversible Data Hiding By Adaptive IWT-coefficient Adjustment

ISSN: Seema G Bhateja et al, International Journal of Computer Science & Communication Networks,Vol 1(3),

Progressive sharing of multiple images with sensitivity-controlled decoding

A SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE

Hiding Image in Image by Five Modulus Method for Image Steganography

Text fusion watermarking in Medical image with Semi-reversible for Secure transfer and Authentication

Evaluation of Visual Cryptography Halftoning Algorithms

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies

A Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor

Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction

An Enhanced Least Significant Bit Steganography Technique

Sterilization of Stego-images through Histogram Normalization

Keywords Arnold transforms; chaotic logistic mapping; discrete wavelet transform; encryption; mean error.

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

Audio and Speech Compression Using DCT and DWT Techniques

Sunil Karforma Associate Professor Dept. of Computer Science The University of Burdwan Burdwan, West Bengal, India

A Novel Image Steganography Based on Contourlet Transform and Hill Cipher

Image Compression Supported By Encryption Using Unitary Transform

An Optimal Pixel-level Self-repairing Authentication. Method for Grayscale Images under a Minimax. Criterion of Distortion Reduction*

A DUAL TREE COMPLEX WAVELET TRANSFORM CONSTRUCTION AND ITS APPLICATION TO IMAGE DENOISING

Embedding and Extracting Two Separate Images Signal in Salt & Pepper Noises in Digital Images based on Watermarking

AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES. N. Askari, H.M. Heys, and C.R. Moloney

ISSN: (Online) Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies

Transform Domain Technique in Image Steganography for Hiding Secret Information

A novel technique for Reversible Information Hiding

Comparative Study on DWT-OFDM and FFT- OFDM Simulation Using Matlab Simulink

Tampering Detection Algorithms: A Comparative Study

An adaptive row-column least significant bit inlay approach for image steganography.

Stochastic Approach to Secret Message Length Estimation in ±k Embedding Steganography

Introduction to Video Forgery Detection: Part I

Progressive secret image sharing scheme using meaningful shadows

An Optimum Modified Bit Plane Splicing LSB Algorithm for Secret Data Hiding

A Cost-Effective Private-Key Cryptosystem for Color Image Encryption

Image Compression Using Huffman Coding Based On Histogram Information And Image Segmentation

Secure Spread Spectrum Data Embedding and Extraction

Meta-data based secret image sharing application for different sized biomedical

Image Compression Technique Using Different Wavelet Function

Transcription:

International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 5, Number 2 (2012), pp. 185-191 International Research Publication House http://www.irphouse.com Forward Modified Histogram Shifting based Reversible Watermarking with Reduced Pixel Shifting and High Embedding Capacity 1 Dr. Rajendra D. Kanphade and 2 N.S. Narawade 1 Member IEEE and Professor in Dept of E&TC Engg Dhole Patil College of Engg., Pune, India. E-mail: rdkanphade@gmail.com 2 Research Scholar, Dept of Electronics Engg. Sant Gadgebaba Amravati University, Amravati, India E-mail: nsnarawade@gmail.com Abstract The modified histogram shifting method proposed by Hong et. al.(2010) is best method of reversible watermarking[16]. The shifting of pixels are more in Hong et. al.(2010) method. Even Hong et. al.(2010) method of modified histogram shifting has less embedding capacity and do not provide enough quality for general purpose image. Our forward modified histogram shifting method overcomes all these drawbacks of Hong et. al.(2010) method. Generally PSNR decreases when embedding capacity increases and shifting pixels also increases. But our modified histogram shifting method optimizes all these factors. Our forward modified histogram shifting method shifts required pixel values to right by n-1 numbers. n-1 may be 1,2,3 and so on. This also increases embedding capacity approximately to (n-1) times maximum number of pixels in the histogram. The complexity of our forward modified histogram shifting method is same as that of Hong et. al. (2010) modified histogram shifting method as both scans image twice during processing. Keywords: Reversible Watermarking, histogram shifting, embedding capacity, processing time, PSNR, forward method. Introduction The earliest reference to reversible data embedding we could find is the Barton patent,

