SlideShare a Scribd company logo
1 of 8
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. 1 (May – Jun. 2015), PP 25-32
www.iosrjournals.org
DOI: 10.9790/0661-17312532 www.iosrjournals.org 25 | Page
Reversible Watermarking based on Histogram Shifting
Modification:A Review
Anamika Jain1
, Namita Tiwari2
1
(Computer Science, Maulana Azad National Institute of Technology, India)
2
(Ass. Professor,Department of Computer Science, Maulana Azad National Institute of Technology, India)
Abstract: When we talk about the data communication or exchange of information from sender to receiver, the
major concern is DATA. This (data) being of high importance, prone to various kinds of attacks. In order to
protect it, data hiding techniques are used. Some of the data hiding techniques available are digital
watermarking, steganography, etc. By digital watermarking, data is hidden in any type of multimedia like
images, audio, etc. Watermarking is one of the major solution to provide authenticity and copyright protection
to the digital data. But watermarking causes damage to the cover signal (signal in which data are embedding),
therefore recovery of the original cover signal is not possible at the receiving end, which is not tolerable in
many fields like medical, military, etc. To reduce the degradation in the watermarked signal “Reversible
watermarking techniques” are used. In reversible watermarking original cover signal and the message are
retrieved with fewer errors. Reversible data hiding techniques are also known as the Lossless data hiding
techniques. This technique is getting high importance day by day because of some fields like military, medical,
etc. This paper describes the various reversible watermarking techniques which are already existing.
Index Terms: Reversible watermarking, Histogram shifting, Authentication.
I. Introduction:
Watermarking is a data hiding technique. In watermarking data is hidden in the noise tolerant signal
like image, audio, video, etc. Watermarking is similar to steganography, what separates them is their goal. The
main difference between the watermarking and steganography is, in steganography the intermediates did not
know that data is hidden inside the signal, but in watermarking intermediates knows very well that there is
something valuable information inside the signal but they cannot modify the information in any manner[9].
Watermarking can be of two types visible or Invisible. In visible watermarking the logo is present on the signal,
by seeing the signal one can easily identify that this signal belongs to which organization and in invisible
watermarking one cannot identify the difference between the watermarked signal or in the original signal with
the naked eyes. Fig [1] shows the types of watermarking. In watermarking information is embedded into the
cover signal so there will be some degradation in the cover signal so the recovery of the original signal is not
possible at the receiving end and these types of degradation is not tolerable in some fields like military, army,
etc., according to the signal they have to take decisions, if the signal is distorted then they might make wrong
perception. To recover the cover image at the receiver end “reversible watermarking” is used. Cover signal and
the watermark is retrieved at the receiver end without any error or with fewer errors in reversible watermarking.
Fig [2] shows the block diagram of the conventional watermarking and reversible watermarking.
i) Cover image ii) Watermarked image
a) Visible watermarking b) Invisible watermarking
Fig [1]
Reversible Watermarking based on Histogram Shifting Modification:A Review
DOI: 10.9790/0661-17312532 www.iosrjournals.org 26 | Page
Watermarking scheme can be of various types like[7], robust, fragile and semi fragile. Robust techniques can
handle all types of attacks, so these techniques can be used in the copyright protection. Fragile techniques
cannot tolerate attacks.
a) Conventional watermarking b) Reversible watermarking
Fig. 2
In fragile techniques the signal becomes useless after some modification, so it is used in authentication
purpose. Semi fragile techniques are those who lie between robust and fragile techniques. The main goal of
watermarking is that no one can change the data in between, when the transmission is going on. Watermarking
mainly depends on the two things [9], the first thing is embedding capacity and the second thing is the
imperceptibility. Embedding capacity means that how much amount of data we can insert into the cover signal
and imperceptibility means there should not be any difference between the cover signal and the watermarked
signal which can‟t be easily recognized with human eyes. The property of watermarking is: image fidelity,
robustness, effectiveness, and payload size.This paper is divided into three parts. Part A describes the
application of watermarking, part B describes the existing work and limitation and in part C conclusion is there.
A) Application Of Watermarking [10]:
• Broadcast monitoring: this is the responsibility of the agencies that their commercials are getting that
much air time for that they have paid. Watermarking can be used for that purpose.
• Authentication: watermarking can be used in the place of copyright, to identify the owner of the digital
work like audio, video, etc, also be used to identify the owner of the particular multimedia.
• Transaction tracking: watermark is embedded in the digital work, that can be used to record more than
one transaction take place in the history of a copy of this work.
• Copyrights: This application of the watermarking prevents illegal copying of the multimedia or the
essential information. In this application some information is embedded into the multimedia by that the
multimedia will become watermarked multimedia, if any one use that data by saying that this belongs to
him, that will easily catch.
B) Existing Work And Limitation:
This paper describes reversible histogram based data hiding techniques and its developments since
2001. The first reversible watermarking approach is proposed in 2001 by Vleeschouwer et al. [1] in this paper
Image is divided into several blocks of neighboring pixels. Then, each block is split into two parts, and
corresponding histograms are calculated. A bin (interval) is shifted accordance with the value of watermark bit.
If the bit is „1‟, shift the lowest bin to the highest one, and downgrade other bins. And if the bit is „0‟, then
upgrade each bin and shift the highest bin to the lowest bin. High distortion is introduced in the watermarked
image because of the shifting. Then in 2003 they improve their work by introducing the bijective transformation
[2]. Other techniques are described as follows:
i) Z. NI. APPROACH
In 2006 one reversible watermarking technique is presented by Zhincheng Ni[3]. In this approach,
before embedding they have recorded three peaks and zero points from the histogram of the cover image, the
pixel between those points goes under modification. But there is a limitation on the embedding capacity.
Embedding Process:
A) Algorithm for embedding with One Pair of Maximum and Minimum Points: For an N*N image.
1) H(z) be the histogram of the image z.
2) Maximum point h (x) x € [0,255] and the minimum point zero h (y) y € [0,255] is selected from the
histogram H (z).
3) If the minimum point h(y)>0 , recode the co-ordinate (i, j) of those pixels and the pixel Grayscale value b as
over head information then set h(y)=0 .
