Difference expansion and prediction for high bit-rate reversible data hiding Giulia Boato Marco Carli Federica Battisti Marco Azzoni Karen Egiazarian
Journal of Electronic Imaging 21(3), 033013 (Jul–Sep 2012)
Difference expansion and prediction for high bit-rate reversible data hiding Giulia Boato University of Trento Department of Information Engineering and Computer Science Trento 38121, Italy E-mail:
[email protected] Marco Carli Federica Battisti University of Roma TRE Department of Applied Electronics Roma 00146, Italy Marco Azzoni University of Trento Department of Information Engineering and Computer Science Trento 38121, Italy Karen Egiazarian Tampere University of Technology Department of Signal Processing Tampere 33720, Finland
Abstract. Reversible data hiding deals with the insertion of auxiliary information into a host data without causing any permanent degradation to the original signal. In this contribution a high capacity reversible data hiding scheme, based on the classical difference expansion insertion algorithm, is presented. The method exploits a prediction stage, followed by prediction errors modification, both in the spatial domain and in the S-transform domain. Such two step embedding allows us to achieve high embedding capacity while preserving a high image quality, as demonstrated in the experimental results. © 2012 SPIE and IS&T. [DOI: 10.1117/1.JEI.21.3.033013]
1 Introduction Digital watermarking schemes are usually adopted for protecting rights of both digital data and their corresponding owners.1,2 Such methods invisibly embed a watermark into the data to be protected, thus allowing copyright protection and illegal copies or illegal distributors identification via the embedded information recovery. In particular, classical watermarking applications consist of copy control, broadcast monitoring, fingerprinting, authentication, copyright protection, and access control (see for instance Refs. 3 and 4). This technology can be used also for different purposes, such as multimedia indexing, enrichment, quality assessment, error concealment, and others. In general, the imposed Paper 11296 received Nov. 3, 2011; revised manuscript received May 7, 2012; accepted for publication Jul. 9, 2012; published online Aug. 14, 2012. 0091-3286/2012/$25.00 © 2012 SPIE and IS&T
Journal of Electronic Imaging
requirements are 1. robustness: the hidden data should be detectable after classical signal processing, 2. imperceptibility: the watermarked signal has to be perceptually similar to the original one, and 3. capacity: the number of bits that can be embedded should be as high as possible. In particular application scenarios (e.g., medical or military) another crucial constraint has to be considered 4. integrity of the recovered signal: the watermarking process has to be invertible, allowing the reconstruction of the original data after the watermark extraction. This last requirement is achieved by the so-called reversible watermarking techniques. Many reversible watermarking algorithms have been proposed in the literature. The main difference among existing schemes lies in the particular method adopted for achieving reversibility. A first class of techniques exploits data compression, which was introduced in Ref. 5 by Fridrich et al. by embedding with the watermark also the lossless compressed original data as well as the corresponding location map. Celik et al. follow this idea in Ref. 6 by presenting a generalized-LSB data hiding method. Xuan et al.7 propose an algorithm based on integer wavelet transform. Another class of methods is based on histogram shifting. The basic idea to embed the watermark through histogram modification was presented by Ni et al.8 where the pixel values in the range between peak and zero points are modified. This technique is extended in, Ref. 9, where Hwang et al. propose to use two zero points and one peak point of the histogram as triplets to insert the data, and more
033013-1
Jul–Sep 2012/Vol. 21(3)
Boato et al.: Difference expansion and prediction for high bit-rate reversible data hiding
recently by Tai et al.10 Bo et al.11 and Yoo et al.12 to extend histogram shifting using small blocks of the image to embed data. A third class of algorithms uses difference expansion to achieve reversibility. The first proposal is due to Tian13 and embeds the watermark by modifying the difference between a pair of pixels, thus exploiting the redundancy among neighboring pixel values. Following Tian’s intuition, many extensions were proposed, which extend this approach to triplets,14 quads,15 three-pixel blocks,16 or n-pixel blocks,17,18 therefore allowing a reduction of the location map and an increase in both efficiency and capacity. Further modifications are presented in Ref. 19 by Thodi et al.20 by Kamstra et al.21 by Hu et al. while novel techniques based on other integer transforms are proposed by Coltuc et al.22 and by Chen et al.23 Finally, a new idea based on pixel prediction is elaborated in a set of recent contributions. The median edge detector predictor is used by Thodi et al.24 by Hong et al.25 and by Yang et al.26 while the gradient adjusted prediction is exploited by Fallahpour et al.27 Kuribayashi et al.28 apply difference expansion and prediction, while Tsai et al.29 and Pan et al.30 apply predictive coding and histogram shifting in the specific domain of medical imaging. In Ref. 31, prediction and histogram shifting are dynamically applied depending on human visual system characteristic while in Refs. 32 to 34, interpolation is used as prediction to calculate the error band. Xuan et al.35 and Kuo et al.36 apply error control and histogram shifting to embed data keeping good stego-image quality. Tseng et al.37 study various predictors, while Hu et al.38 improve the location map compressibility, Sachnev et al.39 reduce its size, and Fujiyoshi et al.40 avoid any image-dependent parameter or location map. In Ref. 41, Yang et al. propose a data hiding technique in both the spatial and frequency domain which seems to be robust against JPEG and JPEG2000. In this context, the authors proposed in Ref. 42 to exploit both local dependency and non-local similarity for prediction, by employing block-matching techniques, while in Ref. 43 histogram shifting was combined with a particular prediction exploiting directional differences. In this work a double embedding scheme is proposed, where a prediction stage, followed by prediction errors modification, is applied both 1. in the spatial domain and in 2. the S-transform domain. The adoption of this multilayer approach allow us to achieve very high capacity while preserving good image quality. A preliminary study on multiresolution approaches was presented in Ref. 44 Recently, high capacity was achieved by in Refs. 45 and 46, which we compare the performances with in the experimental section.
