Log in

Robust lossless digital watermarking using integer transform with Bit plane manipulation

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, a robust lossless digital watermarking scheme based on a generalized integer transform in spatial domain is proposed. In the proposed method, data bits are hidden into the cover media by a reversible generalized integer transform with bit plane manipulation. With the reversible transform, data can be hidden in the cover media, and the stego media can be restored to its original form after extraction of the hidden data. In embedding procedure, adaptive bit plane manipulation is applied to increase robustness of the algorithm while keeps good visual quality. To further increase the robustness of the algorithm, we repeatedly embed watermark bits and use majority voting to decode the hidden information in extraction procedure. Furthermore, a threshold is introduced in the algorithm, which helps in choosing regions that would result lower variance for embedding, as regions with lower variance is more robust against JPEG compression. The proposed scheme is quite different from the existing robust lossless data hiding algorithms which are histogram-based. The performance of the proposed scheme is evaluated and compared with state-of-the-arts techniques respect to robustness, data payload capacity and peak signal-to-noise ratio (PSNR). In the experiments, the proposed method can embed more than 10000 bits into 512 by 512 grayscale and medical images, and has around 30 dB in PSNR. In case of small watermark with 100 bits, marked images can have PSNR above 60 dB and with 0.1 bpp in JPEG robustness in the best cases. Conclusively, the robustness of the proposed method is quite good, and the results of hiding capacity and imperceptibility are also satisfactory.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Alavianmehr MA et al. (2012) “A Semi-Fragile Lossless Data Hiding Scheme Based on Multi-Level Histogram Shift in Image Integer Wavelet Transform Domain,” in Telecommunications (IST), 2012 Sixth International Symposium on, pp. 976–981

  2. Ali MA, Ediriginshe EA (2012) “High-Capacity Reversible Multi-Layer Watermarking for H.264/AVC Video,” in Computing and Convergence Technology (ICCCT), 2012 7th International Conference on, pp. 631–636

  3. An L et al. (2010) “Robust Lossless Data Hiding: Analysis and Evaluation,” in High Performance Computing and Simulation (HPCS), 2010 International Conference on, pp. 512–516

  4. Caronni G (1995) “Assuring Ownership Rights for Digital Images,” in Verläßliche IT-Systeme, ed: Vieweg + Teubner Verlag, pp. 251–263

  5. Celik MU et al (2006) “Lossless watermarking for image authentication: a New Framework and an Implementation”. Image Process IEEE Trans 15:1042–1049

    Article  Google Scholar 

  6. Cox IJ et al (1997) “Secure spread spectrum watermarking for multimedia”. Image Process IEEE Trans 6:1673–1687

    Article  Google Scholar 

  7. De Vleeschouwer C et al. (2001) “Circular Interpretation of Histogram for Reversible Watermarking,” in Multimedia Signal Processing, 2001 I.E. Fourth Workshop on, pp. 345–350

  8. De Vleeschouwer C et al (2003) “Circular interpretation of bijective transformations in lossless watermarking for media asset management”. IEEE Transactions on Multimedia 5:97–105

    Article  Google Scholar 

  9. Dragoi IC, Coltuc D (2014) “Local-prediction-based difference expansion reversible watermarking”. IEEE Trans Image Process 23:1779–1790

    Article  MathSciNet  Google Scholar 

  10. Fridrich J (1998) “Image Watermarking for Tamper Detection,” in Image Processing, 1998. ICIP 98. Proceedings. 1998 International Conference on, pp. 404–408 vol.2

  11. Fridrich J et al (2002) Lossless data embedding–New paradigm in digital watermarking. EURASIP J Appl Signal Process 2002:185–196

    Article  MATH  Google Scholar 

  12. Gujjunoori S, Amberker BB (2014) Reversible data embedding for MPEG-4 video using middle frequency DCT coefficients. J Inf Hiding Multimed Signal Proc 5:408–419

    Google Scholar 

  13. Huang H-C, Chang F-C (2013) Hierarchy-based reversible data hiding. Expert Systems with Appl 40:34–43

    Article  Google Scholar 

  14. Huang H-C, Fang W-C (2011) Authenticity preservation with histogram-based reversible data hiding and Quadtree concepts. Sensors 11:9717–9731

    Article  Google Scholar 

  15. Jun T (2003) “Reversible data embedding using a difference expansion”. IEEE Trans Circuits Syst Video Technol 13:890–896

    Article  Google Scholar 

  16. Lee C-F et al (2015) An adjustable and reversible data hiding method based on multiple-base notational system without location Map. J Inf Hiding and Multimed Signal Proc 6:1–28

    Google Scholar 

  17. Luo L et al (2010) “Reversible image watermarking using interpolation technique”. Inf Forensics Secur IEEE Trans 5:187–193

    Article  Google Scholar 

  18. Naskar R, Chakraborty RS (2013) “Histogram-Bin-shifting-based reversible watermarking for colour images”. Image Proc IET 7:99–110

    Article  MathSciNet  Google Scholar 

  19. Ni Z et al (2008) “Robust lossless image data hiding designed for semi-fragile image authentication”. IEEE Trans Circuits Syst Video Technol 18:497–509

    Article  Google Scholar 

  20. Nishimura A (2011) “Reversible Audio Data Hiding Using Linear Prediction and Error Expansion,” in Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2011 Seventh International Conference on, pp. 318–321

  21. Rui D, Fridrich J (2002) “Lossless Authentication of MPEG-2 Video,” in Image Processing. 2002. Proceedings. 2002 International Conference on, pp. II-893-II-896 vol.2

  22. Shi YQ et al. (2004) “Lossless Data Hiding: Fundamentals, Algorithms and Applications,” in Circuits and Systems, 2004. ISCAS ’04. Proceedings of the 2004 International Symposium on, pp. II-33-6 Vol.2

  23. Shih-Hao W, Yuan-Pei L (2004) “Wavelet tree quantization for copyright protection watermarking”. Image Process IEEE Trans 13:154–165

    Article  Google Scholar 

  24. Tashk A et al. (2012) “A Modified Dual Watermarking Scheme for Digital Images with Tamper Localization/Detection and Recovery Capabilities,” in 2012 9th International ISC Conference on Information Security and Cryptology (ISCISC), pp. 60–65

  25. van der Veen M et al. (2003) “High Capacity Reversible Watermarking for Audio”, pp. 1–11

  26. Walia E, Suneja A (2013) “Fragile and blind watermarking technique based on Weber’s Law for medical image authentication”. Comput Vis IET 7:9–19

    Article  Google Scholar 

  27. Wang X et al (2010) “Efficient Generalized Integer Transform for Reversible Watermarking”. Signal Proc Lett IEEE 17:567–570

    Article  Google Scholar 

  28. Zou D et al (2006) “A semi-fragile lossless digital watermarking scheme based on integer wavelet transform”. IEEE Trans Circuits Syst Video Technol 16:1294–1300

    Article  Google Scholar 

Download references

Acknowledgment

This research was supported in part by Research Committee of the University of Macau (MYRG2015-00012-FST, MYRG2015-00013-FST) and the Science and Technology Development Fund of Macau SAR (008/2013/A1, 093-2014-A2).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chi-Man Pun.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Choi, KC., Pun, CM. Robust lossless digital watermarking using integer transform with Bit plane manipulation. Multimed Tools Appl 75, 6621–6645 (2016). https://doi.org/10.1007/s11042-015-2596-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-2596-3

Keywords

Navigation