Visible watermark removal scheme based on reversible data hiding and image inpainting

Abstract In this paper, we propose two schemes for visible-watermark removal and reversible image recovery. In the first scheme, we consider the scenario for the image generated by a specific visible (not completely reversible) watermarking algorithm Chen et al. (2017). A run-length coding based method is utilized to compress the difference between the preliminary recovered image and original image. After embedding the difference information invisibly and reversibly, the final embedded image can be exactly recovered to its original version after visible-watermark removal, which avoids the problem of overflow and underflow in Chen et al. (2017). In the second scheme, the scenario of visible-watermark removal for the image generated by any visible watermarking algorithms (no matter the sender and the receiver know the algorithms or not) is considered. The scheme can perfectly remove the embedded visible watermark and can also exactly recover original image with the assist of image inpainting technique. In addition, for both two proposed schemes, the invalid user without the knowledge of secret key cannot achieve reversible recovery for original image. Experimental results demonstrate the effectiveness and superiority of our schemes.

[1]  Wei Su,et al.  Reversible data hiding , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[2]  Xingming Sun,et al.  Effective and Efficient Image Copy Detection with Resistance to Arbitrary Rotation , 2016, IEICE Trans. Inf. Syst..

[3]  Wen-Hsiang Tsai,et al.  Generic Lossless Visible Watermarking—A New Approach , 2010, IEEE Transactions on Image Processing.

[4]  Byeungwoo Jeon,et al.  Reversible Visible Watermarking and Lossless Recovery of Original Images , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[5]  Xinpeng Zhang,et al.  Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy , 2017, Signal Process..

[6]  Xingming Sun,et al.  A novel image hashing scheme with perceptual robustness using block truncation coding , 2016, Inf. Sci..

[7]  Bin Li,et al.  General Framework to Histogram-Shifting-Based Reversible Data Hiding , 2013, IEEE Transactions on Image Processing.

[8]  Chuan Qin,et al.  Reversible data hiding in VQ index table with lossless coding and adaptive switching mechanism , 2016, Signal Process..

[9]  Zhenxing Qian,et al.  Reversible visible watermark embedded in encrypted domain , 2015, 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP).

[10]  Jessica J. Fridrich,et al.  Lossless data embedding for all image formats , 2002, IS&T/SPIE Electronic Imaging.

[11]  Adnan M. Alattar,et al.  > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < Reversible Watermark Using the Difference Expansion of A Generalized Integer Transform , 2022 .

[12]  Long-Wen Chang,et al.  Secure reversible visible image watermarking with authentication , 2010, Signal Process. Image Commun..

[13]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..

[14]  Yu-Chen Hu,et al.  Reversible image hiding scheme using predictive coding and histogram shifting , 2009, Signal Process..

[15]  Chin-Chen Chang,et al.  A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting , 2014, IEEE Transactions on Image Processing.

[16]  A. Murat Tekalp,et al.  Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.

[17]  Xiao Zeng,et al.  Reversible Image Watermarking Using Interpolation Technique , 2010, IEEE Transactions on Information Forensics and Security.

[18]  Chin-Chen Chang,et al.  An Inpainting-Assisted Reversible Steganographic Scheme Using a Histogram Shifting Mechanism , 2013, IEEE Transactions on Circuits and Systems for Video Technology.

[19]  Bin Ma,et al.  Reversible data hiding: Advances in the past two decades , 2016, IEEE Access.

[20]  Tung-Shou Chen,et al.  Reversible data hiding for high quality images using modification of prediction errors , 2009, J. Syst. Softw..

[21]  Chien-Chang Chen,et al.  Difference-expansion based reversible and visible image watermarking scheme , 2017, Multimedia Tools and Applications.

[22]  Xingming Sun,et al.  Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.

[23]  Yao Zhao,et al.  Pairwise Prediction-Error Expansion for Efficient Reversible Data Hiding , 2013, IEEE Transactions on Image Processing.

[24]  Oscar C. Au,et al.  Lossless Visible Watermarking , 2006, 2006 IEEE International Conference on Multimedia and Expo.

[25]  Alexandru Telea,et al.  An Image Inpainting Technique Based on the Fast Marching Method , 2004, J. Graphics, GPU, & Game Tools.

[26]  Chin-Chen Chang,et al.  Reversible data hiding scheme based on exploiting modification direction with two steganographic images , 2014, Multimedia Tools and Applications.

[27]  Long-Wen Chang,et al.  A High Secure Reversible Visible Watermarking Scheme , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[28]  Weiming Zhang,et al.  Efficient Reversible Data Hiding Based on Multiple Histograms Modification , 2015, IEEE Transactions on Information Forensics and Security.

[29]  Yongjian Hu,et al.  DE-Based Reversible Data Hiding With Improved Overflow Location Map , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[30]  Chin-Chen Chang,et al.  Contrast-Adaptive Removable Visible Watermarking (CARVW) mechanism , 2013, Image Vis. Comput..

[31]  Xinpeng Zhang,et al.  Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.

[32]  Xingming Sun,et al.  A Contrast-Sensitive Reversible Visible Image Watermarking Technique , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[33]  Jeffrey J. Rodríguez,et al.  Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.

[34]  Shiguo Lian,et al.  Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics , 2017, Multimedia Tools and Applications.

[35]  Chin-Chen Chang,et al.  Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism , 2012, Signal Process..