The rest of the work is organized as follows: details on the proposed algorithm are given in Sec. 2, while the experimental results are reported in Sec. 4, and finally in Sec. 5 some conclusions are drawn. 2 Embedding As depicted in Fig. 1 the proposed scheme works as follows: the spatial prediction is first applied to the original image and a first embedding is performed exploiting the obtained prediction error. Then, an integer transform is applied to the resulting image, and a novel prediction scheme is applied to the low-and high-frequency subbands. Thus, a second embedding is performed on the prediction errors. Let us detail all steps of the scheme: 1. Prediction is applied to the original image X ¼ fxi;j gi, j ¼ 1; : : : ; n in the spatial domain, thus obtaining X^ as described in Sec. 2.1 and correspondingly the spatial prediction error ^ Esp ¼ X − X:
(1)
2. Embedding via difference expansion into prediction error Esp as detailed in Sec. 2.4: •
•
Definition of positions used for embedding and of the corresponding location map (required at the detector side to perform watermark extraction and original image reconstruction). Watermark and overhead information embedding thus defining a new watermarked prediction 0 . error Esp
The watermarked image X 0 is defined as follows 0 : X 0 ¼ X^ þ Esp
(2)
3. S-transform is applied to the watermarked image X 0 , thus obtaining low-and high-frequency bands L and H, respectively (see details in Sec. 2.2). Starting ^ and the transfrom L, prediction is applied to get H form prediction error is calculated as follows ^ Etr ¼ H − H;
(3)
as described in Sec. 2.3. 4. Embedding via difference expansion into prediction error Etr defining a new watermarked prediction error Etr0 , as in step 2. The watermarked highfrequency band H 0 is defined as follows
Fig. 1 Proposed scheme for watermark embedding. Journal of Electronic Imaging
033013-2
Jul–Sep 2012/Vol. 21(3)
Boato et al.: Difference expansion and prediction for high bit-rate reversible data hiding
^ þ Etr0 : H0 ¼ H
(4)
5. Finally, the inverse S-transform is applied to L and H 0 to obtain the watermarked image X 0 . Let us notice that the watermark and the required overhead information are embedded into two steps (2 and 4) and will be denoted as W ¼ ðW sp ; W tr Þ. 2.1 Prediction in Spatial Domain The gradient adjust predictor (GAP)27 considers seven neighbors of the to-be-predicted pixel x^ i;j as follows: dv ¼ jxi−1;j − xi−1;j−1 j þ jxi;j−1 − xi;j−2 j þ jxiþ1;j−1 − xiþ1;j−2 j
dh ¼ jxi−1;j − xi−2;j j þ jxi;j−1 − xi−1;j−1 j þ jxi;j−1 − xiþ1;j−1 j
xi−1;j þ xi;j−1 xiþ1;j−1 þ xi−1;j−1 þ D ¼ dv − dh x˜ i;j ¼ 2 4 8 x if D < −80 > i;j−1 > > > x˜ i;j þxi;j−1 > if − 80 ≤ D < −32 > > > 3˜xi;j2þxi;j−1 > > if − 32 ≤ D < −8 < 4 ˜ x if −8≤D 3˜xi;j þxi−1;j > > if 8 ≤ D < 32 > 4 > > x˜ i;j þxi−1;j > > if 32 ≤ D < 80 > 2 > : xi−1;j if D ≥ 80
(5)
2.2 S-Transform The S-transform47 is an invertible time-frequency spectral localization technique often called also integer Haar wavelet transform. Let us consider the image X 0 of size n × n. The low-frequency L and the high-frequency H sub-band decomposition of X can be computed as follows: liþ1;j
0 0 x2iþ1;j þ x2iþ2;j ¼ 2
"
0 0 − x2iþ2;j ; (6) hiþ1;j ¼ x2iþ1;j
