DOI QR코드

DOI QR Code

High-Capacity Reversible Watermarking through Predicted Error Expansion and Error Estimation Compensation

추정 오차 확장 및 오류 예측 보정을 통한 고용량 가역 워터마킹

  • 이해연 (국립금오공과대학교 컴퓨터공학부) ;
  • 김경수 (KT 네트워크연구소)
  • Received : 2010.01.08
  • Accepted : 2010.03.09
  • Published : 2010.08.31

Abstract

Reversible watermarking which can preserve the original quality of the digital contents and protect the copyright has been studied actively. Especially, in medical, military, and art fields, the need for reversible watermarking is increasing. This paper proposes a high-capacity reversible watermarking through predicted error expansion and error estimation compensation. Watermark is embedded by expanding the difference histogram between the original value and the predicted value. Differently from previous methods calculating the difference between adjacent pixels, the presented method calculates the difference between the original value and the predicted value, and that increases the number of the histogram value, where the watermark is embedded. As a result, the high capacity is achieved. The inserted watermark is extracted by restoring the histogram between the original value and the predicted value. To prove the performance, the presented algorithm is compared with other previous methods on various test images. The result supports that the presented algorithm has a perfect reversibility, a high image quality, and a high capacity.

디지털 콘텐츠의 원본 품질을 유지할 수 있고 지적 재산권을 보호할 수 있는 가역 워터마킹 기술에 대한 다양한 연구가 진행되고 있다. 특히 원본 품질을 중요시하는 의료, 군사, 예술작품 분야에서 가역 워터마킹의 필요성이 증대되고 있다. 본 논문에서는 추정 오차 확장 및 오류 예측 보정을 통한 고용량 가역 워터마킹 기술을 제안한다. 보간 기법을 사용하여 픽셀의 값을 추정하고, 추정값과 원본값의 차이에 대한 히스토그램을 계산한 후에 이를 확장하여 워터마크 메시지를 삽입한다. 기존의 인접 픽셀 사이의 차이값이 아닌 추정치를 활용함으로써 메시지가 삽입되는 히스토그램 값의 집중도를 높여서 높은 삽입 용량을 달성하였다. 삽입된 워터마크는 추정값과 원본값의 차이에 대한 히스토그램을 복원하여 검출한다. 삽입 후에 발생할 수 있는 오버플로우 및 언더플로우 문제는 오류 예측 기법을 통하여 해결하였다. 제안하는 가역 워터마킹 알고리즘의 성능을 검증하기 위하여 다양한 영상을 활용하여 기존 알고리즘과 비교 분석을 수행하였다. 그 결과에 따르면 제안한 알고리즘은 완전한 가역성을 갖으며, 삽입 후에도 높은 영상 품질을 유지하고, 높은 삽입 용량을 얻을 수 있었다.

