Reversible Data Hiding and Reversible Authentication Watermarking for Binary Images

  • Sergio Vicente D. Pamboukian UPM
  • Hae Yong Kim USP

Resumo


Data hiding is a technique used to embed a sequence of bits in a host image with small visual deterioration and the means to extract it afterwards. Reversible data hiding allows, in addition, recovering the original coverimage exactly. Several reversible data hiding techniques have been developed but none of them seems to be appropriate for binary images. This paper proposes a reversible data hiding for binary images. The proposed technique selects a set of low-visibility pixels and uses the Golomb code to compress the predictions of these pixels. This compressed data and the net payload data are embedded into the image. Images watermarked by the proposed technique have excellent visual quality, because only low-visibility pixels are flipped. Then, we use the proposed data hiding to reversibly authenticate binary images and documents. This technique has many potential practical uses, including lossless authenticated FAX transmission and reversible content protection of binary document databases.

Referências

Awrangjeb, M. and Kankanhalli, M. S. (2004) “Lossless Watermarking Considering the Human Visual System,” Int. Workshop on Digital Watermarking 2003, Lecture Notes in Computer Science 2939, pp. 581-592.

Celik, M. U., Sharma, G., Tekalp, A. M. and Saber E. (2002), “Reversible Data Hiding,” in Proc. IEEE Int. Conf. on Image Processing, vol. 2, pp. 157-160.

Celik, M. U., Sharma, G., Tekalp, A. M. and Saber, E. (2005), “Lossless generalized-LSB data embedding,” IEEE Transactions on Image Processing, vol. 14, no. 2, pp. 253-266.

Fridrich, J., Goljan, M. and Du, R. (2001), “Invertible Authentication,” in Proc. SPIE Security and Watermarking of Multimedia Contents III, (San Jose, California, USA), vol. 3971, pp. 197-208.

Fridrich, J., Goljan, M. and Du R. (2002), “Lossless data embedding – new paradigm in digital watermarking,” in EURASIP Journ. Appl. Sig. Proc., vol. 2002, no. 2, pp. 185-196.

Gallager, R. and Voorhis, D. V. (1975), “Optimal source codes for geometrically distributed integer alphabets,” IEEE Trans. Inform. Theory, vol. IT-21, pp. 228-230.

Golomb, S. W. (1966), “Run-Length Encodings,” IEEE Trans. Inform. Theory, vol. IT-12, pp. 399-401.

Honsinger, C. W., Jones, P. W., Rabbani, M. and Stoffel, J. C. (2001), “Lossless Recovery of an Original Image Containing Embedded Data,” US Patent #6,278,791, August.

Howard, P. G. and Vitter, J. S. (1993), “Fast and efficient lossless image compression,” IEEE Data Compression Conference, pp. 351-360.

ISO/IEC (1999) 14495-1, ITU Recommendation T.87, “Information Technology – Lossless and near-lossless compression of continuous-tones still images”.

Kim, H. Y. (2005), “A New Public-Key Authentication Watermarking for Binary Document Images Resistant to Parity Attacks,” in Proc. IEEE Int. Conf. on Image Processing, (Italy), vol. 2, pp. 1074-1077.

Ni, Z. C., Shi, Y. Q., Ansari, N., Su, W., Sun, Q. B. and Lin X. (2004), “Robust Lossless Image Data Hiding,” IEEE Int. Conf. Multimedia and Expo 2004, pp. 2199-2202.

Salomon, D. (2004), Data Compression: The Complete Reference, 3rd Edition, Springer-Verlag, New York, pp. 57-64.

Shi, Y. Q. (2004), “Reversible Data Hiding,” Int. Workshop on Digital Watermarking 2004, (Seoul), Lecture Notes in Computer Science 3304, pp. 1-13.

Tian, J. (2002), “Wavelet-based reversible watermarking for authentication,” in Proc. SPIE Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 679-690.

Tian, J. (2003), “Reversible data embedding using difference expansion,” IEEE Transactions on Circuits Systems and Video Technology, vol. 13, no. 8, pp. 890-896.

Tsai, C. L., Fan, K. C., Chung, C. D. and Chuang, T. C. (2004a), “Data Hiding of Binary Images Using Pair-wise Logical Computation Mechanism,” in Proc. IEEE International Conference on Multimedia and Expo, ICME 2004, (Taipei, Taiwan), vol. 2, pp. 951-954.

Tsai, C. L., Fan, K. C., Chung, C. D. and Chuang, T. C. (2004b), “Reversible and Lossless Data Hiding with Application in Digital Library,” International Carnahan Conference on Security Technology, pp. 226-232.

Weinberger, M. J., Seroussi, G. and Sapiro, G. (1996), “LOCO-I: A low complexity, context based, lossless image compression algorithm,” in Proc. 1996 Data Compression conference, (Snowbird, Utah, USA), pp. 140-149.

Wu, X. (1997), “Lossless compression of continuous-tone images via context selection, quantization, and modeling,” in IEEE Transactions on Image Processing, vol. 6, no. 5, pp. 656-664.
Publicado
28/08/2006
Como Citar

Selecione um Formato
PAMBOUKIAN, Sergio Vicente D.; KIM, Hae Yong. Reversible Data Hiding and Reversible Authentication Watermarking for Binary Images. In: SIMPÓSIO BRASILEIRO DE SEGURANÇA DA INFORMAÇÃO E DE SISTEMAS COMPUTACIONAIS (SBSEG), 6. , 2006, Santos. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2006 . p. 101-112. DOI: https://doi.org/10.5753/sbseg.2006.20942.