TY - JOUR
T1 - Robust lossless image data hiding designed for semi-fragile image authentication
AU - Ni, Zhicheng
AU - Shi, Yun Q.
AU - Ansari, Nirwan
AU - Su, Wei
AU - Sun, Qibin
AU - Lin, Xiao
N1 - Funding Information:
Manuscript received September 26, 2006; revised June 27, 2007 and June 28, 2007. The work has been supported in part by the Digital Data Embedding Technologies group of the Air Force Research Laboratory, Rome Research Site, Information Directorate, Rome, NY, under contract F30602-03-1-0264 and in part by New Jersey Commission of Science and Technology via New Jersey Center of Wireless Network and Internet Security. This paper was recommended by Associate Editor M. Barni.
PY - 2008/4
Y1 - 2008/4
N2 - Recently, among various data hiding techniques, a new subset, lossless data hiding, has received increasing interest. Most of the existing lossless data hiding algorithms are, however, fragile in the sense that the hidden data cannot be extracted out correctly after compression or other incidental alteration has been applied to the stego-image. The only existing semi-fragile (referred to as robust in this paper) lossless data hiding technique, which is robust against high-quality JPEG compression, is based on modulo-256 addition to achieve losslessness. In this paper, we first point out that this technique has suffered from the annoying salt-and-pepper noise caused by using modulo-256 addition to prevent overflow/underflow. We then propose a novel robust lossless data hiding technique, which does not generate salt-and-pepper noise. By identifying a robust statistical quantity based on the patchwork theory and employing it to embed data, differentiating the bit-embedding process based on the pixel group's distribution characteristics, and using error correction codes and permutation scheme, this technique has achieved both losslessness and robustness. It has been successfully applied to many images, thus demonstrating its generality. The experimental results show that the high visual quality of stego-images, the data embedding capacity, and the robustness of the proposed lossless data hiding scheme against compression are acceptable for many applications, including semi-fragile image authentication. Specifically, it has been successfully applied to authenticate losslessly compressed JPEG2000 images, followed by possible transcoding. It is expected that this new robust lossless data hiding algorithm can be readily applied in the medical field, law enforcement, remote sensing and other areas, where the recovery of original images is desired.
AB - Recently, among various data hiding techniques, a new subset, lossless data hiding, has received increasing interest. Most of the existing lossless data hiding algorithms are, however, fragile in the sense that the hidden data cannot be extracted out correctly after compression or other incidental alteration has been applied to the stego-image. The only existing semi-fragile (referred to as robust in this paper) lossless data hiding technique, which is robust against high-quality JPEG compression, is based on modulo-256 addition to achieve losslessness. In this paper, we first point out that this technique has suffered from the annoying salt-and-pepper noise caused by using modulo-256 addition to prevent overflow/underflow. We then propose a novel robust lossless data hiding technique, which does not generate salt-and-pepper noise. By identifying a robust statistical quantity based on the patchwork theory and employing it to embed data, differentiating the bit-embedding process based on the pixel group's distribution characteristics, and using error correction codes and permutation scheme, this technique has achieved both losslessness and robustness. It has been successfully applied to many images, thus demonstrating its generality. The experimental results show that the high visual quality of stego-images, the data embedding capacity, and the robustness of the proposed lossless data hiding scheme against compression are acceptable for many applications, including semi-fragile image authentication. Specifically, it has been successfully applied to authenticate losslessly compressed JPEG2000 images, followed by possible transcoding. It is expected that this new robust lossless data hiding algorithm can be readily applied in the medical field, law enforcement, remote sensing and other areas, where the recovery of original images is desired.
KW - Lossless data hiding
KW - Reversible data hiding
KW - Robust lossless data hiding
KW - Semi-fragile authentication
KW - Watermarking
UR - http://www.scopus.com/inward/record.url?scp=64349085584&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=64349085584&partnerID=8YFLogxK
U2 - 10.1109/TCSVT.2008.918761
DO - 10.1109/TCSVT.2008.918761
M3 - Article
AN - SCOPUS:64349085584
SN - 1051-8215
VL - 18
SP - 497
EP - 509
JO - IEEE Transactions on Circuits and Systems for Video Technology
JF - IEEE Transactions on Circuits and Systems for Video Technology
IS - 4
M1 - 4453842
ER -