where i ¼ 0; : : : ; n2 − 1, j ¼ 1; : : : ; n and L ¼ fliþ1;j g while H ¼ fhiþ1;j g. The corresponding inverse transformation is given by ! " hiþ1;j þ 1 0 0 0 x2iþ1;j ¼ liþ1;j þ ¼ x2iþ1;j − hiþ1;j : (7) x2iþ2;j 2 Notice that in this case we are applying the S-transform in the vertical direction. Horizontal decomposition can be performed just by defining L ¼ flj;iþ1 g and H ¼ fhj;iþ1 g. 2.3 Prediction in Transform Domain To guarantee the reversibility of the watermarking method, the proposed prediction scheme aims at predicting highJournal of Electronic Imaging
Δliþ1;j ¼ li;j − liþ1;j ;
(8)
where i ¼ 1; : : : ; n2 − 1. Notice that differences can be calculated starting from the second row, thus we impose Δl1;j ¼ 0. ^ is estimated as The predicted high-frequency sub-band H following: 1 1 1 1 h^ iþ1;j ¼ li;j þ liþ1;j − liþ2;j þ liþ3;j ; 4 8 2 8
(9)
where i ¼ 1; : : : ; n2 − 3 represent the range of coefficients used in the prediction. Notice that this prediction differs from the one presented in Ref. 44 since a new combination of weights is used exploring also second order differences. The prediction error is finally given by # $ 1 ^ eiþ1;j ¼ hiþ1;j − hiþ1;j þ ; (10) 2 where i ¼ 1; : : : ; n2 − 3, j ¼ 1; : : : ; n. This defines the transform prediction error Etr ¼ feiþ1;j g that will be used for watermark embedding via difference expansion.
This defines X^ ¼ f^xi;j gi, j ¼ 1; : : : ; n and the spatial prediction error Esp ¼ X − X^ that will be used for watermark embedding via difference expansion.
!
frequency sub-band starting from the low frequency one in a way all required information will be available also at the detection side. The prediction scheme can be summarized as follows. Given the low frequency coefficients we define relative differences
2.4 Embedding Via Difference Expansion The main idea of difference expansion is to hide information into a set of values, in two slightly different ways according to their characteristics. Once Esp and Etr are defined, the watermark W ¼ ðW sp ; W tr Þ insertion is performed by applying Tian’s method13 to Esp and Etr , thus defining the water0 marked prediction error Esp and Etr0 , used in Eqs. (2) and (4), respectively. For simplicity and coherence with the original Tian’s method we describe the process in the transform domain but the same procedure is applied in the spatial domain. In particular, following Eq. (4) Etr0 is used to define the 0 allows to define watermarked values of H 0 (similarly Esp the watermarked values of X 0 ), which have to satisfy following rules in order to avoid overflow and underflow problems. Indeed, X, X 0 , and X 0 0 values should be bounded in the range ½0; 255& !
" 0 hiþ1;j þ1 ≤ 255 2 ! 0 " hiþ1;j 0 ≤ liþ1;j − ≤ 255: 2 0 ≤ liþ1;j þ
(11)
Since both l and h 0 are integer values 0 jhiþ1;j j ≤ 2ð255 − liþ1;j Þ ¼ a;
0 jhiþ1;j j ≤ 2liþ1;j þ 1 ¼ b:
(12)
Now we can define two different types of values in Etr (similarly in Esp ):
033013-3
Jul–Sep 2012/Vol. 21(3)
Boato et al.: Difference expansion and prediction for high bit-rate reversible data hiding •
The error is expandable if for both the watermark entries wm ¼ 0 and wm ¼ 1 0 0 jhiþ1;j j ¼ jh^ iþ1;j þ eiþ1;j j ≤ minða; bÞ:
(13)
In this case we can perform the embedding of the bit wm of the watermark W by expanding the error and define the watermarked value as follows: 0 ¼ 2eiþ1;j þ wm : eiþ1;j
•
(14)
The error is changeable if for both the watermark entries wm ¼ 0 and wm ¼ 1 % % ! " % % eiþ1;j 0 % ^ jhiþ1;j j ¼ %hiþ1;j þ 2 þ wm %% ≤ minða; bÞ: 2 (15) In this case embedding is performed just by substituting the least significant bit (LSB) of eiþ1;j with the bit wm of the watermark W.
