Professional Documents
Culture Documents
Abstract— This paper proposes a novel data hiding algorithm presented in [4]. While it is novel, and successful in lossless
having large data hiding rate based on integer wavelet data hiding, the amount of hidden data by this technique is still
transform, which can recover original image without any not large enough for, say, some medical applications. From
distortion from the marked image after the hidden data have what is reported in [4], the pay-load ranges from 3,000 bits to
been extracted. This algorithm hides the data and the overhead 24,000 bits for a 512 × 512 × 8 grayscale image.
data representing the bookkeeping information into a middle We propose a new lossless marking technique, which can
bit-plane of the integer wavelet coefficients in high frequency embed a larger amount of data. It is carried out in the integer
subbands. It can embed much more data compared with the wavelet transform (IWT) domain.
existing distiortionless data hiding techniques and satisfy the The rest of the paper is organized as follows. The
imperceptibility requirement. The image histogram proposed algorithm is introduced in Section II. Some
modification is used to prevent grayscales from possible experimental results and conclusions are presented in Sections
overflowing that may take place due to the data embedding. III and IV, respectively.
The algorithm has been applied to a wide range of different
images successfully. Some experimental results are presented II. ALGORITHM
in this paper to demonstrate the validity of the algorithm. A. Integer WT (IWT)
Key words— lossless (invertible) data hiding, integer In the following discussion, we consider eight-bit
wavelet transform, lifting scheme, watermarking, histogram grayscale images and denote the least significant bit-plane by
modification the 1st bit-plane, ……, the most significant bit -plane the 8th
bit-plane. Our study on many commonly used grayscale
images has shown that binary 0s and 1s are almost equally
I. INTRODUCTION distributed in the first several “lower” bit-planes. The bias
between 0s and 1s starts to gradually increase in the several
In data hiding, pieces of information represented by the “higher” bit-planes, but not large. This kind of bias indicates
data are hidden in the cover media. In some applications,
redundancy, implying that one may compress bits in a bit -
people do care about the cover media. That is, the hidden data plane or more than one bit-plane so as to leave space to hide
and the cover media may be closely related. For this type of data. To achieve a large bias between 0s and 1s, we then resort
data embedding, in addition to perceptual transparency, for
to image transforms. To eliminate more redundancy to embed
some applications such as medical diagnosis and law more data while avoiding round-off error, we propose to use
enforcement, it is desired to invert the marked media back to the second generation wavelet transform such as IWT [5],
the original cover media after the hidden data have been
which maps integer to integer and whose CDF (2,2) format
retrieved. The marking techniques satisfying this requirement has been adopted by JPEG2000. This technique is based on
are referred to as lossless, distortion-free or invertible data the lifting scheme [6].
hiding techniques. From this point of view, it is observed that
most of the current digital watermarking algorithms are not B. Bit-plane Embedding Using Arithmetic Coding
lossless.
Recently, some lossless marking techniques have been Our study on the commonly used images have demonstrated
reported in the literature. The first method [1] is carried out in that we can achieve a larger bias between binary 0s and 1s
the image spatial domain. Another spatial domain technique starting from the 2nd bit-plane of the IWT coefficients than
was reported in [2]. There also exists a lossless marking that in the spatial domain. The higher the bit-plane, the larger
technique in the transform domain [3]. These techniques aim the bias. However, a change made in a high bit-plane will lead
at authentication, instead of data embedding. As a result, the to a larger distortion. In order to have the marked image
amount of hidden data is quite limited. The first lossless perceptually the same as the original image, we choose to hide
marking technique that is suitable for data embedding was data in a “middle” bit-plane in the IWT domain. To let the
1
Guorong Xuan, Jidong Chen, Jiang Zhu, Yun Q. Shi, Zhicheng Ni, Wei Su.“Lossless Data Hiding Based on Integer Wavelet Transform”,
IEEE International Workshop on Multimedia Signal Processing, December 9-11, 2002, St. Thomas, Virgin Islands, USA
marked image have a high PSNR, we embed data only in the In the chosen bit -plane(s) of the high frequency subbands,
high frequency subbands, specifically in the LH1 , HL1 and the arithmetic coding is chosen to losslessly compress binary
HH1 subbands (refer to Figure 1). Hence, one or multiple 0s and 1s because of its high coding efficiency [7]. Due to the
middle bit-plane(s) in the high frequency subbands is chosen large bias mentioned-above, the difference between the
to hide data. capacity of the subbands in the bit- plane and the amount of
the compressed data is able to accommodate the hidden data
LL1 LH1 together with some book-keeping data. The block diagrams of
our proposed lossnless data embedding algorithm are shown in
HL1 HH1 Figures 2 and 3.
