2006 IEEE International Conference on Multimedia and Expo 2006
DOI: 10.1109/icme.2006.262782
|View full text |Cite
|
Sign up to set email alerts
|

Reversible Image Authentication Based on Watermarking

Abstract: In this paper, we propose a new reversible image authentication technique based on watermarking where if the image is authentic, the distortion due to embedding can be completely removed from the watermarked image after the hidden data has been extracted. This technique utilizes histogram characteristics of the difference image and modifies pixel values slightly to embed more data than other lossless data hiding algorithm. We show that the lower bound of the PSNR (peaksignal-to-noise-ratio) values of watermark… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
63
0

Year Published

2007
2007
2019
2019

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 136 publications
(63 citation statements)
references
References 5 publications
0
63
0
Order By: Relevance
“…Lee et al [11] proposed a reversible image authentication technique which is based on histogram modification similar to Ni et al [5], and claims to provide lower distortion. In their work, they used the differencehistogram techniques which are not regular in shape and provide a much higher peak point.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Lee et al [11] proposed a reversible image authentication technique which is based on histogram modification similar to Ni et al [5], and claims to provide lower distortion. In their work, they used the differencehistogram techniques which are not regular in shape and provide a much higher peak point.…”
Section: Related Workmentioning
confidence: 99%
“…According to [7,8], RDH techniques could be classified into the following categories: lossless compression-based scheme [9,10], histogram approach [5,6,11], difference expansion [12], prediction error expansion [13,14] and two-dimensional histogram approach [15]. The basic concept of lossless compression-based scheme is to compress a feature set of cover image to save the space for embedding data [9,10].…”
Section: Related Workmentioning
confidence: 99%
“…For example, a corporate logo could be used to indicate ownership. Digital video and image watermarking can typically be divided into two categories: (i) Invisible watermarking [1]- [6], and (ii) Visible watermarking [7]- [12]. An overview of video watermarking techniques can be found in [13].…”
Section: Introductionmentioning
confidence: 99%
“…It is fundamentally based on block−based. Lee et al (2006) also proposed a reversible data hiding scheme based on histogram modification of difference images. To increase data hiding ability, Chang et al (2008) presented an efficient extension of the histogram modification technique by considering the pixel difference instead of simple pixel value and Teng et al (2010) had some other similar proposals.…”
Section: Histogram Modification−based Data Hidingmentioning
confidence: 99%