Notice that an expandable value is also changeable, as depicted in Fig. 2(a). Therefore, it can be used in both ways. This property will be exploited in the following subsets definition. Indeed, before embedding error values are partitioned into four sets: • • • • •
and the particular embedding adopted. The location map is a binary matrix of same size of the original image with value 1 in the position corresponding to differences belonging to E1 ∪ E2 and with value 0 in the position belonging to E3 ∪ C ∪ NC [see Fig. 2(a)]. It is worth noticing that a changeable value remains changeable also after embedding, thus it is always distinguishable from a value in NC. This way, during the detection stage it is possible to distinguish places where a bit of mark was introduced, and where not [see Fig. 2(b)]. The location map is lossless compressed defining the overhead information LM which has to be sent to the detector together with the mark. The compression ratio depends on the applied technique and affects the capacity of the algorithm. For each value of eiþ1;j in E3 and C, LSB values have to be collected since bit insertion change them. Such values are stored into a bit-stream called LSB. Therefore, the complete stream W ¼ fW sp ; W tr g which is embedded consists of LM ∪ LSB ∪ watermark for both W sp and W tr . Thus, the watermark payload size is defined depending on the size of E2 and on the compression rate of the location map. 3 Detection Let us now describe in detail all phases of the detection process, illustrated also in Fig. 3:
E1 which contains all expandable differences with eiþ1;j ¼ 0 or eiþ1;j ¼ −1. E2 which contains all expandable differences that do not belong to E1 and are used as expandable. E3 which contains all expandable differences that do not belong to E1 and are used as changeable. C which contains all changeable differences that do not belong to E1 or E2 or E3. NC which contains all non-changeable differences.
Embedding is now performed in E1 ∪ E2 and E3 ∪ C following the two different rules, expansion and LSB substitution, respectively. 2.5 Overhead Information In order to design a reversible method some information must be sent to the detector: such extra information is composed by original LSB of every error value changed through LSB substitution, and the so-called location map that is used to identify the positions of the bits that have been modified
1. The S-transform is applied to the watermarked image X 0 0 , resulting in L and H 0 decomposition. 2. Starting from L, prediction is applied thus recovering ^ The modified prediction error is calculated as H. ^ Etr0 ¼ H 0 − H:
(16)
Since the L sub-band coefficients used for predicting ^ have not been modified (bitwise equal), the preH ^ is exactly the same as in the embedddicted H ing phase. Thus, information extracted from Etr0 is bitwise identical to the one inserted (thanks to the reversibility of the difference expansion method, see for instance Ref. 13). 3. Bit-stream W tr is extracted from Etr0 from all changeable values. Now from the recovered LM it is possible to differentiate among differences used as expandable E1 ∪ E2, changeable E3 ∪ C, and non-changeable NC. From LSB it is then possible to recover all original LSB values of changeable differences. Finally, the watermark can be extracted and all original values of Etr can be restored. The original highfrequency sub-band H can be recovered by calculating
Fig. 2 (a) Distinction between values used as expandable and non-expandable positions within the location map; and (b) distinction between changeable positions and non-changeable positions recognizable at the detector side without any side information. Journal of Electronic Imaging
033013-4
Jul–Sep 2012/Vol. 21(3)
Boato et al.: Difference expansion and prediction for high bit-rate reversible data hiding
Fig. 3 Proposed scheme for watermark extraction and original image recovery.