4) Without loss of assuming generality x<y. Move the whole part of the histogram H(z) with z €[x, y] to the
right by 1 unit. This means that all the pixel grayscale values (satisfying x € [x, y] ) are added by 1.
5) Scan the image, once meet the pixel (whose grayscale value is x ), check the to-be-embedded bit. If the to-be
embedded bit is “1”, the pixel grayscale value is changed to x+1. If the bit is “0”, the pixel value remains x.
Reversible Watermarking based on Histogram Shifting Modification:A Review
DOI: 10.9790/0661-17312532 www.iosrjournals.org 27 | Page
B) Actual Data Embedding Capacity (Pure Payload):
Data embedding capacity, is calculated by the following formula:
C=h(x)-O
Where, O denotes the amount of data overhead information.
C) Multiple Pairs of Maximum and Minimum Points Embedding Algorithm:
For an image containing the gray scale value z€ [0,255].
1) Calculate histogram H(z) of the given image .
2) In the histogram, find three minimum points, h(y1), h( y2), h(y3). Such that y1<y2<y3.
3) In the intervals (0,y1) and(y3,255) , find the two maximum point h(x1), h(x3) respectively, Such that
x1€[0,b1], x3€[b3,255].
4) Find two maximum points in each intervalof (y1, y2), (y2, y3). Suppose they are h(x12), h(x21),
y1<x12<x21<y2 and h(x23), h(x32), y2<x23<x32<y3 respectively.
5) Find a point with larger histogram value in each of the inteval ((h (x1), h (x12)), (h (x21), h (x23)), and (h
(x32), h (x3)), respectively. Suppose they are h(x1), h(x23),h(x3) respectively.
6) Then (h (x1), h (y1)), (h (x23), h (y2)), (h (x3), h (y3)) are the three pairs of maximum and minimum
points. For each and every pair, apply Steps 3-5 described in the above section.
ii) Chia-Chen Lin’s Method:
Then to improve the capacity of the Ni‟s method in 2008 Lin et al [4] presents a multilevel reversible
watermarking technique. In this technique, the difference image is calculated by taking the difference between
the two neighboring pixels of the cover image. The cover image is divided into the non overlapping blocks; a
difference block corresponding to each block is calculated, for embedding data histogram modification
techniques is applied to each block. But the overhead information is high in this technique because there is the
need to store the peak value of each block. Fig 3 shows the flow diagram of the Lin‟s method.
Histogram generation phase:
For increasing the hiding capacity, an image is generated, called a difference image before the hiding phase. For
a grayscale image H (x, y) P×Q pixels in size, a difference image D (x, y), P× (Q−1) pixels in size can be
generated from the original image H by using the following formula:
D(x,y ) = |H(x, y) − H(x, y + 1)| ........................ (1)
0≤x≤P − 1, 0≤y≤Q – 2
Here | · | is the absolute value operation.
Data hiding phase:
The hiding phase of this technique can be divided into five steps as follows.
Step 1: The cover image is divided into multiple number of non overlapping blocks A×B in size. A difference
image Db(x,y) of size A×(B−1) is generated for each block by using following formula:
Db(x,y) = |Hb(x,y) − Hb(x, y + 1)| ..................(2)
0≤x≤A − 1, 0≤y≤B − 2, 0≤b≤( M × N)/(A × B)− 1
Step 2: Calculate the histogram of the difference image Db and the peak point Pb is recorded for each and every
block.
Reversible Watermarking based on Histogram Shifting Modification:A Review
DOI: 10.9790/0661-17312532 www.iosrjournals.org 28 | Page
Flow chart of Lin‟s method
Fig [3]
Step 3: If the pixel value of block b is larger than the peak point Pb of block b, change the pixel value of block b
is incremented by 1. Otherwise, the pixel value remains unchanged. The modification will be done as follows:
Db(x,y) +1 if Db(x,y)>Pb,
D‟b (x, y) =
...................... (3)
Db(x,y) otherwise
For 0≤x≤A − 1, 0≤y≤B − 2,
And 0≤b≤ (M × N) /(A × B) − 1
Where Pb is the maximum point of block b.
Step 4: The pixels having a grayscale value the same as peak point Pb can be modified as follows to hide
embedded message bit m in difference image D‟b :
D‟b(x,y) + m if D‟b(x,y) = Pb,
D‟‟b (x, y) =
........................ (4)
D‟b (x, y) otherwise,
For 0≤x≤A − 1, 0≤y≤B − 2,
And 0≤b≤ (M × N) /(A × B) − 1
Where Pb is the maximum point of block b, and m ∈ {0, 1}.
Step 5: Original image and hidden difference image is used to construct the marked image by performing the
inverse transformation T−1
. The inverse operation is applied on the first two pixel of each row. The procedure is
as follow:
Hb(x, 0) if Hb(x, 0)>Hb(x, 1), Hb(x, 0) + D‟‟b(x, 0) if Hb(x,0)≤Hb(x,1),
Sb (x, 0) = Sb(x, 1) = ..................(5)
Hb(x, 1) + D’’b(x, 0) otherwise, Hb(x, 1) otherwise,
For 0≤x≤A − 1, 0≤b≤ (M × N) /(A ×B) −1.
For any residual pixels, the inverse operation is defined as
Reversible Watermarking based on Histogram Shifting Modification:A Review
DOI: 10.9790/0661-17312532 www.iosrjournals.org 29 | Page
Sb(x, y − 1)+D‟‟b(x, y − 1)
If Hb (x, y−1) ≤Hb (x, y),
Sb (x, y) =
................(6)
Sb(x, y − 1) – D‟b(x, y − 1) otherwise,
For 0≤x≤A − 1, 2≤y≤B − 2, 0≤b≤( M × N)/(A × B)− 1
Extracting the information phase:
In this process, the embedded message is extracted and reverses the marked image to its original. The extracting
and reversing process is as follows.
Step 1: Divide the received marked image into blocks A×B in size. Generate the difference image SDb (x, y) of
block b from the received marked image by using the following formula:
SDb(x,y) = |Sb(x,y) − Sb(x, y + 1)|, ..................... (7)
For 0≤x≤A − 1, 0≤y≤B − 2, 0≤b≤( M × N)/(A × B)− 1
Step 2: Perform the embedded message extracting on the difference image SDb(x,y) of block b by using the
following rule:
0 if SDb(x,y) = Pb,
m =
................ (8)
1 if SDb (x, y) = Pb + 1,
For 0≤x≤A − 1, 0≤y≤B − 2, And 0≤y≤ (M × N) /(A × B) – 1. Where Pb is the received maximum point of block
b.
iii) Piyu Tsai’s Method
In 2009 one more technique for data hiding through histogram shifting is proposed by Tsai et al [5].
This scheme works on the neighboring similarity of pixels in the medical image to improve the histogram-based
reversible data hiding. Provide a higher hiding capacity while keeping the good quality of the embedded image
is the goal of the proposed technique.
Embedding procedure:
While exploring the similarity between neighboring pixel, the cover signal is divided into multiple
number of blocks of n*n pixels. Center pixel is selected as the basic pixel for prediction from each block. To
generate prediction errors, pixels in each block are processed by the technique called linear prediction technique,
the prediction errors are also called as the residual values. By taking the difference between the each pixel and
the basic pixel these residual values are calculated. After processing all the blocks is finished, the residual image
is generated. The size of residual image and the cover image is same. On the basis of the occurrences of residual
value corresponds to these non basic pixels of the cover image, the residual histogram is generated. Fig 4 shows
the flow diagram of the embedding procedure.
The histogram is of the cover image has two parts: first one is a Non Negative Histogram (NNH) and
the second one is a Negative Histogram (NH). Secret data are embedded into the residual histogram. A group of
peak and zero points are selected from NNH and NH. Let S is the size of secret data and the maximum hiding
capacity derived from NNH and NH is greater than S, it indicates that there is enough space for hiding the secret
data. Otherwise more number of peak and zero points are searched in NNH and NH histogram.
