Reversible image watermarking algorithm based on reverse histogram translation

被引:2
|
作者
Zhang, Zhengwei [1 ]
Li, Fenfen [1 ]
Zuo, Xingyuan [1 ]
Meng, Qian [1 ]
Jin, Shenghua [1 ]
机构
[1] Huaiyin Inst Technol, Fac Comp & Software Engn, Huaian 223003, Jiangsu, Peoples R China
关键词
Histogram translation; Embedding capacity; Image visual quality; Reversible image watermarking;
D O I
10.1007/s11042-022-13770-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Medical, military and other fields need high degrees of security and privacy for images. Aiming at the problems of low embedding rate and low visual quality of the traditional reversible image watermarking based on histogram translation, a new reversible watermarking algorithm based on reverse histogram translation is proposed to further improve the embedding capacity and visual quality. A reversible image watermarking algorithm based on reverse histogram translation is proposed. Firstly, the embedded watermark information is scrambled. Then, after embedding the watermark through histogram translation, the inverse histogram transform is used to embed the watermark information for the second time. In order to further improve the reversible watermark embedding capacity, the peak value and secondary peak value in the histogram can be used to embed the watermark by reverse histogram translation. The experimental result shows that compared with different carrier images and similar algorithms, this method has better visual effects and less distortion at the same embedding rate, and the extracted image does not have any pixel difference from the original image. In addition, using this method to embed watermark, the watermark embedding capacity is improved on the premise of ensuring a certain visual quality.
引用
收藏
页码:11005 / 11019
页数:15
相关论文
共 50 条
  • [1] Reversible image watermarking algorithm based on reverse histogram translation
    Zhengwei Zhang
    Fenfen Li
    Xingyuan Zuo
    Qian Meng
    Shenghua Jin
    [J]. Multimedia Tools and Applications, 2023, 82 : 11005 - 11019
  • [2] Reversible and robust image watermarking based on histogram shifting
    R. Rajkumar
    A. Vasuki
    [J]. Cluster Computing, 2019, 22 : 12313 - 12323
  • [3] Reversible and robust image watermarking based on histogram shifting
    Rajkumar, R.
    Vasuki, A.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 5): : 12313 - 12323
  • [4] An Improved Reversible Watermarking Algorithm Based on Difference Histogram
    Xiong, Xiang-Guang
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 296 - 302
  • [5] A Watermarking Algorithm of Gray Image Based on Histogram
    Wang, Shumei
    Fan, Yong
    Yu, Ping
    [J]. PROCEEDINGS OF THE 2009 2ND INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOLS 1-9, 2009, : 1451 - +
  • [6] Reversible medical image watermarking based on wavelet histogram shifting
    Golpira, H.
    Danyali, H.
    [J]. IMAGING SCIENCE JOURNAL, 2011, 59 (01): : 49 - 59
  • [7] Reversible Image Watermarking Based On Histogram Modification and Virtual Border
    Lestriandoko, Nova Hadi
    Rosiyadi, Didi
    [J]. 2014 8TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATION SYSTEMS SERVICES AND APPLICATIONS (TSSA), 2014,
  • [8] Large-Capacity Reversible Watermarking Algorithm for Medical Image Based on Block Histogram of Difference
    Huang, Liangyong
    Pan, Guo
    Zheng, Guangyong
    Li, Zhimei
    [J]. INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2015, 29 (04)
  • [9] Reversible Image Watermarking Based on Genetic Algorithm
    Chen, Yueh-Hong
    Huang, Hsiang-Cheh
    [J]. 2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 21 - 24
  • [10] Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting
    Coatrieux, Gouenou
    Pan, Wei
    Cuppens-Boulahia, Nora
    Cuppens, Frederic
    Roux, Christian
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (01) : 111 - 120