^ þ Etr : H¼H
(17)
4. The image X 0 can be restored by computing the inverse S-transform of L and H. 5. Starting from X 0 , prediction is applied thus recovering ^ The modified prediction error is calculated as X. 0 ¼ X 0 − X: ^ Esp
(18)
Sec. 2.3. In Figs. 4 to 7 results are reported for six different well known spatial predictors: GAP, median edge detector (MED), DARK, PAETH, simple average (SA), and previous pixel (DIFF). In all cases (we report here results for four images) GAP gives the best results and this motivates our choice in the algorithm design. Results reported in Figs. 8 to 11 present the detailed performances achieved by the proposed method for four images
Also in this case, prediction is defined in order to be reversible: starting from the same input, the predicted set of coefficients will be exactly the same, independently from coefficients modified by the watermak (inserted only into high frequencies), see for instance Ref. 27. 0 as in step 3 and 6. Bit-stream W sp is extracted from Esp all original values of Esp can be restored. Finally, the original image X can be recovered by calculating X ¼ X^ þ Esp :
(19)
Since both extraction steps (3 and 5) are reversible, the whole process can be inverted and the original image bitwise perfectly recovered. 4 Experimental Results To evaluate the effectiveness of the proposed schemes several experimental tests have been performed. The achieved results are reported by considering both capacity (payload of the watermark inserted without considering the overhead information: location map bit-stream LM and LSB of differences used as changeable, as described in Sec. 2.5), measured in bit per pixel (bpp) and quality of the watermarked image measured with different perceptual metrics: PSNR, PSNR-HVS, and PNSR-HVS-M.48 All tests have been computed on a set of 32 images taken from the GrayScale Set 2 image repository of the University of Waterloo (http://links.uwaterloo.ca/Repository.html) and the Tampere Image Database 2008 (http://www.ponomarenko. info/tid2008.htm), considering the gray-scaled version of original images only. Although the reversibility of the exploited techniques is already proved in the literature (see for instance Ref. 27), first of all we have verified that both the original image and the embedded data can be perfectly recovered from the watermarked one, after the hidden information extraction procedure. As far as the spatial prediction is concerned, different types of prediction have been tested and combined with the prediction in the transform domain described in Journal of Electronic Imaging
Fig. 4 Spatial predictors performances in terms of PSNR for the Lena image.
Fig. 5 Spatial predictors performances in terms of PSNR for the Barbara image.
033013-5
Jul–Sep 2012/Vol. 21(3)
Boato et al.: Difference expansion and prediction for high bit-rate reversible data hiding
Fig. 6 Spatial predictors performances in terms of PSNR for the Boat image.
Fig. 7 Spatial predictors performances in terms of PSNR for the Goldhill image.
Fig. 8 Performances of the proposed approach in terms of different perceptual metrics for the Lena image. Journal of Electronic Imaging
Fig. 9 Performances of the proposed approach in terms of different perceptual metrics for the Barbara image.
Fig. 10 Performances of the proposed approach in terms of different perceptual metrics for the Boat image.
Fig. 11 Performances of the proposed approach in terms of different perceptual metrics for the Goldhill image.
033013-6
Jul–Sep 2012/Vol. 21(3)
Boato et al.: Difference expansion and prediction for high bit-rate reversible data hiding
Table 1 Maximum capacity and corresponding quality of watermarked images for the whole dataset.
Image
Max payload (bpp)
PSNR (dB)
PSNR-HVS-M (dB)
PSNR-HVS (dB)
Zelda
1.47
30.87
37.46
33.02
Washsat
1.48
27.76
34.16
29.75
Peppers2
1.31
25.71
33.23
28.41
Mandrill
1.09
18.8
25.63
20.93
Lena2
1.46
27.54
32.84
28.47
Goldhill2
1.46
24.76
30.82
26.42
Frog
1.32
17.5
27.89
22.5
France
1.35
28.58
34.63
29.34
Boat
1.45
27.01
31.08
27
Barb
1.41
23.25
30.37
25.62
I01
0.96
20.1
26.30
21.88
I02
1.06
25.7
31.45
27.03
I03
1.05
26.34
32.71
28.15
I04
1.09
28.1
34.24
29.85
I05
0.93
20.60
25.44
21.6
I06
1.04
26.2
31.12
26.72
I07
0.75
21.52
26.56
22.23
I08
1.03
25.75
30.8
26.5
I09
1.01
26.12
31
26.7
I10
0.92
22.67
28.27
24
