Enhanced Image Trans-coding Using Reversible Data Hiding

The primary application of watermarking and data hiding is for authentication, or to prove the ownership of digital media. In this paper, a new trans-coding system with the help of the technique of watermarking and data hiding is proposed. Side information is extracted before the image transcoding, such as resizing. In this paper, we focus on the problem of resizing in "thin edge" region. "Thin edge" structure normally cannot preserve after resizing process and become discrete. As the "thin edge" region is difficult to analyze real time and with a high degree of accuracy, data hiding can be used. The information of the "thin edge" region is generated and embedding into the multimedia content in encoder. Experimental results shown that there is a great improvement in the visual quality by using side information.

[1]  Ioannis Pitas,et al.  Copyright protection of images using robust digital signatures , 1996, 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings.

[2]  Pieter H. Hartel,et al.  Music2Share - copyright-compliant music sharing in P2P systems , 2004, Proceedings of the IEEE.

[3]  Miraj-E. Mostafa MMS - the modern wireless solution for multimedia messaging , 2002, The 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.

[4]  Adnan M. Alattar,et al.  > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < Reversible Watermark Using the Difference Expansion of A Generalized Integer Transform , 2022 .

[5]  Oscar C. Au,et al.  Generalized lossless data hiding by multiple predictors , 2006, 2006 IEEE International Symposium on Circuits and Systems.

[6]  Gurminder Singh,et al.  Large-scale infographic image downsizing , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[7]  J. Tian High capacity reversible data embedding and content authentication , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..

[8]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[9]  Christophe De Vleeschouwer,et al.  Circular interpretation of bijective transformations in lossless watermarking for media asset management , 2003, IEEE Trans. Multim..