Reversible watermark with large capacity using the predictive coding

Minoru Kuribayashi, Masakatu Morii, Hatsukazu Tanaka

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

A reversible watermarking algorithm with large capacity has been developed by applying the difference expansion of a generalized integer transform. In this algorithm, a watermark signal is inserted in the LSB of the difference values among pixels. In this paper, we apply the prediction errors calculated by a predictor in JPEG-LS for embedding a watermark signal, which contributes to increase the amount of embedded information with less degradation. As one of the drawbacks discovered in the above conventional method is a large size of the embedded location map introduced to make it reversible, we decrease the large size of the location map by vectorization, and then modify the composition of the map using the local characteristic in order to enhance the performance of JBIG2.

Original languageEnglish
Title of host publicationInformation and Communications Security - 7th International Conference, ICICS 2005, Proceedings
Pages441-453
Number of pages13
Volume3783 LNCS
DOIs
Publication statusPublished - 2005
Externally publishedYes
Event7th International Conference on Information and Communications Security, ICICS 2005 - Beijing, China
Duration: Dec 10 2005Dec 13 2005

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3783 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other7th International Conference on Information and Communications Security, ICICS 2005
CountryChina
CityBeijing
Period12/10/0512/13/05

    Fingerprint

ASJC Scopus subject areas

  • Computer Science(all)
  • Biochemistry, Genetics and Molecular Biology(all)
  • Theoretical Computer Science

Cite this

Kuribayashi, M., Morii, M., & Tanaka, H. (2005). Reversible watermark with large capacity using the predictive coding. In Information and Communications Security - 7th International Conference, ICICS 2005, Proceedings (Vol. 3783 LNCS, pp. 441-453). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3783 LNCS). https://doi.org/10.1007/11602897_37