{"title":"基于位平面编码和提升小波变换的可逆图像水印分析","authors":"S. Kurshid Jinna, L. Ganesan","doi":"10.1109/ICCCCT.2010.5670763","DOIUrl":null,"url":null,"abstract":"This paper proposes a distortionless image data hiding algorithm based on integer wavelet transform that can hide data into the original image. The data can be retrieved and the original image can be recovered without any distortion after the hidden data are extracted. This algorithm hides data into one or more middle bit-plane( s) of the integer wavelet transform coefficients in the LH, HL and HH frequency sub bands. It can embed more data into the bit planes and also has the necessary imperceptibility requirement. The image histogram modification may be used to prevent grayscales from possible overflow or underflow. Experimental results have demonstrated the performance of the algorithm. The performance of the algorithm under different types of noise and attacks is analysed.","PeriodicalId":250834,"journal":{"name":"2010 INTERNATIONAL CONFERENCE ON COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Analysis of reversible image watermarking using bit plane coding and lifting wavelet transform with attacks\",\"authors\":\"S. Kurshid Jinna, L. Ganesan\",\"doi\":\"10.1109/ICCCCT.2010.5670763\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper proposes a distortionless image data hiding algorithm based on integer wavelet transform that can hide data into the original image. The data can be retrieved and the original image can be recovered without any distortion after the hidden data are extracted. This algorithm hides data into one or more middle bit-plane( s) of the integer wavelet transform coefficients in the LH, HL and HH frequency sub bands. It can embed more data into the bit planes and also has the necessary imperceptibility requirement. The image histogram modification may be used to prevent grayscales from possible overflow or underflow. Experimental results have demonstrated the performance of the algorithm. The performance of the algorithm under different types of noise and attacks is analysed.\",\"PeriodicalId\":250834,\"journal\":{\"name\":\"2010 INTERNATIONAL CONFERENCE ON COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-12-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 INTERNATIONAL CONFERENCE ON COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCCT.2010.5670763\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 INTERNATIONAL CONFERENCE ON COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCCT.2010.5670763","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analysis of reversible image watermarking using bit plane coding and lifting wavelet transform with attacks
This paper proposes a distortionless image data hiding algorithm based on integer wavelet transform that can hide data into the original image. The data can be retrieved and the original image can be recovered without any distortion after the hidden data are extracted. This algorithm hides data into one or more middle bit-plane( s) of the integer wavelet transform coefficients in the LH, HL and HH frequency sub bands. It can embed more data into the bit planes and also has the necessary imperceptibility requirement. The image histogram modification may be used to prevent grayscales from possible overflow or underflow. Experimental results have demonstrated the performance of the algorithm. The performance of the algorithm under different types of noise and attacks is analysed.