162
Views
16
CrossRef citations to date
0
Altmetric
Section A

Reversible watermarking method based on adaptive thresholding and companding technique

, , &
Pages 1573-1594 | Received 22 Dec 2009, Accepted 09 Jul 2010, Published online: 11 Mar 2011

References

  • Alattar , A. M. 2004 . Reversible watermarking using the difference expansion of generalized integer transform . IEEE Trans. Image Process. , 13 ( 8 ) : 1147 – 1156 .
  • Alattar , A. M. 2004 . Reversible watermark using difference expansion of quads Vol. 3 , 377 – 380 . Montreal, , Canada Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing
  • Ali , A. and Khan , A. 2009 . “ Reversible watermarking for 3D cameras: Hiding depth maps ” . In Recent Advances in Multimedia Signal Processing and Communications , Vol. 231 , 495 – 521 . Berlin, Heidelberg : Springer . Studies in Computational Intelligence, ISBN: 978-3-642-02899-1
  • Boucherkha , S. and Benmohamed , M. 2005 . A Lossless Watermarking based Authentication System for Medical Images , Vol. 1 , 100 – 103 . World Academy of Science and Engineering (WASET) .
  • Celik , M. U. , Sharma , G. , Tekalp , M. A. and Saber , E. 2002 . Reversible data hiding Vol. 2 , 157 – 160 . Rochester, , NY, USA, Vol Proceedings of IEEE International Conference on Image Processing
  • Celik , M. U. , Sharma , G. , Tekalp , A. M. and Saber , E. 2005 . Lossless generalized-LSB data embedding . IEEE Trans. Image Process. , 14 : 253 – 266 .
  • Coatrieux , G. , Maitre , H. , Sunkar , B. , Rolland , Y. and Collorec , R. 2000 . Relevance of watermarking in medical images . : 250 – 255 . Proceedings of IEEE EMBS Conference on Information Technology, Applications in Biomedicine, Arlington, VA, USA, November, Available at http://ieeexplore.ieee.org/Xplore/login.jsp?url=http%3A%2F%2Fieeexplore.ieee.org%2Fstamp%2Fstamp.jsp%3Ftp%3D%26arnumber%3D892396&authDecision=-203
  • Cox , I. J. , Miller , M. L. and Blom , J. A. 2004 . Digital Image Watermarking , San Francisco, CA : Morgan Kaufman Publishers .
  • Feng , J. B. , Lin , I. C. , Tsai , C. S and Chu , Y. P. 2006 . Reversible watermarking: Current status and key issues . Int. J. Netw. Secur. , 2 : 161 – 171 .
  • Fotopoulos , V. , Starvrinou , M. L. and Skodras , A. N. 8–10 October 2008 . Medical image authentication and self correction through an adaptive reversible watermarking technique 8–10 October , 1 – 5 . Athens Proceedings of 8th International Conference on Bio-informatics and Bio-Engineering (BIBE’2008), Available at http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=4696803
  • Fraser , S. I. and Allen , A. R. August 2008 . A high capacity reversible watermarking technique based on difference expansion August , 18 – 20 . Kailua-Kona, , HI, USA Proceedings of Signal and Image Processing (SIP 2008)
  • Fridrich , J. , Goljan , M. and Du , R. 2001 . Invertible authentication Vol. 3971 , 197 – 208 . San Jose, , CA, USA Proceedings of SPIE, Security and Watermarking of Multimedia Contents III
  • Fridrich , J. , Golijan , M. G. and Du , R. 2002 . Lossless data embedding for all image formats San Jose, , CA, USA Proceedings of SPIE, Security and Watermarking Multimedia Contents
  • Fridrich , G. J. , Goljan , M. and Du , R. 2002 . Lossless data embedding-new paradigm in digital watermarking . EURASIP J. Appl. Signal Process. , 2 : 185 – 196 .
  • Hai-mei , S. , Tian-can , M. and Qian-ging , Q. 2004 . Spread spectrum watermark based on wavelet transform for still digital image . Wuhan Univ. J. Nat. Sci. , 9 ( 2 ) : 203 – 208 .
  • Karras , D. A. 2005 . A second order spread spectrum modulation scheme for wavelet based low error probability digital image watermarking . ICGST Int. J. Graph. Vision Image Process. (GVIP) , 5 ( 3 ) : 19 – 28 .