Let sd called as a bit of secret data and each residual value in the peak point is employed to carry one
bit secret data. If sd =1, no changes needed to be done in the residual values, otherwise the residual value is
decremented to one or shifted to left by the amount of 1. The one who did not lie between the ranges of
maximum or minimum points no modifications are applied to that value. When secret data are embedding is
done, the residual embedded image is generated. The reverse linear prediction technique is applied to the
residual embedded image to generate an embedded image.
To provide the best quality of embedded images, the absolute distance between the original residual
values and modified values is at most 1. Therefore, the absolute distance between one pixel in the cover image
and its corresponding pixel in the embedded image is at most 1.
Reversible Watermarking based on Histogram Shifting Modification:A Review
DOI: 10.9790/0661-17312532 www.iosrjournals.org 30 | Page
Extraction procedure:
Fig 5 shows the flow diagram of the extraction procedure of Tsai‟s method. In this technique, once the
maximum and minimum point pair and embedded image are received, then the extraction procedure can be
started. Linear prediction technique is applied to embedded images, according to that the residual embedded
image is obtained. The resultant image is now checked. There are two different ways:
1) If pixel x of the residual embedded image is not lying in the maximum and minimum points, the pixel is
skipped and the pixel value remains for image reconstruction.
Otherwise, there can be three cases:
1) If x is at maximum point, secret data valued at 1 is extracted and the value of x is unchanged.
2) If the absolute difference between x and the maximum point is 1, secret data value 0 is extracted and the
value of x is replaced by the value of the maximum point.
3) The remaining pixels are shifted closer to peak point by 1 and no secret data is extracted. After that, the
embedded secret data are extracted from the embedded image. On performing the linear prediction
technique to the embedded image the original image can be recovered.
iv) Narawade’s Method:
In 2012 Narawade et al. [6] Presented a different technique for the histogram shifting. In the technique
firstly the cover image is scanned, then histogram of the cover image is calculated, according to the histogram
the maximum and minimum points are calculated, and according to the maximum and minimum points, location
map is calculated. But there is the limitation in this approach that the cover image is calculated twice..
Embedding procedure:
Step 1: Scan the cover image I and create its histogram H(x), x € [0, 255]. In its histogram obtain maximum
and minimum point x, y respectively, such that y=x-1.
Step 2: The pixel values those lies between the maximum and minimum point are recorded.
Step 3: Scan the cover image I again. Set the counter k to the length of watermark. If counter k is less than
length of watermark then check the following:
(a) If scanned pixel value lies between x, y, then pixel value is decremented by 1.
(b) If a pixel value is below „y‟, then Pixel value will not get changed.
(c) If pixel values are above „x‟ then Pixel value will not get changed.
(d) Scan the watermarked image, if scanned
Value is 0, then decrease the pixel value of x by 1. If scanned pixel value of watermark is 1, then do not change
pixel value.
Step 4: Continue step 3 up to end of watermark. If counter k becomes greater than the length of watermarked
image, and stop the procedure.
Extraction procedure:
Step 1: Watermarked image is scanned in the same order as in the Embedding phase.
Step 2: Set counter k to 0, k is used to indicate the length of watermarked image. If k is less than the length of
watermarked image, go to step 3 else step 4.
Step 3: Scan the image and check the following
(a) If scanned pixel value is „x‟, bit 1 is
Extracted. If the scanned value is x-1, extract 0 bits, and increase counter k=k+1.
(b) If the scanned value lies between x and y then add „1‟ in the scanned pixel value.
(c) If a pixel value is greater than „x‟ and lesser than „y‟ then do not change these values.
Reversible Watermarking based on Histogram Shifting Modification:A Review
DOI: 10.9790/0661-17312532 www.iosrjournals.org 31 | Page
Fig .4 Embedding procedure of Tsai Method Fig. 5 Extraction procedure of Tsai Method
Step 4: Continue step 3 up to end of watermarked image. . If counter k becomes greater than the length of
watermarked image, and stop the procedure.
Step 5: Go to location map L of y+1, and make it y+1.
C) Conclusion:
In this paper the existing histogram based watermarking techniques are discussed, and shows the result
(Table 1) of different techniques. The results which are shown in the table are based on the embedding capacity
and PSNR value, as PSNR value and embedding capacity are the important parameter of the watermarking. The
result shows below are of the different type of images, on that images the existing techniques are applied. The
PSNR value of the Narawade method is very high i.e. approx 77dB, this method is applicable for the cartoon
images only. The embedding capacity of this method is 170671 bits. This survey shows that the embedding
technique of the Ni‟s method is very low, and the PSNR level is satisfactory. In future there is the scope to
increase the embedding capacity of the Ni‟s method.
Table 1. The performance of the histogram based data hiding schemes[8]
Methods Ni‟s scheme Chia chen sheme Tsai‟s method
PSNR (dB) Lena 48.0 30 50.59
Capacity (Bits) 5469 308474 52322
PSNR (dB) Baboon 48.21 30.4 51.03
Capacity (Bits) 5421 161118 18410
PSNR (dB) Boat 48.247 30.4 47.6
Capacity (Bits) 7301 307193 5351030
Reversible Watermarking based on Histogram Shifting Modification:A Review
DOI: 10.9790/0661-17312532 www.iosrjournals.org 32 | Page
Refrences
[1]. C. De Vleeschouwer, J. E. Delaigle, and B. Macq, “Circular interpretation of histogram for reversible watermarking,” 2001 IEEE
Fourth Work. Multimed. Signal Process. (Cat. No.01TH8564), pp. 345–350, 2001.
[2]. C. De Vleeschouwer, J. F. Delaigle, and B. Macq, “Circular interpretation of bijective transformations in lossless watermarking for
media asset management,” IEEE Trans. Multimed., vol. 5, no. 1, pp. 97–105, 2003.
[3]. Z. N. Z. Ni, Y.-Q. S. Y.-Q. Shi, N. Ansari, and W. S. W. Su, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol.,
vol. 16, no. 3, pp. 354–362, 2006.
[4]. Chia-Chen Lin, Wei-Liang Tai and Chin-Chen-Chang. “Pattern Recognition,” vol. 41, pp. 3582–3591, 2008.
[5]. P. Tsai, Y. C. Hu, and H. L. Yeh, “Reversible image hiding scheme using predictive coding and histogram shifting,” Signal
Processing, vol. 89, pp. 1129–1143, 2009.
[6]. N. S. Narawade, “Reduced Pixel Shifting and Improved Histogram Shifting,” vol. 3, no. 4, 2012.
[7]. A. Khan and S. Ambreen, “A high capacity reversible watermarking approach for authenticating images : Exploiting down-
sampling , histogram processing , and block selection q,” Inf. Sci. (Ny)., vol. 256, pp. 162–183, 2014.
[8]. T. Naheed, I. Usman, T. M. Khan, A. H. Dar, and M. Farhan, “Optik Intelligent reversible watermarking technique in medical
images using GA and PSO,” Opt. - Int. J. Light Electron Opt., vol. 125, no. 11, pp. 2515–2525, 2014.
[9]. A. Khan, A. Siddiqa, S. Munib, and S. A. Malik, “A recent survey of reversible watermarking techniques,” Inf. Sci. (Ny)., vol. 279,
pp. 251–272, 2014.
[10]. M. Averkiou, “Digital Watermarking.”