186 Dr. Rajendra D. Kanphade and N.S. Narawade filed in 1997[1]. In his invention, the bits to be overlayed will be compressed and added to the bitstring, which will be embedded into the data block. Honsinger et al.[2] utilised a robust spatial additive watermark combined with modulo additions to achieve reversible data embedding, also reconstructed the payload from an embedded image, then subtract the payload from the embedded image to losslessly recover the original image. Goljan et al.[3] proposed a two cycles flipping permutation to assign a watermarking bit in each pixel group. Celik et al.[4] presented a high capacity, reversible data-embedding algorithm with low distortion by compressing quantisation residues. Tian[5] presented a reversible data embedding approach based on expanding the pixel value difference between neighbouring pixels, which will not overflow or underflow after expansion. Thodi and Rodrguez[6] exploited the inherent correlation among the neighbouring pixels in an image region using a predictor. Xuan et al.[7] embedded data into high-frequency coefficients of integer wavelet transforms with the companding technique, and utilised histogram modification as a preprocessing step to prevent overflow or underflow caused by the modification of wavelet coefficients. Macq[8] proposes an extension to the patchwork algorithm to achieve reversible data embedding. Fridrich, et al.,[9] developed a high capacity reversible dataembedding technique based on embedding message on bits in the status of group of pixels. They also describe two reversible data-embedding techniques for lossy image format JPEG. De Vleeschouwer, et al.,[10]proposed a reversible data-embedding algorithm by circular interpretation of bijective transformations. Kalker, et al., [11]provide some theoretical capacity limits of lossless data compression based reversible data embedding and give a practical code construction. Celik, et al.[4],present a high capacity, low distortion reversible data-embedding algorithm by compressing quantization residues. They employ the lossless image compression algorithm CALIC, with quantized values as side-information, to efficiently compress quantization residues to obtain high embedding capacity. Petitcolas et.al. in 1999 [12]have introduced data hiding initially for a copyright protection. Lin and Tsai, 2004[13], Lin and chen 2000[14] and Zhicheng Ni, Yun- Qing Shi, Nirwan Ansari, and Wei Su, 2006[15] have introduced copy right protection for which data are embedded. Rich redundancies provided by digital images are very suitable for data embedding because some redundancies are easily replaced by the data bits. To conceal data image into an cover image pixel values are modified. This cause certain distortion in image. This type of image is called watermarked image. Usually the distortion in the data hiding is not reversible, hence we can say that original image cannot be recovered to its original state after watermark is extracted. On the contrary, a reversible watermarking has the capability to restore original image. Some times, it is very important to have original image. For example a misreading of an x- ray picture may cause misdiagnosis of a patient.the techniques in the reversible watermarking can roughly be categorized into five types, namely Difference expansion[5], Histogram shifting[16], Contrast Mapping, Integer Wavelet Transform,modulo 256 addition [3], lossless multi resolution transform [8], lossless compression [4], [20], invertible noise adding [4], circular interpretation of bijective transformation [10],[21], etc. All other techniques are explained above. Here we have proposed increased embedding capacity histogram shifting technique.

Forward Modified Histogram Shifting based Reversible Watermarking 187 Histogram shifting technique presented by Ni. Et. Al.[16], have disadvantage that it has more complexity due to image is scanned three times. A modified histogram shifting is presented by Wien Hong, Tung Shou Chen, Kai yung Lin, Wen Chin Chiang(2010)[16], who reduced complexity and improved quality of image. He presented a restricted payload by the distribution of pixel values. In general as an image histogram with greater peak height, the image should have a greater payload. This drawback is reduced in our proposed method. Proposed Method Embedding Input: Original 8 bit grayscale image I, with MxN pixels and watermark Iw. Output: Watermarked image Iw, the peak point a, the minimum point b, length of watermark and the location map L. Step 1: Scan the image I and construct it s histogram H(x)Є[0, 2]. In this histogram obtain peak point a and less point b which is equal to (a+n). Step 2: Record the position of pixel values whose values lies between point a and b. Step 3: Scan the cover image I again. Set counter k for length of watermark. If counter k is less than length of watermark a. If scanned pixel value lies within a and b, increase it by (n-1). b. If pixel value lies above b, then retain pixel values as it is. c. If pixel values lies below a-(n-2), then also retain that pixel values as it is. d. Scan the watermark, if scanned value is 1, then increase pixel value of a-(n-2) by (n-1), a-(n-3) by (n-1), a-(n-4) by (n-1) a-(n-n) by (n-1). If scanned value of watermark is 0 then do not increase pixel values. Step 4: Continue step 3 upto end of watermark. If counter k becomes greater than length of watermark, do not change any value upto end of image scanning completes. Extraction and Restoration: The extraction and restoration procedure is given below. Input: Watermarked Image Iw, the peak point a, the minimum point b, the location map L and the length of the watermark Iw. Output: Original 8 bit grayscale image I and the recovered watermark Iw. Step 1: scan the image in the same order as in the embedding phase. Step 2: Set counter k=0, k is used to indicate length of watermark. For k is less than length of watermark, go to step 3 else step 4. Step 3: (a)if image scanned pixel value is a, a-1, a-2,.(a-(n-2) ), extract 0 bit, let k=k+1, and if scanned pixel value is a+1, a+2, a=3,.a+(n-1) then extract 1 bit, decrease original pixel value by (n-1), and increase counter k=k+1. (b)if scanned pixel value lies between a and b then subtract (n-1) from the scanned pixel value.(optional). (c)if pixel value is less than a-(n-2) and greater than b then do not change these values.

188 Dr. Rajendra D. Kanphade and N.S. Narawade Step 4: Continue step 3 upto end of watermark. If counter k becomes greater than length of watermark, do not change any value upto end of image scanning completes. Step 5: Go to location map L of b-1, b-2..b-(n-1) and make it b-1, b- 2..b-(n-1) respectively. Result Discussion Result table shows that our modified histogram shifting method gives more PSNR than Hong et. al.(2010) modified histogram method. Our proposed method has 74.3,68.22 and 64.24dB PSNR for forward 1(n-1=1) shifting pixel value, 2(n-1=2) shifting pixel value and 3(n-1=3) shifting pixel value. The Hong et. al.(2010) method gives 64 db PSNR. 2235, 4249 and 6211 bits becomes available with our proposed 1 pixel value method, 2 pixel values method and 3 pixel values method respectively as a embedding capacity. Hong et. al.(2010) method provides 2235 bits of embedding capacity. This means embedding capacity increases to approximately 2 times 2 pixel value method, 3 times for 3 pixel value method and so on. Our proposed method shifts 911, 920, 991 pixels while processing forward histogram and 6635 pixels while processing Hong et. al.(2010) histogram. This means our method shifts less number of pixels during processing. As shifting of pixels are less in our proposed method this method can be termed as reduced pixel shifting method. Hence quality of image is very good as compared to Hong et. al.(2010) method[16]. This result is related to 21x21 size of watermark and lena image. As size of watermark changes PSNR, embedding capacity, number of shifting pixels changes and it is depicted in graphs. The complexity of our method is same as that of Hong et. al.(2010) method[16], as we also scans image twice. The minimum PSNR of this method is 48.13 db. Hence we can say that our reduced pixel shifting and forward modified histogram shifting method is more superior than Hong et. al.(2010) method[16].

Forward Modified Histogram Shifting based Reversible Watermarking 189 Cover Image 2000 1000 Histogram of Cover Image original watermak 0 0 100 200 Histogram of Watermarked Image Watermarked Image Extracted Watermark 2000 0 0 100 200 Histogram of Recovered Cover Image Recovered Cover Image Difference Image 2000 1000 0 0 100 200 Figure 1: Above figure shows (a)cover image(b) Histogram(c)Original watermark(d)histogram of original watermark(e)watermarked image(f)extracted Watermark(g)Recovered image(h)histogram of recovered image(i)difference between original and recovered image Comparative Graph of Our proposed meth(forward)& hist shift method 75 lena-1 valf Comparative Graph of Our proposed meth(forward)& hist shift method cameraman-1 valf 45

