CFP last date
20 December 2024
Reseach Article

Information Hiding and Recovery using Reversible Embedding

by A. S. Sonawane, M. L. Dhore, S. N. Mali
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 24 - Number 5
Year of Publication: 2011
Authors: A. S. Sonawane, M. L. Dhore, S. N. Mali
10.5120/2957-3908

A. S. Sonawane, M. L. Dhore, S. N. Mali . Information Hiding and Recovery using Reversible Embedding. International Journal of Computer Applications. 24, 5 ( June 2011), 30-34. DOI=10.5120/2957-3908

@article{ 10.5120/2957-3908,
author = { A. S. Sonawane, M. L. Dhore, S. N. Mali },
title = { Information Hiding and Recovery using Reversible Embedding },
journal = { International Journal of Computer Applications },
issue_date = { June 2011 },
volume = { 24 },
number = { 5 },
month = { June },
year = { 2011 },
issn = { 0975-8887 },
pages = { 30-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume24/number5/2957-3908/ },
doi = { 10.5120/2957-3908 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:10:12.734829+05:30
%A A. S. Sonawane
%A M. L. Dhore
%A S. N. Mali
%T Information Hiding and Recovery using Reversible Embedding
%J International Journal of Computer Applications
%@ 0975-8887
%V 24
%N 5
%P 30-34
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The main objective of this work is to develop data embedding technique that not only embeds secret message, in the form of binary bit stream, to the host image without any auxiliary information or location map, but also extracts that embedded secret message at decoder and restores the original content of host image, which are manipulated after the embedding at encoder. This technique carried out in two phases, embedding and extraction, using min-max approach. This technique reduces extra overhead to embed extra information other than secret message.

References
  1. J. Tian, "Wavelet-based reversible watermarking for authentication", Proceedings of SPIE on Security and Watermarking of Multimedia Contents IV vol. 4675, Jan. 2002, pp. 679-690.
  2. S. Walton, "Image authentication for a slippery new age", Dr. Dobb's Journal 20 (4), April 1995, pp. 18-26.
  3. T.-S. Chen, C.-C. Chang and M.-S. Hwang, "Virtual image cryptosystem based upon vector quantization", IEEE Transactions on Image Processing 7 (10), Oct. 1998, pp. 1485-1488.
  4. J. Fridrich, M. Goljan and R. Du, "Lossless data embedding - new paradigm in digital watermarking", EURASIP Journal of Applied Signal Processing 2002 (2), Feb. 2002, pp. 185-196.
  5. J.M. Barton, "Method and Apparatus for Embedding Authentication Information Within Digital Data," U.S. Patent 5, 1997, pp. 646-997.
  6. B. Macq, "Lossless multiresolution transform for image authenticating watermarking," presented at the European Signal Processing Conf., Tampere, Finland, Sep. 2000.
  7. C. W. Honsinger, P. Jones, M. Rabbani, and J. C. Stoffel, "Lossless recovery of an original image containing embedded data," U.S. Patent 6 278 791, Aug. 21, 2001.
  8. J. Fridrich, M. Goljan, and R. Du, "Invertible authentication," in Proc. SPIE Security Watermarking Multimedia Contents, San Jose, CA, Jan.2001, pp. 197–208.
  9. C. D. Vleeschouwer, J.-F. Delaigle, and B. Macq, "Circular interpretation of bijective transformations in lossless watermarking for media asset management," IEEE Trans. Multimedia, vol. 5, no. 1, pp. 97–105, Mar. 2003.
  10. J. Tian, "Reversible data embedding using a difference expansion," IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, Aug. 2003.
  11. A. M. Alattar, "Reversible watermark using the difference expansion of a generalized integer transform," IEEE Trans. Image Process., vol.13, no. 8, pp. 1147–1156, Aug. 2004.
  12. L. Kamstra and H. J. A. M. Heijmans, "Reversible data embedding into images using wavelet techniques and sorting," IEEE Trans. Image Process., vol. 14, no. 12, pp. 2082–2090, Dec. 2005.
  13. C. C. Chang, W.L. Tai, and C.C. Lin, "A Reversible Data Hiding Scheme Based on Side Match Vector Quantization," IEEE Transactions on Circuits and Systems for Video Technology, Vol.16, No.10, pp.1301-1308, 2006.
  14. D. M. Thodi and J. J. Rodriguez, "Expansion embedding techniques for reversible watermarking," IEEE Trans. Image Process., vol. 16, no.3, pp. 721–730, Mar. 2007.
  15. HJ Kim, V Sachnev, YQ Shi, J Nam, HG Choo, "A novel difference expansion transform for reversible data hiding," IEEE Trans. Information forensicc and security., vol. 3, no.3, pp. 456–465, Jun. 2008.
  16. Lou, D.C., Hu, M.C., Liu, J.L., "Multiple layer data hiding scheme for medical images," Computer Standards and Interfaces 31 (2), 329–335, 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Reversible data embedding non-overlapped block division location map free embedding min-max approach