  • Lee , S. , Yoo , C. D. and Talker , T. 2007 . Reversible image watermarking based on integer-to-integer wavelet transform . IEEE Trans. Inf. Forensics Secur. , 2 ( 3 ) : 321 – 330 .
  • Makur , A. and Sethu Selvi , S. 2001 . Variable dimension vector quantization based image watermarking . J. Signal Process. , 81 ( 4 ) : 889 – 893 .
  • Memon , N. A. and Gilani , S. A.M. 23–24 December 2008 . NROI watermarking of medical images for content authentication 23–24 December , 106 – 110 . Karachi, , Pakistan Proceedings of 12th IEEE International Multitopic Conference (INMIC’08)
  • Memon , N. A. , Gilani , S. A.M. and Ali , A. 15–16 August 2009 . Watermarking of chest CT scan medical images for content authentication 15–16 August , 175 – 180 . Karachi, , Pakistan IEEE 3rd International Conference on Information and Communication Technologies (ICICT’2009)
  • Mintzer , F. , Lotspiech , J. and Morimoto , N. 1997 . Safeguarding digital library contents and users: Digital watermarking . D-Lib Mag. , 3 ( 12 ) December
  • Shaomin , Z. and Jianming , L. 2009 . An optimal adaptive quantization index modulation watermarking algorithm . Chin. Opt. Lett. , 7 ( 6 ) : 580 – 584 .
  • Tian , J. 19–22 December 2002 . Reversible watermarking by difference expansion 19–22 December , Juan-les-Pins, , France Proceedings of ACM Workshop on Multimedia and Security
  • Tian , J. 2003 . Reversible data embedding using a difference expansion . IEEE Trans. Circuits Syst. Video Technol. , 13 : 890 – 896 .
  • Vleeschouver , C. D. , Delaigle , J. E. and Macq , B. 2001 . Circular interpretation of histogram for reversible watermarking , : 345 – 350 . Proceedings of IEEE 4th Workshop on Multimedia Signal Processing, Cannes
  • Vleeschoover , C. D. , Delaigle , J. F. and Macq , B. 2003 . Circular interpretation of bijective transformations in lossless watermarking for media asset management . IEEE Trans. Multimed. , 5 : 97 – 105 .
  • Wu , J. H.K. , Chang , R. F. , Chen , C. J. , Wang , C. L. , Kuo , T. H. , Moon , W. K. and Chen , W. K. 2008 . Tamper detection and recovery for medical images using near-lossless information hiding technique . J. Digit. Imaging , 21 ( 1 ) : 59 – 76 .
  • Xuan , G. , Chen , X. J. , Zhu , J. , Shi , Y. Q. , Ni , X. and Su , W. 2002 . Distortionless data hiding based on integer wavelet transform . IEEE Electron. Lett. , 38 : 1646 – 1648 .
  • Xuan , G. , Shi , Y. Q. , Yang , C. , Zheng , Y. , Zou , D. and Chai , P. 2005 . Lossless data hiding using integer wavelet transform and threshold embedding technique 1520 – 1523 . IEEE International Conference on Multimedia and Expo, Amsterdam, July, Available at http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=1521722
  • Xuan , G. , Yang , C. , Zhen , Y. , Shi , Y. Q. and Ni , Z. 2005 . “ Reversible data hiding using integer wavelet transform and companding technique ” . In IWDW 2004 , Edited by: Cox , I. J. , Kalker , T. and Lee , H. K. Vol. 3304 , 115 – 124 . Lecture Notes in Computer Science .
  • Xuan , G. , Yao , Q. , Yang , C. , Gao , J. , Chai , P. , Shi , Y. Q. and Ni , Z. 2006 . “ Lossless data hiding using histogram shifting method based on integer wavelet ” . In IWDW 2006 , Edited by: Shi , Y. Q. and Jeon , B. Vol. 4283 , 323 – 332 . Lecture Notes in Computer Science .
  • Yuehua , Z. , GuiXuan , C. and Yunhai , D. 2004 . A image watermarking algorithm based on discrete cosine transform block classifying Vol. 85 , 234 – 235 . Proceedings of ACM 3rd International Conference on Information Security, Shanghai

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.