More Related Content

What's hot

Implementation of image steganography using lab view
Implementation of image steganography using lab viewImplementation of image steganography using lab view
Implementation of image steganography using lab viewIJARIIT
 
A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...IAEME Publication
 
Data Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image CryptosystemsData Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image CryptosystemsCSCJournals
 
Az2419511954
Az2419511954Az2419511954
Az2419511954IJMER
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmIAEME Publication
 
Optimized Reversible Data Hiding Technique for Secured Data Transmission
Optimized Reversible Data Hiding Technique for Secured Data TransmissionOptimized Reversible Data Hiding Technique for Secured Data Transmission
Optimized Reversible Data Hiding Technique for Secured Data TransmissionEditor IJMTER
 
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...IJECEIAES
 
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHYAN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHYJournal For Research
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
 
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...IJCSIS Research Publications
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueEditor IJCATR
 
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYEMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYJournal For Research
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageijctet
 
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...ijceronline
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain ijcisjournal
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 

What's hot (19)

Implementation of image steganography using lab view
Implementation of image steganography using lab viewImplementation of image steganography using lab view
Implementation of image steganography using lab view
 
A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...
 
Data Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image CryptosystemsData Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image Cryptosystems
 
Az2419511954
Az2419511954Az2419511954
Az2419511954
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
 
Optimized Reversible Data Hiding Technique for Secured Data Transmission
Optimized Reversible Data Hiding Technique for Secured Data TransmissionOptimized Reversible Data Hiding Technique for Secured Data Transmission
Optimized Reversible Data Hiding Technique for Secured Data Transmission
 
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
 
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHYAN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527
 
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
 
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYEMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
 
Steganography
Steganography Steganography
Steganography
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
 
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 

Viewers also liked

Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniquesprashant3535
 
Reversible Data Hiding in the Spatial and Frequency Domains
Reversible Data Hiding in the Spatial and Frequency DomainsReversible Data Hiding in the Spatial and Frequency Domains
Reversible Data Hiding in the Spatial and Frequency DomainsCSCJournals
 
Robust Watermarking of Video Streams
Robust Watermarking of Video StreamsRobust Watermarking of Video Streams
Robust Watermarking of Video StreamsTamás Polyák
 
Digital image watermarking
Digital image watermarkingDigital image watermarking
Digital image watermarkingJasni Zain
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesPrashant Singh
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital WatermarkingAnkush Kr
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingAnkush Kr
 

Viewers also liked (12)

Watermarkingppt
WatermarkingpptWatermarkingppt
Watermarkingppt
 
Watermarking
WatermarkingWatermarking
Watermarking
 
Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniques
 
Reversible Data Hiding in the Spatial and Frequency Domains
Reversible Data Hiding in the Spatial and Frequency DomainsReversible Data Hiding in the Spatial and Frequency Domains
Reversible Data Hiding in the Spatial and Frequency Domains
 
Robust Watermarking of Video Streams
Robust Watermarking of Video StreamsRobust Watermarking of Video Streams
Robust Watermarking of Video Streams
 
Digital image watermarking
Digital image watermarkingDigital image watermarking
Digital image watermarking
 
Robust watermarking technique sppt
Robust watermarking technique spptRobust watermarking technique sppt
Robust watermarking technique sppt
 
Digital water marking
Digital water markingDigital water marking
Digital water marking
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) Images
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 

Similar to Reversible Watermarking based on Histogram Shifting Modification:A Review

Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageIOSR Journals
 
Psnr value of digital image watermarking by using
Psnr value of digital image watermarking by usingPsnr value of digital image watermarking by using
Psnr value of digital image watermarking by usingeSAT Publishing House
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
 
A Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder PiracyA Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder PiracyIOSR Journals
 