I11
1
26
30.3
26.67
I12
0.92
22
27.78
23.23
I13
0.95
26.36
33.6
28.6
I14
1.05
24.57
29.4
25.77
I15
1
25.78
31.83
27.12
I16
0.89
23
28.96
24.16
I17
0.92
24.1
29.96
25
I18
0.9
22.1
28
23.34
I19
0.97
23.32
29.9
25.3
I20
1
27.73
33
28.3
I21
0.98
24.12
29.2
25
I22
0.7
25.73
30.7
26.24
Journal of Electronic Imaging
(due to lack of space) in terms of different quality metrics: PSNR, PSNR-HVS, and PNSR-HVS-M. This way, we do not only have the information about classical PSNR measure of quality but also about state-of-art perceptual quality metrics which allow to better understand the real user evaluation of distortion introduced with the watermark. It is worth noticing that the proposed method allows us to achieve high capacity by keeping the quality of the watermarked images pretty high. With respect to Ref. 45, we achieve better results: for example, for Lena45 reports 1,70 bpp with 19,60 dB of PSNR while we reach a lower maximum capacity (1,47 bpp) but with much higher quality (27,54 dB); for Barbara for capacity 1 bpp.45 gets a PSNR of 18,82 dB while we have 26,37 dB; for Boat45 reports 1,56 bpp with 19,52 dB while we reach a 1,46 bpp with 27,01 dB. As far as Ref. 46 is concerned, the proposed technique achieves very similar results for high-capacity ranges (see for example Lena and Barbara images). Comparison with high-capacity techniques cannot be done in terms of perceptual quality metrics due to the fact that results are usually reported just in terms of PSNR. The maximum capacity achieved and the corresponding perceptual quality of the watermarked image in terms of the three metrics are shown in Table 1 for all 32 tested images. It is evident that the proposed technique allows us to embed a high number of bits for the watermark without impacting too much on the quality of the data. In particular, capacity higher that 1 bpp can be achieved for Mandrill whereas Refs. 45 and 46 present maximum capacity lower than 1 bpp. 5 Conclusions In this work a reversible data hiding method has been presented. It is based on the combination of prediction and difference expansion insertion algorithms and on the use of such combination both in the spatial and in the transform domain. The adoption of a multilayer technique results in high capacity and good image quality as demonstrated in the performed simulations. References 1. I. Cox et al., Digital Watermarking and Steganography, Morgan Kaufmann, Burlington, MA (2007). 2. F. Perez-Gonzales and S. Voloshynovskiy, Fundamentals of Digital Image Watermarking, John Wiley & Sons Inc., Hoboken, NJ (2009). 3. B. Furht and D. Kirovski, Multimedia Watermaking Techniques and Application, Taylor & Francis Group, New York, NY (2006). 4. G. Boato, F. G. B. De Natale, and C. Fontanari, “An improved asymmetric watermarking scheme suitable for copy protection,” IEEE Trans. Signal Process. 54(7), 2833–2834 (2006). 5. J. Fridrich, M. Goljan, and R. Du, “Lossless data embedding: new paradigm in digital watermarking,” EURASIP J. Appl. Signal Process. 2002(2), 185–196 (2002). 6. M. U. Celik et al., “Lossless generalized LSB data embedding,” IEEE Trans. Image Process. 14(2), 253–266 (2005). 7. G. Xuan et al., “Distortionless data hiding based on integer wavelet trans-form,” Electron. Lett. 38(25), 1646–1648 (2002). 8. Z. Ni et al., “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol. 16(3), 354–362 (2006). 9. J. Hwang, J. Kim, and J. Choi, “A reversible watermark-ing based on histogram shifting,” in Proc. of International Workshop on Digital Watermarking 2006, LNCS, Vol. 4283, pp. 348–361 (2006). 10. W.-L.- Tai, “Reversible data hiding based on histogram modification of pixel differences,” IEEE Trans. Circuits Syst. Video Technol. 19(6), 906–910 (2009). 11. X. Bo, Y. Lizhi, and H. Yongfeng, “Reversible data hiding using histogram shifting in small blocks,” in IEEE International Conference in Communication (ICC), IEEE Content Engineering Publishing Technology, Piscataway, NJ (2010). 12. H.-M. Yoo, S.-K. Lee, and J.-W. Suh, “High capacity reversible data hiding using the histogram modification of block image,” in LNCS
033013-7
Jul–Sep 2012/Vol. 21(3)
Boato et al.: Difference expansion and prediction for high bit-rate reversible data hiding
13. 14. 15.
16. 17. 18.
19.
20. 21. 22. 23.
24. 25.
26.
27. 28. 29. 30.
31. 32. 33. 34.
35. 36.
37. 38. 39.
