Reversible Watermarking with Adaptive Embedding Threshold Matrix

In this paper, a new reversible watermarking algorithm with adaptive embedding threshold matrix is proposed. Firstly, to avoid the overflow and underflow, two flexible thresholds, TL and TR, are applied to preprocess the image histogram with least histogram shift cost. Secondly, for achieving an optimal or near optimal tradeoff between the embedding capacity and imperceptibility, the embedding threshold matrix, composed of the embedding thresholds of all blocks, is determined adaptively by the combination between the composite chaos and the average energy of Integer Wavelet Transform (IWT) block. As a non-liner system with good randomness, the composite chaos is suitable to search the optimal embedding thresholds. Meanwhile, the average energy of IWT block is calculated to adjust the block embedding capacity, and more data are embedded into those IWT blocks with larger average energy. The experimental results demonstrate that compared with the state-of-the-art reversible watermarking schemes, the proposed scheme has better performance for the tradeoff between the embedding capacity and imperceptibility.

[1]  Yih-Kai Lin,et al.  High capacity reversible data hiding scheme based upon discrete cosine transformation , 2012, J. Syst. Softw..

[2]  S. Pincus Approximate entropy (ApEn) as a complexity measure. , 1995, Chaos.

[3]  Ling Shao,et al.  A rapid learning algorithm for vehicle classification , 2015, Inf. Sci..

[4]  Bin Gu,et al.  Incremental Support Vector Learning for Ordinal Regression , 2015, IEEE Transactions on Neural Networks and Learning Systems.

[5]  Jie Zhu,et al.  Steganography for MP3 audio by exploiting the rule of window switching , 2012, Comput. Secur..

[6]  Nora Cuppens-Boulahia,et al.  Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting , 2013, IEEE Transactions on Information Forensics and Security.

[7]  I. Daubechies,et al.  Wavelet Transforms That Map Integers to Integers , 1998 .

[8]  Shyr-Shen Yu,et al.  A HDWT-based reversible data hiding method , 2009, J. Syst. Softw..

[9]  X. Liao,et al.  An image encryption approach based on chaotic maps , 2005 .

[10]  Yun Q. Shi,et al.  Reversible Data Hiding Using Controlled Contrast Enhancement and Integer Wavelet Transform , 2015, IEEE Signal Processing Letters.

[11]  Chin-Chen Chang,et al.  A high payload frequency-based reversible image hiding method , 2010, Inf. Sci..

[12]  Jeffrey J. Rodríguez,et al.  Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.

[13]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[14]  Zhihua Xia,et al.  Steganalysis of least significant bit matching using multi-order differences , 2014, Secur. Commun. Networks.

[15]  Yun Q. Shi,et al.  Optimal Histogram-Pair and Prediction-Error Based Image Reversible Data Hiding , 2012, IWDW.

[16]  Bin Gu,et al.  A Robust Regularization Path Algorithm for $\nu $ -Support Vector Classification , 2017, IEEE Transactions on Neural Networks and Learning Systems.

[17]  Naixue Xiong,et al.  Steganalysis of LSB matching using differences between nonadjacent pixels , 2016, Multimedia Tools and Applications.

[18]  Guangyong Gao Composite chaos-based lossless image authentication and tamper localization , 2012, Multimedia Tools and Applications.

[19]  M. Omair Ahmad,et al.  A Study of Multiplicative Watermark Detection in the Contourlet Domain Using Alpha-Stable Distributions , 2014, IEEE Transactions on Image Processing.

[20]  Tiegang Gao,et al.  A novel reversible robust watermarking algorithm based on chaotic system , 2013, Digit. Signal Process..

[21]  Ioan-Catalin Dragoi,et al.  Local-Prediction-Based Difference Expansion Reversible Watermarking , 2014, IEEE Transactions on Image Processing.

[22]  Wang Jun A High Performance Reversible Watermarking Scheme Based on Histogram Shifting , 2012 .

[23]  Teddy Furon,et al.  A New Measure of Watermarking Security: The Effective Key Length , 2013, IEEE Transactions on Information Forensics and Security.

[24]  Gang Chen,et al.  Full 4-D quaternion discrete Fourier transform based watermarking for color images , 2014, Digit. Signal Process..

[25]  Chin-Chen Chang,et al.  Reversible data hiding with oriented and minimized distortions using cascading trellis coding , 2015, Inf. Sci..

[26]  A. Murat Tekalp,et al.  Reversible data hiding , 2002, Proceedings. International Conference on Image Processing.

[27]  Qian Wang,et al.  A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.

[28]  Muhammad Arsalan,et al.  Intelligent reversible watermarking in integer wavelet domain for medical images , 2012, J. Syst. Softw..

[29]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..

[30]  Liang Yang,et al.  A Reversible Data Hiding Scheme Based on Histogram Modification in Integer DWT Domain for BTC Compressed Images , 2016, Int. J. Netw. Secur..

[31]  Chengyun Yang,et al.  Reversible Data Hiding Using Integer Wavelet Transform and Companding Technique , 2004, IWDW.

[32]  Bin Gu,et al.  Incremental learning for ν-Support Vector Regression , 2015, Neural Networks.