Skip to main content

High Capacity Lossless Data Hiding

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4332))

Abstract

Most data embedding techniques proposed so far lead to distortions in the original image. These distortions create problems in some areas such as medical, astronomical, and military imagery. Lossless data hiding is an exact restoration approach for recovering the original image from the stego image. In this paper, we present a lossless data embedding technique with a higher embedding capacity. We propose two lossless data embedding methods; first, a part of the unusable groups U are changed into the usable groups. Secondly, a discrimination function f is modified to improve the embedding capacity. We provide experimental results to demonstrate the effectiveness of our proposed algorithm.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Rosenblatt, W., Trippe, W., Mooney, S.: Digital Rights Management. New York (2002)

    Google Scholar 

  2. Lin, E.T., Eskicioglu, A.M., Lagendijk, R.L.: Advances in Digital Video Content Protection. Proceedings of the IEEE 93(1), 171–183 (2005)

    Article  Google Scholar 

  3. Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Transaction Image Processing 6, 1673–1687 (1997)

    Article  Google Scholar 

  4. Wong, P.W.: A watermark for image integrity and ownership verification. In: Proceedings of IEEE International Conference Image Processing, pp. 455–459 (1998)

    Google Scholar 

  5. Celik, M.U., Sharma, G., Saber, E., Tekalp, A.M.: Hierarchical watermarking for secure image authentication with localization. IEEE Transaction Image Processing 11(6), 585–595 (2002)

    Article  MATH  Google Scholar 

  6. Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Kaufmann, San Francisco (2001)

    Google Scholar 

  7. Fridrich, J., Goljan, M., Du, R.: Invertible Authentication. In: Proceedings of SPIE Photonics West, Security and Watermarking of Multimedia Contents, San jose, California, USA, January 2001, vol. 3971 (2001)

    Google Scholar 

  8. Goljan, M., Fridrich, J., Du, R.: Distortion-free data embedding for images. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 27–41. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  9. Honsinger, C.W., Jones, P.W., Rabbani, M., Stoffel, J.C.: Lossless recovery of an original image containing embedded data. United States patent 6,278,791 (2001)

    Google Scholar 

  10. Tian, J.: Reversible watermarking by difference expansion. In: Proceedings of Multimedia and Security Workshop at ACM Multimedia (December 2002)

    Google Scholar 

  11. Furht, B., Kirovski, D.: Multimedia Security Handbook. CRC Press, New York (2005)

    Google Scholar 

  12. Xuan, G., Shi, Y.Q., Ni, Z.C., Chen, J., Yang, l., Zhen, Y., Zhen, J.: High Capacity lossless Data Hiding Based on Integer Wavelet Transform. In: Proceeding of IEEE international Symposium on Circuits and Systems, Vancouver, Canada (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, H., Rhee, K. (2006). High Capacity Lossless Data Hiding. In: Bagchi, A., Atluri, V. (eds) Information Systems Security. ICISS 2006. Lecture Notes in Computer Science, vol 4332. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11961635_23

Download citation

  • DOI: https://doi.org/10.1007/11961635_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-68962-1

  • Online ISBN: 978-3-540-68963-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics