Paper
10 January 2014 Reversible watermarking using edge based difference modification
Xiaochao Qu, Suah Kim, Hyoungjoong Kim
Author Affiliations +
Proceedings Volume 9069, Fifth International Conference on Graphic and Image Processing (ICGIP 2013); 90690Q (2014) https://doi.org/10.1117/12.2050221
Event: Fifth International Conference on Graphic and Image Processing, 2013, Hong Kong, China
Abstract
Reversible watermarking can embed data into the cover image and extract data from stego image, where the original cover image can be recovered perfectly after the extraction of data. Difference expansion (DE) and prediction error expansion (PEE) are two popular reversible watermarking methods. DE has the advantage of small distortion while PEE has the advantage of large embedding capacity and smaller prediction error compared with pixel difference. In this paper, we proposed a novel method that combines the advantages of DE and PEE, where the difference calculated between two pixels is combined with the edge information near this pixel pair. The proposed difference calculation can produce smaller pixel difference compared with the original simple pixel difference calculation. Overlapping embedding is then used to increase the embedding capacity. Our proposed method gives excellent results which is shown by several experiments.
© (2014) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Xiaochao Qu, Suah Kim, and Hyoungjoong Kim "Reversible watermarking using edge based difference modification", Proc. SPIE 9069, Fifth International Conference on Graphic and Image Processing (ICGIP 2013), 90690Q (10 January 2014); https://doi.org/10.1117/12.2050221
Lens.org Logo
CITATIONS
Cited by 1 scholarly publication.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Digital watermarking

Distortion

Image restoration

Data centers

Information security

Information technology

Security technologies

RELATED CONTENT


Back to Top