Neural Information Processing, IEEE Content Engineering Publishing Technology, Piscataway, NJ (2009). J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol. 13(8), 890–896 (2003). A. M. Alattar, “Reversible watermarking using difference expansion of triplets,” IEEE International Conference on Image Processing ICIP, Vol. 2003, pp. 501–504 (2003). A. M. Alattar, “Reversible watermarking using difference expansion of quads,” IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol. 3, pp. 377–380, IEEE Content Engineering Publishing Technology, Piscataway, NJ (2004). C. C. Lin and N. L. HSueh, “A lossless data hiding scheme based on three-pixel block differences,” Pattern Recogn. 41(4), 1415–1425 (2008). A. M. Alattar, “Reversible watermarking using the difference expansion of a generalized integer transform,” IEEE Trans. Image Process. 13(8), 1147–1156 (2004). M. Khodaei and K. Faez, “Reversible data hiding by using modified difference expansion,” in 2nd International Conference on Signal Processing Systems (ICSPS), IEEE Content Engineering Publishing Technology, Piscataway, NJ (2010). D. M. Thodi and J. J. Rodriguez, “Prediction-error based reversible watermarking,” in Proc. of IEEE International Conference on Image Processing, Vol. 2004, pp. 1549–1552, IEEE Content Engineering Publishing Technology, Piscataway, NJ (2004). L. Kamstra and H. J. A. M. Heijmans, “Reversible data embedding into images using wavelet techniques and sorting,” IEEE Trans. Image Process. 14(12), 2082–2090 (2005). Y. Hu et al., “Difference expansion based reversible data hiding using two embedding directions,” IEEE Trans. Multimed. 10(8), 1500–1512 (2008). D. Coltuc and J. M. Chassery, “Very fast watermarking by reversible constrast mapping,” IEEE Signal Process. Lett. 14(4), 255–258 (2007). X. Chen et al., “Reversible image watermarking based on a generalized integer transform,” in IEEE International Conference on Acoustics, Speech, and Signal Processing, IEEE Content Engineering Publishing Technology, Piscataway, NJ (2010). D. M. Thodi and J. Rodriguez, “Expansion embedding techniques for reversible watermarking,” IEEE Trans Image Process. 16(3), 721–730 (2007). W. Hong, T. S. Chen, and C. W. Shiu, “Reversible data hiding based on histogram shifting of prediction errors,” in IEEE International Symposium on Intelligent Information Technology Application Workshops, pp. 292–295 (2008). L. Yang, Y. Jing, and S. Wei, “Reversible data hiding algorithm based on prediction error,” in 2nd International Asia Conference on Informatics in Control, Automation and Robotics, IEEE Content Engineering Publishing Technology, Piscataway, NJ (2010). M. Fallahpour, “Reversible image data hiding based on gradient adjusted prediction,” IECIE Electron. Express 5(20), 870–876 (2008). M. Kuribayashi, M. Morii, and H. Tanaka, “Reversible watermark with large capacity using the predictive coding,” IECIE Trans. Fundament. Electron. Commun. Comput. Sci. 7(7), 1780–1790 (2008). P. Tsai, Y.-C. Hu, and H.-L. Yeh, “Reversible image hiding scheme using predictive coding and histogram shifting,” Signal Process. 89(6), 1129–1143 (2009). C. L. Pan et al., “Lossless embedding using difference between sub-sampled images,” in 2nd International Conference on Education Technology and Computer (ICETC), IEEE Content Engineering Publishing Technology, Piscataway, NJ (2010). S.-W. Jung, L. T. Ha, and S. J. Ko, “A new histogram based reversible data hiding algorithm considering the human visual system,” IEEE Signal Process. Lett. 18(2), 95–98 (2011). L. Luo et al., “Reversible image watermarking using interpolation technique,” IEEE Trans. Inf. Forensic Security 5(1), 187–193 (2010). C.-H. Yang and M.-H. Tsai, “Improving histogram-based reversible data hiding by interleaving predictions,” IET Image Process. 4(4), 223–234 (2009). Y. Yalman, F. Akar, and I. Erturk, “An image interpolation based reversible data hiding method using raweighted coding,” in IEEE International Conference on Computational Science and Engineering, IEEE Content Engineering Publishing Technology, Piscataway, NJ (2010). G. Xuan et al., “Double-threshold reversible data hiding,” in IEEE International Symposium on Circuits and Systems (ISCAS), IEEE Content Engineering Publishing Technology, Piscataway, NJ (2010). W.-C. Kuo, S.-H. Kuo, and L.-C. Wuu, “High embedding reversible data hiding scheme for JPEG,” in Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IEEE Content Engineering Publishing Technology, Piscataway, NJ (2010). H.-W. Tseng and C.-P. Hsieh, “Prediction-based reversible data hiding,” Elsevier Inform. Sci. 179(14), 2460–2469 (2009). Y. Hu, H.-K. Lee, and J. Li, “De-based reversible data hiding with improved overflow location map,” IEEE Trans. Circuits Syst. Video Technol. 19(2), 250–260 (2009). V. Sachnev et al., “Reversible watermarking algorithm using sorting and prediction,” IEEE Trans. Circuits Syst. Video Technol. 19(7), 989–999 (2009).