190 Dr. Rajendra D. Kanphade and N.S. Narawade Comparative Graph of Our proposed meth(forward)& hist shift method 80 Comparative Graph of Our proposed meth(forward)& hist shift method 80 75 boat-1 valf 75 barbara-1 valf 75 Comparative Graph of Our proposed meth(forward)& hist shift method peppers-1 valf Comparative Graph of Our proposed meth(forward)& hist shift method baboon-1 valf 68 66 64 62 58 56 54 52 Graph 1: Above comparative graph shows PSNR Vs payloadfor(a)lena(b)cameraman(c)boat(d)barbara(e)peppers(f)baboon Conclusion and Future Scope In this paper we have presented forward modified histogram shifting method. Our proposed method has better PSNR and embedding capacity than Hong and Lin et. al.(2010) method with same computational cost[16]. This has been compared in a graph. Generally PSNR and Embedding Capacity, are inversely proportional to each other. But our proposed method gives better PSNR and embedding capacity than a Hong et. al.(2010) method [16]. Our proposed method increases (n-1) times embedding capacity than Hong et. al.(2010) method. The PSNR of our method is more than Hong et. al.(2010) method. As shifting of pixels are reduced in our method, quality of our method is higher. Above graphs also shows that our forward method gives better PSNR than our backward method. Our forward improved histogram shifting method significantly increases PSNR, embedding capacity with reduced shifting of pixels. The complexity of our method is same as that of Hong et. al.(2010) method, as our method also scans image twice. Handling of distortion still remains a difficult task. More robust system will also significantly lead the area. Secure reversible watermarking with any attack may be a dream and a challenging field in near future.

Forward Modified Histogram Shifting based Reversible Watermarking 191 References [1] J. M. Barton, Method and Apparatus for Embedding Authentication Information Within Digital Data, U.S. Patent 5 646 997, 1997. [2] Honsinger, C.W., Jones, P., Rabbani, M., and Stoffel, J.C.: Lossless recovery of an original image containing embedded data. US patent no. 6278791, 2001 [3] Goljan, M., Fridrich, J., and Du, R.: Distortion-free data embedding for images. 4th Information Hiding Workshop, LNCS, vol. 2137, (Springer- Verlag, New York, 2001, pp. 27 41 [4] Celik, M.U., Sharma, G., Tekalp, A.M., and Saber, E.: Reversible data hiding. Proc. ICIP, 2002, vol. 2, pp. 157 1 [5] Tian, J. Reversible data embedding using a difference expansion, IEEE Trans. Circuits Syst. Video Technol., 2003, 13, (8), pp. 890 896 [6] Thodi, M., and Rodrguez, J.J.: Prediction-error based reversible watermarking. Proc. ICIP, Singapore, October 2004, vol. 3, pp. 1549 12 [7] Xuan, G.R., Yang, C.Y., Zhen, Y.Z., and Shi, Y.Q.: Reversible data hiding using integer wavelet transform and companding technique.proc. IWDW, 2004 [8] B. Macq, Lossless multiresolution transform for image authenticating watermarking, in Proc. EUSIPCO, Sept. 2000, pp. 533 536. [9] J. Fridrich, M. Goljan, and R. Du, Lossless data embedding new paradigm in digital watermarking, EURASIP J. Appl. Signal Processing, vol. 2002, no. 2, pp. 185 196, Feb. 2002. [10] C. De Vleeschouwer, J. F. Delaigle, and B. Macq, Circular interpretation of bijective transformations in lossless watermarking for media asset management, IEEE Tran. Multimedia, vol. 5, pp. 97 105, Mar. 2003. [11] T. Kalker and F. M. J. Willems, Capacity bounds and constructions for reversible data hiding, in Proc. 14th Int. Conf. Digital Signal Processing, vol. 1, July 2002, pp. 71 76. [12] Petitcolas. F.A.P. R.J Anderson and M.G. Kuhn, Information hiding- a survey. Proc. IEEE, 8, 7, 1999, 1062-1078. [13] Lin,C.C.and W.H.Tsai, Secret image sharing with steganography and authentication, J.Syst.software, 73, 2004, 405-414. [14] C.C. Chang, C.C. Lin, Y.H. Chen, Reversible data-embedding scheme using differences between original and predicted pixel values, IET Inf. Secur., 2008, Vol. 2, No. 2, pp. 35 46 35 doi: 10.1049/iet-ifs:200004. [15] Zhicheng Ni, Yun-Qing Shi, Nirwan Ansari, and Wei Su, Reversible Data Hiding, IEEE TRANS,Circuits And Systems, Vol. 16, No.3,pp.354-3, March 2006. [16] Wien Hong, Tung Shou Chen, Kai Yung Lin and Wen Chin Chiang, A modified histogram shifting based reversible data hiding scheme for high quality images, 2010 Asian Network for Scientific Information, Information Technology Journal, 9(1),2010, 179-183.