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...sipij
 
Feature Based watermarking algorithm for Image Authentication using D4 Wavele...
Feature Based watermarking algorithm for Image Authentication using D4 Wavele...Feature Based watermarking algorithm for Image Authentication using D4 Wavele...
Feature Based watermarking algorithm for Image Authentication using D4 Wavele...sipij
 
Frequency Domain Approach of Image Steganography
Frequency Domain Approach of Image SteganographyFrequency Domain Approach of Image Steganography
Frequency Domain Approach of Image SteganographyAM Publications,India
 
Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...IOSR Journals
 
7 rupali kasar_final paper--74-85
7 rupali kasar_final paper--74-857 rupali kasar_final paper--74-85
7 rupali kasar_final paper--74-85Alexander Decker
 
CT-SVD and Arnold Transform for Secure Color Image Watermarking
CT-SVD and Arnold Transform for Secure Color Image WatermarkingCT-SVD and Arnold Transform for Secure Color Image Watermarking
CT-SVD and Arnold Transform for Secure Color Image WatermarkingAM Publications,India
 
Copyright protection for images on android phones
Copyright protection for images on android phonesCopyright protection for images on android phones
Copyright protection for images on android phoneseSAT Publishing House
 
3 rupali kasar_final paper--23-34
3 rupali kasar_final paper--23-343 rupali kasar_final paper--23-34
3 rupali kasar_final paper--23-34Alexander Decker
 
Annotated Bibliography On Multimedia Security
Annotated Bibliography On Multimedia SecurityAnnotated Bibliography On Multimedia Security
Annotated Bibliography On Multimedia SecurityBrenda Higgins
 

Similar to Reversible Watermarking based on Histogram Shifting Modification:A Review (20)

Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale Image
 
Psnr value of digital image watermarking by using
Psnr value of digital image watermarking by usingPsnr value of digital image watermarking by using
Psnr value of digital image watermarking by using
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
K42016368
K42016368K42016368
K42016368
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
 
50120140506015
5012014050601550120140506015
50120140506015
 
A Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder PiracyA Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder Piracy
 
F010413438
F010413438F010413438
F010413438
 
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
 
Feature Based watermarking algorithm for Image Authentication using D4 Wavele...
Feature Based watermarking algorithm for Image Authentication using D4 Wavele...Feature Based watermarking algorithm for Image Authentication using D4 Wavele...
Feature Based watermarking algorithm for Image Authentication using D4 Wavele...
 
Frequency Domain Approach of Image Steganography
Frequency Domain Approach of Image SteganographyFrequency Domain Approach of Image Steganography
Frequency Domain Approach of Image Steganography
 
E04122330
E04122330E04122330
E04122330
 
Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...
 
7 rupali kasar_final paper--74-85
7 rupali kasar_final paper--74-857 rupali kasar_final paper--74-85
7 rupali kasar_final paper--74-85
 
H3602056060
H3602056060H3602056060
H3602056060
 
CT-SVD and Arnold Transform for Secure Color Image Watermarking
CT-SVD and Arnold Transform for Secure Color Image WatermarkingCT-SVD and Arnold Transform for Secure Color Image Watermarking
CT-SVD and Arnold Transform for Secure Color Image Watermarking
 
Copyright protection for images on android phones
Copyright protection for images on android phonesCopyright protection for images on android phones
Copyright protection for images on android phones
 
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
 
3 rupali kasar_final paper--23-34
3 rupali kasar_final paper--23-343 rupali kasar_final paper--23-34
3 rupali kasar_final paper--23-34
 
Annotated Bibliography On Multimedia Security
Annotated Bibliography On Multimedia SecurityAnnotated Bibliography On Multimedia Security
Annotated Bibliography On Multimedia Security
 

More from iosrjce

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...iosrjce
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?iosrjce
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later lifeiosrjce
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...iosrjce
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubaiiosrjce
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...iosrjce
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approachiosrjce
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sitesiosrjce
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeiosrjce
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...iosrjce
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...iosrjce
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladeshiosrjce
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...iosrjce
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...iosrjce
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Considerationiosrjce
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyiosrjce
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...iosrjce
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...iosrjce
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...iosrjce
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...iosrjce
 

More from iosrjce (20)

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later life
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubai
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sites
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperative
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Consideration
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative study
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
 

Recently uploaded

data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoordharasingh5698
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...soginsider
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projectssmsksolar
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 

Recently uploaded (20)

Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 

Reversible Watermarking based on Histogram Shifting Modification:A Review

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. 1 (May – Jun. 2015), PP 25-32 www.iosrjournals.org DOI: 10.9790/0661-17312532 www.iosrjournals.org 25 | Page Reversible Watermarking based on Histogram Shifting Modification:A Review Anamika Jain1 , Namita Tiwari2 1 (Computer Science, Maulana Azad National Institute of Technology, India) 2 (Ass. Professor,Department of Computer Science, Maulana Azad National Institute of Technology, India) Abstract: When we talk about the data communication or exchange of information from sender to receiver, the major concern is DATA. This (data) being of high importance, prone to various kinds of attacks. In order to protect it, data hiding techniques are used. Some of the data hiding techniques available are digital watermarking, steganography, etc. By digital watermarking, data is hidden in any type of multimedia like images, audio, etc. Watermarking is one of the major solution to provide authenticity and copyright protection to the digital data. But watermarking causes damage to the cover signal (signal in which data are embedding), therefore recovery of the original cover signal is not possible at the receiving end, which is not tolerable in many fields like medical, military, etc. To reduce the degradation in the watermarked signal “Reversible watermarking techniques” are used. In reversible watermarking original cover signal and the message are retrieved with fewer errors. Reversible data hiding techniques are also known as the Lossless data hiding techniques. This technique is getting high importance day by day because of some fields like military, medical, etc. This paper describes the various reversible watermarking techniques which are already existing. Index Terms: Reversible watermarking, Histogram shifting, Authentication. I. Introduction: Watermarking is a data hiding technique. In watermarking data is hidden in the noise tolerant signal like image, audio, video, etc. Watermarking is similar to steganography, what separates them is their goal. The main difference between the watermarking and steganography is, in steganography the intermediates did not know that data is hidden inside the signal, but in watermarking intermediates knows very well that there is something valuable information inside the signal but they cannot modify the information in any manner[9]. Watermarking can be of two types visible or Invisible. In visible watermarking the logo is present on the signal, by seeing the signal one can easily identify that this signal belongs to which organization and in invisible watermarking one cannot identify the difference between the watermarked signal or in the original signal with the naked eyes. Fig [1] shows the types of watermarking. In watermarking information is embedded into the cover signal so there will be some degradation in the cover signal so the recovery of the original signal is not possible at the receiving end and these types of degradation is not tolerable in some fields like military, army, etc., according to the signal they have to take decisions, if the signal is distorted then they might make wrong perception. To recover the cover image at the receiver end “reversible watermarking” is used. Cover signal and the watermark is retrieved at the receiver end without any error or with fewer errors in reversible watermarking. Fig [2] shows the block diagram of the conventional watermarking and reversible watermarking. i) Cover image ii) Watermarked image a) Visible watermarking b) Invisible watermarking Fig [1]
  • 2. Reversible Watermarking based on Histogram Shifting Modification:A Review DOI: 10.9790/0661-17312532 www.iosrjournals.org 26 | Page Watermarking scheme can be of various types like[7], robust, fragile and semi fragile. Robust techniques can handle all types of attacks, so these techniques can be used in the copyright protection. Fragile techniques cannot tolerate attacks. a) Conventional watermarking b) Reversible watermarking Fig. 2 In fragile techniques the signal becomes useless after some modification, so it is used in authentication purpose. Semi fragile techniques are those who lie between robust and fragile techniques. The main goal of watermarking is that no one can change the data in between, when the transmission is going on. Watermarking mainly depends on the two things [9], the first thing is embedding capacity and the second thing is the imperceptibility. Embedding capacity means that how much amount of data we can insert into the cover signal and imperceptibility means there should not be any difference between the cover signal and the watermarked signal which can‟t be easily recognized with human eyes. The property of watermarking is: image fidelity, robustness, effectiveness, and payload size.This paper is divided into three parts. Part A describes the application of watermarking, part B describes the existing work and limitation and in part C conclusion is there. A) Application Of Watermarking [10]: • Broadcast monitoring: this is the responsibility of the agencies that their commercials are getting that much air time for that they have paid. Watermarking can be used for that purpose. • Authentication: watermarking can be used in the place of copyright, to identify the owner of the digital work like audio, video, etc, also be used to identify the owner of the particular multimedia. • Transaction tracking: watermark is embedded in the digital work, that can be used to record more than one transaction take place in the history of a copy of this work. • Copyrights: This application of the watermarking prevents illegal copying of the multimedia or the essential information. In this application some information is embedded into the multimedia by that the multimedia will become watermarked multimedia, if any one use that data by saying that this belongs to him, that will easily catch. B) Existing Work And Limitation: This paper describes reversible histogram based data hiding techniques and its developments since 2001. The first reversible watermarking approach is proposed in 2001 by Vleeschouwer et al. [1] in this paper Image is divided into several blocks of neighboring pixels. Then, each block is split into two parts, and corresponding histograms are calculated. A bin (interval) is shifted accordance with the value of watermark bit. If the bit is „1‟, shift the lowest bin to the highest one, and downgrade other bins. And if the bit is „0‟, then upgrade each bin and shift the highest bin to the lowest bin. High distortion is introduced in the watermarked image because of the shifting. Then in 2003 they improve their work by introducing the bijective transformation [2]. Other techniques are described as follows: i) Z. NI. APPROACH In 2006 one reversible watermarking technique is presented by Zhincheng Ni[3]. In this approach, before embedding they have recorded three peaks and zero points from the histogram of the cover image, the pixel between those points goes under modification. But there is a limitation on the embedding capacity. Embedding Process: A) Algorithm for embedding with One Pair of Maximum and Minimum Points: For an N*N image. 1) H(z) be the histogram of the image z. 2) Maximum point h (x) x € [0,255] and the minimum point zero h (y) y € [0,255] is selected from the histogram H (z). 3) If the minimum point h(y)>0 , recode the co-ordinate (i, j) of those pixels and the pixel Grayscale value b as over head information then set h(y)=0 . 4) Without loss of assuming generality x<y. Move the whole part of the histogram H(z) with z €[x, y] to the right by 1 unit. This means that all the pixel grayscale values (satisfying x € [x, y] ) are added by 1. 5) Scan the image, once meet the pixel (whose grayscale value is x ), check the to-be-embedded bit. If the to-be embedded bit is “1”, the pixel grayscale value is changed to x+1. If the bit is “0”, the pixel value remains x.