Journal of Electronic Imaging
40. M. Fujiyoshi, T. Tsuneyoshi, and H. Kiya, “A reversibile data hiding method free from location map parameter memorization,” in ISCIT, IEEE Content Engineering Publishing Technology, Piscataway, NJ (2010). 41. C.-Y. Yang and W.-C. Hu, “Reversible data hiding in the spatial and frequency domains,” Int. J. Image Process. 3(6), 265–384 (2010). 42. V. Conotter et al., “High capacity reversible data hiding based on histogram shifting and non-local means,” in IEEE International Workshop on Local and Non-Local Approximation in Image Processing, IEEE Content Engineering Publishing Technology, Piscataway, NJ (2009). 43. V. Conotter et al., “Near lossless reversible data hiding based on adaptive prediction,” in IEEE International Conference on Image Processing, IEEE Content Engineering Publishing Technology, Piscataway, NJ (2010). 44. M. Azzoni et al., “Reversible watermarking using prediction and difference expansion,” in IEEE European Workshop on Visual Information Processing, IEEE Content Engineering Publishing Technology, Piscataway, NJ (2010). 45. M. Chaumont and W. Puech, “A high capacity reversible watermarking scheme,” Proc. SPIE 7257, 72571H (2009). 46. C. Wang, X. Li, and B. Yang, “High capacity reversible image watermarking based on integer transform,” in IEEE International Conference on Image Processing, IEEE Content Engineering Publishing Technology, Piscataway, NJ (2010). 47. M. D. Adams, F. Kossentini, and R. K. Ward, “Generalized S transform,” IEEE Trans. Signal Process. 50(11), 2831–2842 (2002). 48. N. Ponomarenko et al., “On between-coefficient contrast masking of DCT basis functions,” in Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07 (2007). Giulia Boato received the MSc degree in mathematics in 2002, and the PhD degree in information and communication technologies in 2005, both from the University of Trento, Italy. In 2006, she was a visiting researcher at the University of Vigo, Spain, and in 2009 and 2010 she was a visiting researcher at the Tampere University of Technology, Finland. Currently, she is an assistant professor of telecommunications at the University of Trento, working within the Multimedia Signal Processing and Understanding Laboratory. Her research interests are focused on image and signal processing, with particular attention to multimedia data protection, data hiding, and digital forensics. Marco Carli received the “Laurea” degree in telecommunication engineering from the University of Rome, “La Sapienza,” Rome, Italy, in 1996. He joined Datamat—Systems Engineering Company until 1997. Since 1997, he is involved in the European Union international programs in Distance Education. Since 2000, he is a visiting researcher with the Image Processing Laboratory directed by S.Mitra, UCSB, University of California, Santa Barbara, California, USA. He currently holds an assistant professor position at the University of Rome, “Roma TRE.” His research interests are in the area of digital signal and image processing, in multimedia communications, and in security of telecommunication systems. He is an IEEE senior member and a SPIE member; he is a reviewer for many conferences and for IEEE Transactions. Federica Battisti received the MSc degree in electronic engineering in 2006, and the PhD degree in telecommunication engineering in 2010, from the Università degli Studi Roma TRE, Italy. In 2008, she was a visiting researcher in the Groupe Multimedia at Telecom ParisTech, France. In 2009, she was a visiting researcher in the signal processing in communications group at the University of Vigo, Spain. Currently, she is an assistant professor in the telecommunication group at Università degli Studi Roma TRE, Italy. Her research interests
033013-8
Jul–Sep 2012/Vol. 21(3)
Boato et al.: Difference expansion and prediction for high bit-rate reversible data hiding are focused on image and video processing, with particular attention to data hiding and multimedia quality assessment. Marco Azzoni received the Bachelor degree in telecommunication engineering in 2006 and the MSc degree in telecommunication engineering in 2010 both from the University of Trento, Italy. From November 2010 to December 2010 he was a visiting researcher in the signal processing group in the Tampere University of Technology.
Journal of Electronic Imaging
Karen Egiazarian received the PhD degree from Moscow M. V. Lomonosov State University, Russia, in 1986, and Doctor of Technology degree from Tampere University of Technology (TUT), Finland, in 1994. He is a professor of signal processing leading the computational imaging and transforms group at TUT. He has published over 500 refereed journal and conference articles, books, and patents. His main interests are in the field of image and video denoising and compression, transforms, efficient algorithms, and digital logic. He is an associate editor of several journals, including the SPIE Journal of Electronic Imaging and Research Letters in Signal Processing. He is a member of the DSP Technical Committee of the IEEE Circuits and Systems Society and a senior member of the IEEE.
033013-9
Jul–Sep 2012/Vol. 21(3)