C. Block Diagrams
Compression
Compressed
bit stream
Data to be
embedded
Mark data
Secret key
Figure 2 Data embedding algorithm (IWT denoting integer discrete wavelet transform, IIWT inverse IWT).
Decompression
Secret key Extracting
Compressed
bit stream
Extracted
data
Mark data
Figure 3 Data extracting algorithm (IWT denoting integer discrete wavelet transform, IIWT inverse IWT).
2
Guorong Xuan, Jidong Chen, Jiang Zhu, Yun Q. Shi, Zhicheng Ni, Wei Su.“Lossless Data Hiding Based on Integer Wavelet Transform”,
IEEE International Workshop on Multimedia Signal Processing, December 9-11, 2002, St. Thomas, Virgin Islands, USA
lower bound (0 for an eight-bit grayscale image). This is existing lossless marking techniques and the proposed
possibly caused by changes taking place in the chosen bit- technique in terms of pay-load is presented in Table 2.
plane of the high frequency IWT coefficients when data are
embedded. This problem needs to be resolved in order not to
violate the lossless criterion. For this consideration, the blocks
of “pre-processing” and “post-processing” are designed and
included in the above block diagrams to prevent overflow. For
instance, either histogram modification or grayscale mapping
can be used to prevent overflow. Figure 4 Watermark (a binary image of 192 × 120).
In the next section in addition to experiment results, more
details of the proposed algorithm are presented.
3
Guorong Xuan, Jidong Chen, Jiang Zhu, Yun Q. Shi, Zhicheng Ni, Wei Su.“Lossless Data Hiding Based on Integer Wavelet Transform”,
IEEE International Workshop on Multimedia Signal Processing, December 9-11, 2002, St. Thomas, Virgin Islands, USA
Figure 6 (a) Original Pepper image. Sailboat 35.47 44,086
House 36.01 77,726
Table 2. Comparison between two lossless marking
methods in [3,4] and our proposed method in terms
of the amount of data embedded.
REFERENCES
(c) Baboon (d) Airplane [1] C. W. Honsinger, P. Jones, M. Rabbani, and J. C. Stoffel,
“Lossless recovery of an original image containing embedded
data,” US Patent application, Docket No: 77102/E−D (1999).
[2] J. Fridrich, M. Goljan and R. Du, “Invertible
authentication,” Proc. SPIE, Security and Watermarking of
Multimedia Contents, pp. 197-208, San Jose, CA, January
(2001).
[3] B. Macq and F. Deweyand, “Trusted headers for medical
images,” DFG VIII-D II Watermarking Workshop, Erlangen,
(e) Sailboat (f) House Germany, Oct. 1999.
[4] M. Goljan, J. Fridrich, and R. Du, “Distortion-free data
Figure 7 Other six marked images. embedding,” Proceedings of 4 th Information Hiding Workshop,
pp. 27-41, Pittsburgh, PA, April, 2001.
Table 1 Some experimental results. [5] A. R. Calderbank, I. Daubechies, W. Sweldens and B. Yeo,
Images PSNR of marked Pay-load “Wavelet transforms that map integers to integers,” Applied
(512x512x8) image (dB) (bits) and Computational Harmonic Analysis, vol.5, no.3, pp.332-
Lena 36.64 85,507 369, 1998.
Pepper 29.11 69,285 [6] I. Daubechies and W. Sweldens, “Factoring wavelet
Tiffany 28.91 89,848 transforms into lifting steps,” J. Fourier Anal. Appl., vol.4,
Couple 29.83 84,879 pp.247-269, 1998.
Baboon 32.76 14,916 [7] Y. Q. Shi and H. Sun, Image and video Compression for
Airplane 36.30 93,981 Multimedia Engineering, Boca Raton, FL: CRC, 1999.