PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Reversible Data Embedding Based on Prediction Approach for VQ and SMVQ Compressed Images

Autorzy
Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Reversible steganography allows an original image that has gone through the embedding process to be completely restored after the extraction of the embedded data. In this paper, we propose a reversible scheme with a high embedding capacity for VQ compressed images. Our reversible method is based on a prediction strategy and takes advantage of the local characteristics of the image. Since the location map is usually a necessary part of a reversible scheme, two methods, shifting and relocating, are also proposed to reduce the size of the location map. As the experimental results show later, our method outperforms previous schemes in terms of embedding capacity and image quality. To be more specific, with low distortion, the embedding capacity of the proposed methods can be higher than one bit per index value.
Wydawca
Rocznik
Strony
189--207
Opis fizyczny
bibliogr. 20 poz.,fot.,tab.,wykr.
Twórcy
autor
autor
  • Department of Information Engineering and Computer Science Feng Chia University 100 Wenhwa Rd., Seatwen, Taichung 40724, Taiwan, R.O.C., ccc@cs.ccu.edu.tw
Bibliografia
  • [1] A. M. Alattar: Reversible Watermark Using the Difference Expansion of A Generalized Integer Transform, IEEE Transactions on Image Processing, 13 (8) (2004) 1147-1156.
  • [2] J. M. Barton: Method and Apparatus for Embedding Authentication Information Within Data, U.S. Patent, 5646997, 1997.
  • [3] M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber: Reversible Data Hiding, Proceedings of IEEE International Conference on Image Processing Rochester, NY, 2002, pp. 157-160.
  • [4] C. C. Chang, J. Y. Hsiao, and C. S. Chan: Finding Optimal LSB Substitution in Image Hiding by Dynamic Programming Strategy, Pattern Recognition, 36 (7) (2003) 1583-1595.
  • [5] J. Fridrich,M. Goljan, and R. Du: Lossless Data Embedding - New Paradigmin DigitalWatermarking, Special Issue on Emerging Applications of Multimedia Data Hiding, 2002 (2) (2002) 185-196.
  • [6] MJ. Fridrich, M. Goljan, and R. Du: Lossless Data Embedding for All Image Formats, Proceedings of SPIE PhotonicsWest, Electronic Imaging, Security and Watermarking of Multimedia Contents, San Jose, CA, 2002, pp. 572-583.
  • [7] R. M. Gray: Vector Quantization, IEEE ASSP Magazine, 1984, pp. 4-29.
  • [8] C. W. Honsinger, P. W. Jones, M. Rabbani, and J. C. Stoffel: Lossless Recovery of An Original Image Containing Embedded Data, U.S. Patent, 6278791, 2001.
  • [9] S. Katzenbeisser and F. A. P. Petitcolas: Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, 2000.
  • [10] T. Kim: SideMatch and OverlapMatch Vector Quantizers for Images, IEEE Transactions on Image Processing, 1.1 (2) (1992) 170-185.
  • [11] R. C. T. Lee, Y. H. Chin, and S. C. Chang: Application of Principal Component Analysis to Multikey Searching, IEEE Transactions on Software Engineering, SE-2 (3) (1976) 185-193.
  • [12] Y. Linde, A. Buzo, and R. M. Gary: An Algorithm for Vector Quantization Design, IEEE Transactions on Communications, 28 (4) (1980) 84-95.
  • [13] Z. M. Lu and S. H. Sun: Digital Image Watermarking Technique Based on Vector Quantization, Electronics Letters, 36 (4) (2000) 303-305.
  • [14] B. Macq: Lossless Multiresolution Transform for Image Authenticating Watermarking, Proceedings of EUSIPCO, Tampere, Finland, 2000, pp. 533-536.
  • [15] C. I. Podilchuk and E. J. Delp: Digital Watermarking: Algorithms and Applications, IEEE Signal Process, 18 (4) (2001) 33-46.
  • [16] K. Sayood: Introduction to Data Compression, Morgan Kaufmann, 2000.
  • [17] J. Tian: Reversible Data Embedding Using A Difference Expansion, Transactions on Circuits and Systems for Video Technology, 13 (8) (2003) 890-896.
  • [18] C. D. Vleeschouwer, J. F. Delaigle, and B. Macq: Circular Interpretation of Bijective Transformations in Lossless Watermarking for Media Asset Management, IEEE Transactions on Multimedia, 5 (1) (2003) 97-105.
  • [19] H. C. Wei, P. C. Tsai, and J. S. Wang: Three-sided Side Match Finite-state Vector Quantization, IEEE Transactions on Circuits and Systems for Video Technology, 10 (1) (2000) 51-58.
  • [20] Y. H. Yu, C. C. Chang, and Y. C. Hu: Hiding Secret Data in Images via Predictive Coding, Pattern Recognition, 38 (5) (2005) 691-705.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BUS2-0015-0057
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.