Data hiding based quality access control of digital images using adaptive QIM and lifting

This paper proposes a joint data-hiding and data modulation scheme to serve the purpose of quality access control of image(s) using quantization index modulation (QIM). The combined effect of external information embedding and data modulation cause visual degradation and may be used in access control through reversible process. The degree of deterioration depends on the amount of external data insertion, amount of data modulation as well as step size used in QIM. A weight function (q) and the quantization step size (@D"b) of JPEG 2000 are used for defining the step size of QIM. Lifting based discrete wavelet transform (DWT), instead of conventional DWT, is used to decompose the original image in order to achieve advantages, namely low loss in image quality due to QIM, better watermark decoding reliability and high embedding capacity for a given embedding distortion. At the decoder, data are demodulated first and watermark bits are then extracted using minimum distance decoding. Extracted watermark is used to suppress self-noise (SN) that provides better quality of image. Simulation results have shown that an improvement in peak-signal-to-noise-ratio (PSNR), mean structural-similarity-index-measure (MSSIM) and Watson distance by an amount of about 30%, 12% and 77%, respectively, are gained by authorized user when 50% coefficients of high-high (HH) coefficients are modulated.

[1]  Touradj Ebrahimi,et al.  The JPEG2000 still image coding system: an overview , 2000, IEEE Trans. Consumer Electron..

[2]  Stephan Katzenbeisser,et al.  Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .

[3]  Chang-Tsun Li Reversible watermarking scheme with image-independent embedding capacity , 2005 .

[4]  Rafael C. González,et al.  Digital image processing using MATLAB , 2006 .

[5]  Te-Ming Tu,et al.  Robust spatial watermarking technique for colour images via direct saturation adjustment , 2005 .

[6]  Frank Hartung,et al.  Watermarking of multimedia content for m-commerce applications , 2000 .

[7]  Adrian S. Lewis,et al.  Image compression using the 2-D wavelet transform , 1992, IEEE Trans. Image Process..

[8]  A. A. Zaidee,et al.  Content Access Control for JPEG Images using CRND Zigzag Scanning and QBP , 2006, The Sixth IEEE International Conference on Computer and Information Technology (CIT'06).

[9]  Andreas Uhl,et al.  Survey of wavelet-domain watermarking algorithms , 2001, IS&T/SPIE Electronic Imaging.

[10]  W. Sweldens The Lifting Scheme: A Custom - Design Construction of Biorthogonal Wavelets "Industrial Mathematics , 1996 .

[11]  A. Phadikar,et al.  A Cost Effective Scheme for Content Verification and Access Control of Quality of an Image , 2008, 2008 IEEE Region 10 and the Third international Conference on Industrial and Information Systems.

[12]  Min Wu,et al.  Video access control via multi-level data hiding , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[13]  Malay Kumar Kundu,et al.  Dual purpose FWT domain spread spectrum image watermarking in real time , 2009, Comput. Electr. Eng..

[14]  Min Wu,et al.  Multimedia Data Hiding , 2003, Springer New York.

[15]  Touradj Ebrahimi,et al.  Authentication and access control in the JPEG 2000 compressed domain , 2001, Optics + Photonics.

[16]  Amit Phadikar,et al.  Quality access control of compressed color images using data hiding , 2010 .

[17]  Mauro Barni,et al.  Improved wavelet-based watermarking through pixel-wise masking , 2001, IEEE Trans. Image Process..

[18]  Yong Huang,et al.  Texture decomposition by harmonics extraction from higher order statistics , 2004, IEEE Trans. Image Process..

[19]  P. Nasiopoulos,et al.  A Novel Blind Video Watermarking Scheme for Access Control Using Complex Wavelets , 2007, 2007 Digest of Technical Papers International Conference on Consumer Electronics.

[20]  Santi P. Maity,et al.  Hidden QIM Watermarking on Compressed Data Using Channel Coding and Lifting , 2009, PReMI.

[21]  Zhou Wang,et al.  Image Quality Assessment: From Error Measurement to Structural Similarity , 2004 .

[22]  Jelena Kovacevic,et al.  Wavelet families of increasing order in arbitrary dimensions , 2000, IEEE Trans. Image Process..

[23]  Alessandro Neri,et al.  Blind Quality Assessment System for Multimedia , 2003 .

[24]  Jeng-Shyang Pan,et al.  An Introduction to Watermarking Techniques , 2004 .

[25]  Jacques Blanc-Talon,et al.  Performance Analysis of Scalar DC-QIM Forwatermark Detection , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[26]  Mohan S. Kankanhalli,et al.  Compressed-domain scrambler/descrambler for digital video , 2002, IEEE Trans. Consumer Electron..

[27]  Momcilo Bogdanov,et al.  Blind Low Frequency Watermarking Method , 2008 .

[28]  Sankar K. Pal,et al.  Thresholding for edge detection using human psychovisual phenomena , 1986, Pattern Recognit. Lett..

[29]  Thierry Pun,et al.  Capacity-security analysis of data hiding technologies , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.

[30]  Jianping Fan,et al.  A hierarchical access control model for video database systems , 2003, TOIS.

[31]  Hsiang-Cheh Huang,et al.  Layered Access Control Schemes on Watermarked Scalable Media , 2007, J. VLSI Signal Process..

[32]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.

[33]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[34]  Rabab Kreidieh Ward,et al.  An access control video watermarking method that is robust to geometric distortions , 2007, 2007 2nd International Conference on Digital Information Management.

[35]  Dong-Wook Kim,et al.  A New VLSI Architecture of Lifting-Based DWT , 2006, ARC.

[36]  Wim Sweldens,et al.  The lifting scheme: a construction of second generation wavelets , 1998 .

[37]  Amit Phadikar,et al.  Quantization Based Data Hiding Scheme for Efficient Quality Access Control of Images Using DWT via Lifting , 2008, 2008 Sixth Indian Conference on Computer Vision, Graphics & Image Processing.

[38]  Masaaki Fujiyoshi,et al.  Generalized hierarchical encryption of JPEG 2000 codestreams for access control , 2005, IEEE International Conference on Image Processing 2005.

[39]  Faouzi Kossentini,et al.  Reversible integer-to-integer wavelet transforms for image compression: performance evaluation and analysis , 2000, IEEE Trans. Image Process..

[40]  Ci Wang,et al.  A DCT-based MPEG-2 transparent scrambling algorithm , 2003, IEEE Trans. Consumer Electron..

[41]  Wenjun Zeng,et al.  A format-compliant configurable encryption framework for access control of video , 2002, IEEE Trans. Circuits Syst. Video Technol..

[42]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[43]  Dirk Roose,et al.  Integer wavelet transforms using the lifting scheme , 1999 .