  • 3. Reversible Watermarking based on Histogram Shifting Modification:A Review DOI: 10.9790/0661-17312532 www.iosrjournals.org 27 | Page B) Actual Data Embedding Capacity (Pure Payload): Data embedding capacity, is calculated by the following formula: C=h(x)-O Where, O denotes the amount of data overhead information. C) Multiple Pairs of Maximum and Minimum Points Embedding Algorithm: For an image containing the gray scale value z€ [0,255]. 1) Calculate histogram H(z) of the given image . 2) In the histogram, find three minimum points, h(y1), h( y2), h(y3). Such that y1<y2<y3. 3) In the intervals (0,y1) and(y3,255) , find the two maximum point h(x1), h(x3) respectively, Such that x1€[0,b1], x3€[b3,255]. 4) Find two maximum points in each intervalof (y1, y2), (y2, y3). Suppose they are h(x12), h(x21), y1<x12<x21<y2 and h(x23), h(x32), y2<x23<x32<y3 respectively. 5) Find a point with larger histogram value in each of the inteval ((h (x1), h (x12)), (h (x21), h (x23)), and (h (x32), h (x3)), respectively. Suppose they are h(x1), h(x23),h(x3) respectively. 6) Then (h (x1), h (y1)), (h (x23), h (y2)), (h (x3), h (y3)) are the three pairs of maximum and minimum points. For each and every pair, apply Steps 3-5 described in the above section. ii) Chia-Chen Lin’s Method: Then to improve the capacity of the Ni‟s method in 2008 Lin et al [4] presents a multilevel reversible watermarking technique. In this technique, the difference image is calculated by taking the difference between the two neighboring pixels of the cover image. The cover image is divided into the non overlapping blocks; a difference block corresponding to each block is calculated, for embedding data histogram modification techniques is applied to each block. But the overhead information is high in this technique because there is the need to store the peak value of each block. Fig 3 shows the flow diagram of the Lin‟s method. Histogram generation phase: For increasing the hiding capacity, an image is generated, called a difference image before the hiding phase. For a grayscale image H (x, y) P×Q pixels in size, a difference image D (x, y), P× (Q−1) pixels in size can be generated from the original image H by using the following formula: D(x,y ) = |H(x, y) − H(x, y + 1)| ........................ (1) 0≤x≤P − 1, 0≤y≤Q – 2 Here | · | is the absolute value operation. Data hiding phase: The hiding phase of this technique can be divided into five steps as follows. Step 1: The cover image is divided into multiple number of non overlapping blocks A×B in size. A difference image Db(x,y) of size A×(B−1) is generated for each block by using following formula: Db(x,y) = |Hb(x,y) − Hb(x, y + 1)| ..................(2) 0≤x≤A − 1, 0≤y≤B − 2, 0≤b≤( M × N)/(A × B)− 1 Step 2: Calculate the histogram of the difference image Db and the peak point Pb is recorded for each and every block.
  • 4. Reversible Watermarking based on Histogram Shifting Modification:A Review DOI: 10.9790/0661-17312532 www.iosrjournals.org 28 | Page Flow chart of Lin‟s method Fig [3] Step 3: If the pixel value of block b is larger than the peak point Pb of block b, change the pixel value of block b is incremented by 1. Otherwise, the pixel value remains unchanged. The modification will be done as follows: Db(x,y) +1 if Db(x,y)>Pb, D‟b (x, y) = ...................... (3) Db(x,y) otherwise For 0≤x≤A − 1, 0≤y≤B − 2, And 0≤b≤ (M × N) /(A × B) − 1 Where Pb is the maximum point of block b. Step 4: The pixels having a grayscale value the same as peak point Pb can be modified as follows to hide embedded message bit m in difference image D‟b : D‟b(x,y) + m if D‟b(x,y) = Pb, D‟‟b (x, y) = ........................ (4) D‟b (x, y) otherwise, For 0≤x≤A − 1, 0≤y≤B − 2, And 0≤b≤ (M × N) /(A × B) − 1 Where Pb is the maximum point of block b, and m ∈ {0, 1}. Step 5: Original image and hidden difference image is used to construct the marked image by performing the inverse transformation T−1 . The inverse operation is applied on the first two pixel of each row. The procedure is as follow: Hb(x, 0) if Hb(x, 0)>Hb(x, 1), Hb(x, 0) + D‟‟b(x, 0) if Hb(x,0)≤Hb(x,1), Sb (x, 0) = Sb(x, 1) = ..................(5) Hb(x, 1) + D’’b(x, 0) otherwise, Hb(x, 1) otherwise, For 0≤x≤A − 1, 0≤b≤ (M × N) /(A ×B) −1. For any residual pixels, the inverse operation is defined as
  • 5. Reversible Watermarking based on Histogram Shifting Modification:A Review DOI: 10.9790/0661-17312532 www.iosrjournals.org 29 | Page Sb(x, y − 1)+D‟‟b(x, y − 1) If Hb (x, y−1) ≤Hb (x, y), Sb (x, y) = ................(6) Sb(x, y − 1) – D‟b(x, y − 1) otherwise, For 0≤x≤A − 1, 2≤y≤B − 2, 0≤b≤( M × N)/(A × B)− 1 Extracting the information phase: In this process, the embedded message is extracted and reverses the marked image to its original. The extracting and reversing process is as follows. Step 1: Divide the received marked image into blocks A×B in size. Generate the difference image SDb (x, y) of block b from the received marked image by using the following formula: SDb(x,y) = |Sb(x,y) − Sb(x, y + 1)|, ..................... (7) For 0≤x≤A − 1, 0≤y≤B − 2, 0≤b≤( M × N)/(A × B)− 1 Step 2: Perform the embedded message extracting on the difference image SDb(x,y) of block b by using the following rule: 0 if SDb(x,y) = Pb, m = ................ (8) 1 if SDb (x, y) = Pb + 1, For 0≤x≤A − 1, 0≤y≤B − 2, And 0≤y≤ (M × N) /(A × B) – 1. Where Pb is the received maximum point of block b. iii) Piyu Tsai’s Method In 2009 one more technique for data hiding through histogram shifting is proposed by Tsai et al [5]. This scheme works on the neighboring similarity of pixels in the medical image to improve the histogram-based reversible data hiding. Provide a higher hiding capacity while keeping the good quality of the embedded image is the goal of the proposed technique. Embedding procedure: While exploring the similarity between neighboring pixel, the cover signal is divided into multiple number of blocks of n*n pixels. Center pixel is selected as the basic pixel for prediction from each block. To generate prediction errors, pixels in each block are processed by the technique called linear prediction technique, the prediction errors are also called as the residual values. By taking the difference between the each pixel and the basic pixel these residual values are calculated. After processing all the blocks is finished, the residual image is generated. The size of residual image and the cover image is same. On the basis of the occurrences of residual value corresponds to these non basic pixels of the cover image, the residual histogram is generated. Fig 4 shows the flow diagram of the embedding procedure. The histogram is of the cover image has two parts: first one is a Non Negative Histogram (NNH) and the second one is a Negative Histogram (NH). Secret data are embedded into the residual histogram. A group of peak and zero points are selected from NNH and NH. Let S is the size of secret data and the maximum hiding capacity derived from NNH and NH is greater than S, it indicates that there is enough space for hiding the secret data. Otherwise more number of peak and zero points are searched in NNH and NH histogram. Let sd called as a bit of secret data and each residual value in the peak point is employed to carry one bit secret data. If sd =1, no changes needed to be done in the residual values, otherwise the residual value is decremented to one or shifted to left by the amount of 1. The one who did not lie between the ranges of maximum or minimum points no modifications are applied to that value. When secret data are embedding is done, the residual embedded image is generated. The reverse linear prediction technique is applied to the residual embedded image to generate an embedded image. To provide the best quality of embedded images, the absolute distance between the original residual values and modified values is at most 1. Therefore, the absolute distance between one pixel in the cover image and its corresponding pixel in the embedded image is at most 1.