Keywords

References

  1. I. Cox, M. Miller, J. Bloom, J. Fridrich and T. Kalker, "Digital Watermarking and Steganography," Morgan Kaufmann Publishers Inc., San Francisco, CA, 2007.
  2. H.-Y. Lee, H. Kim, and H.-K. Lee, "Robust image watermarking using local invariant features," Optical Engineering, Vol.45. No.3, 2006.
  3. S.Y. Choi, H.-Y. Lee, I. K. Kang, and H.-K. Lee, "Video Fingerprinting System through Zero-based Code Modulation Technique," 한국정보처리학회 논문지, Vol.12-B(4), pp.443-450, 2005. https://doi.org/10.3745/KIPSTB.2005.12B.4.443
  4. K.-S. Kim, M.-J. Lee, H.-Y. Lee and H.-K. Lee, "Reversible data hiding exploiting spatial correlation between subsampled images," Pattern Recognition, Vol.42, No.11, pp.3083-3096, 2009. https://doi.org/10.1016/j.patcog.2009.04.004
  5. C.D. Vleeschouwer, J.-F. Delaigle, and B. Macq, "Circular interpretation of Bijective transformations in lossless watermarking for media asset management," IEEE Trans. on Multimedia, Vol.5, No.1, pp. 97-105, 2003. https://doi.org/10.1109/TMM.2003.809729
  6. J. Fridrich, J. Goljan and R. Du, "Invertible authentication," Proc. of the SPIE, Security and Watermarking of Multimedia Contents, San Jose, CA, Vol.4314, pp.197-208, 2001.
  7. M.U. Celik, G. Sharma, A.M. Tekalp and E. Saber, "Lossless generalized-LSB data embedding," IEEE Trans. on Image Processing, Vol.14, No.2, pp.253-266, 2005. https://doi.org/10.1109/TIP.2004.840686
  8. J.Y. Kim, H.-Y. Lee, D.-H. Im, S.-J. Ryu, J.-H. Choi, and H.-K. Lee, "Print-Scan Resilient Curve Watermarking using B-Spline Curve Model and Its 2D Mesh Spectral Transform," 한국정보처리학회 논문지, Vol.15-B(4), pp.307-314, 2008. https://doi.org/10.3745/KIPSTB.2008.15-B.4.307
  9. B. Yang, M. Schmucker, C.B.W. Funk and S. Sun, "Integer DCT-based reversible watermarking for images using compounding technique," Proc. of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, Vol.5306, pp.405-415, 2004.
  10. G. Xuan, Q. Yao, C. Yang, J. Gao, P. Chai, Y.Q. Shi and Z. Ni, "Lossless data hiding using histogram shifting method based on integer wavelets," International Workshop on Digital Watermarking, Lecture Notes in Computer Science, Vol.4283, pp.323-332, 2006.
  11. S. Lee, C.D. Yoo and T. Kalker, "Reversible image watermarking based on integer-to-integer wavelet transform," IEEE Trans. on Information Forensics and Security, Vol.2, No.3, pp.321-330, 2007. https://doi.org/10.1109/TIFS.2007.905146
  12. J. Tian, "Reversible data embedding using a difference expansion," IEEE Trans. on Circuits and Systems for Video Technology, Vol.13, No.8, pp.890-896, Aug. 2003. https://doi.org/10.1109/TCSVT.2003.815962
  13. A.M. Alattar, "Reversible watermark using difference expansion of triplets," Proc. of the IEEE International Conference on Image Processing, Vol.1, pp.501-504, 2003.
  14. A.M. Alattar, "Reversible watermark using difference expansion of quads," Proc. of the IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol.3, pp.377-380, 2004.
  15. A.M. Alattar, "Reversible watermark using the difference expansion of a generalized integer transform," IEEE Trans. on Image Processing, Vol.13, No.8, pp.1147-1156, 2004. https://doi.org/10.1109/TIP.2004.828418
  16. L. Kamstra and H.J.A.M. Heijmans, "Reversible data embedding into images using wavelet techniques and sorting," IEEE Trans. on Image Processing, Vol.14, No.12, pp.2082-2090, 2005. https://doi.org/10.1109/TIP.2005.859373
  17. D.M. Thodi and J.J. Rodriguez, "Expansion embedding techniques for reversible watermarking," IEEE Trans. on Image Processing, Vol.16, No.3, pp.721-730, 2007. https://doi.org/10.1109/TIP.2006.891046
  18. Z. Ni, Y.-Q. Shi, N. Ansari and W. Su, "Reversible data hiding," IEEE Trans. on Circuits and Systems for Video Technology, Vol.16, No.3, pp.354-362, 2006. https://doi.org/10.1109/TCSVT.2006.869964
  19. J.H. Hwang, J.W. Kim and J.U. Choi, "A reversible watermarking based on histogram shifting," International Workshop on Digital Watermarking, Lecture Notes in Computer Science, Vol.4283, pp.348-361, 2006.
  20. W.-C. Kuo, D.-J. Jiang and Y.-C. Huang, "Reversible data hiding based on histogram," International Conference on Intelligent Computing, Lecture Notes in Artificial Intelligence, Vol.4682, pp.1152-1161, 2007.
  21. S.-K. Lee, Y.-H. Suh and Y.-S. Ho, "Lossless data hiding based on histogram modification of difference images," Pacific Rim Conference on Multimedia, Lecture Notes in Computer Science, Vol.3333, pp.340-347, 2005.
  22. C.-C. Lin, W.-L. Tai and C.-C. Chang, "Multilevel reversible data hiding based on histogram modification of difference images," Pattern Recognition, Vol.41, No.12, pp.3582-3591, 2008. https://doi.org/10.1016/j.patcog.2008.05.015
  23. P. Tsai, Y.-C. Hu and H.-L. Yeh, "Reversible image hiding scheme using predictive coding and histogram shifting," Signal Processing, Vol.89, No.6, pp.1129-1143, 2009. https://doi.org/10.1016/j.sigpro.2008.12.017
  24. C.W. Honsinger, P. Jones, M. Rabbani and J.C. Stoffel, "Lossless recovery of an original image containing embedded data," US Patent application, Docket No: 77102/E-D, 1999.
  25. "JBIG-KIT lossless image compression library," (online), Available: {http://www.cl.cam.ac.uk/~mgk25/jbigkit/}.
  26. "USC-SIPI Image Database - Miscellaneous," Available: {http://sipi.usc.edu/database/database.cgi?volume=misc}.