  • 6. Reversible Watermarking based on Histogram Shifting Modification:A Review DOI: 10.9790/0661-17312532 www.iosrjournals.org 30 | Page Extraction procedure: Fig 5 shows the flow diagram of the extraction procedure of Tsai‟s method. In this technique, once the maximum and minimum point pair and embedded image are received, then the extraction procedure can be started. Linear prediction technique is applied to embedded images, according to that the residual embedded image is obtained. The resultant image is now checked. There are two different ways: 1) If pixel x of the residual embedded image is not lying in the maximum and minimum points, the pixel is skipped and the pixel value remains for image reconstruction. Otherwise, there can be three cases: 1) If x is at maximum point, secret data valued at 1 is extracted and the value of x is unchanged. 2) If the absolute difference between x and the maximum point is 1, secret data value 0 is extracted and the value of x is replaced by the value of the maximum point. 3) The remaining pixels are shifted closer to peak point by 1 and no secret data is extracted. After that, the embedded secret data are extracted from the embedded image. On performing the linear prediction technique to the embedded image the original image can be recovered. iv) Narawade’s Method: In 2012 Narawade et al. [6] Presented a different technique for the histogram shifting. In the technique firstly the cover image is scanned, then histogram of the cover image is calculated, according to the histogram the maximum and minimum points are calculated, and according to the maximum and minimum points, location map is calculated. But there is the limitation in this approach that the cover image is calculated twice.. Embedding procedure: Step 1: Scan the cover image I and create its histogram H(x), x € [0, 255]. In its histogram obtain maximum and minimum point x, y respectively, such that y=x-1. Step 2: The pixel values those lies between the maximum and minimum point are recorded. Step 3: Scan the cover image I again. Set the counter k to the length of watermark. If counter k is less than length of watermark then check the following: (a) If scanned pixel value lies between x, y, then pixel value is decremented by 1. (b) If a pixel value is below „y‟, then Pixel value will not get changed. (c) If pixel values are above „x‟ then Pixel value will not get changed. (d) Scan the watermarked image, if scanned Value is 0, then decrease the pixel value of x by 1. If scanned pixel value of watermark is 1, then do not change pixel value. Step 4: Continue step 3 up to end of watermark. If counter k becomes greater than the length of watermarked image, and stop the procedure. Extraction procedure: Step 1: Watermarked image is scanned in the same order as in the Embedding phase. Step 2: Set counter k to 0, k is used to indicate the length of watermarked image. If k is less than the length of watermarked image, go to step 3 else step 4. Step 3: Scan the image and check the following (a) If scanned pixel value is „x‟, bit 1 is Extracted. If the scanned value is x-1, extract 0 bits, and increase counter k=k+1. (b) If the scanned value lies between x and y then add „1‟ in the scanned pixel value. (c) If a pixel value is greater than „x‟ and lesser than „y‟ then do not change these values.
  • 7. Reversible Watermarking based on Histogram Shifting Modification:A Review DOI: 10.9790/0661-17312532 www.iosrjournals.org 31 | Page Fig .4 Embedding procedure of Tsai Method Fig. 5 Extraction procedure of Tsai Method Step 4: Continue step 3 up to end of watermarked image. . If counter k becomes greater than the length of watermarked image, and stop the procedure. Step 5: Go to location map L of y+1, and make it y+1. C) Conclusion: In this paper the existing histogram based watermarking techniques are discussed, and shows the result (Table 1) of different techniques. The results which are shown in the table are based on the embedding capacity and PSNR value, as PSNR value and embedding capacity are the important parameter of the watermarking. The result shows below are of the different type of images, on that images the existing techniques are applied. The PSNR value of the Narawade method is very high i.e. approx 77dB, this method is applicable for the cartoon images only. The embedding capacity of this method is 170671 bits. This survey shows that the embedding technique of the Ni‟s method is very low, and the PSNR level is satisfactory. In future there is the scope to increase the embedding capacity of the Ni‟s method. Table 1. The performance of the histogram based data hiding schemes[8] Methods Ni‟s scheme Chia chen sheme Tsai‟s method PSNR (dB) Lena 48.0 30 50.59 Capacity (Bits) 5469 308474 52322 PSNR (dB) Baboon 48.21 30.4 51.03 Capacity (Bits) 5421 161118 18410 PSNR (dB) Boat 48.247 30.4 47.6 Capacity (Bits) 7301 307193 5351030
  • 8. Reversible Watermarking based on Histogram Shifting Modification:A Review DOI: 10.9790/0661-17312532 www.iosrjournals.org 32 | Page Refrences [1]. C. De Vleeschouwer, J. E. Delaigle, and B. Macq, “Circular interpretation of histogram for reversible watermarking,” 2001 IEEE Fourth Work. Multimed. Signal Process. (Cat. No.01TH8564), pp. 345–350, 2001. [2]. C. De Vleeschouwer, J. F. Delaigle, and B. Macq, “Circular interpretation of bijective transformations in lossless watermarking for media asset management,” IEEE Trans. Multimed., vol. 5, no. 1, pp. 97–105, 2003. [3]. Z. N. Z. Ni, Y.-Q. S. Y.-Q. Shi, N. Ansari, and W. S. W. Su, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, 2006. [4]. Chia-Chen Lin, Wei-Liang Tai and Chin-Chen-Chang. “Pattern Recognition,” vol. 41, pp. 3582–3591, 2008. [5]. P. Tsai, Y. C. Hu, and H. L. Yeh, “Reversible image hiding scheme using predictive coding and histogram shifting,” Signal Processing, vol. 89, pp. 1129–1143, 2009. [6]. N. S. Narawade, “Reduced Pixel Shifting and Improved Histogram Shifting,” vol. 3, no. 4, 2012. [7]. A. Khan and S. Ambreen, “A high capacity reversible watermarking approach for authenticating images : Exploiting down- sampling , histogram processing , and block selection q,” Inf. Sci. (Ny)., vol. 256, pp. 162–183, 2014. [8]. T. Naheed, I. Usman, T. M. Khan, A. H. Dar, and M. Farhan, “Optik Intelligent reversible watermarking technique in medical images using GA and PSO,” Opt. - Int. J. Light Electron Opt., vol. 125, no. 11, pp. 2515–2525, 2014. [9]. A. Khan, A. Siddiqa, S. Munib, and S. A. Malik, “A recent survey of reversible watermarking techniques,” Inf. Sci. (Ny)., vol. 279, pp. 251–272, 2014. [10]. M. Averkiou, “Digital Watermarking.”