Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

A Reversible Watermarking for 2D Engineering Graphics Based on Difference Expansion With Adaptive Interval Partitioning

Published: 01 May 2023 Publication History

Abstract

To resolve the distortion resulting from the mismatch between the interval partition and the watermark distribution in the reversible watermarking based on difference expansion, an investigation is made to difference expansion with adaptive interval partitioning. It is found that the conventional floating number-based methods with uniform interval partitioning are not fully considering different watermark distributions, and the embedding distortion can be optimized. Thus, a reversible watermarking based on difference expansion with adaptive interval partitioning is put forward for 2D engineering graphics. Each interval is adaptively partitioned into <inline-formula><tex-math notation="LaTeX">$2^{s}$</tex-math><alternatives><mml:math><mml:msup><mml:mn>2</mml:mn><mml:mi>s</mml:mi></mml:msup></mml:math><inline-graphic xlink:href="long-ieq1-3166134.gif"/></alternatives></inline-formula> sub-intervals, and the watermark is embedded via transforming the positions of the vertices to its corresponding sub-intervals. The watermark extraction is accomplished by acquiring the indices of the sub-intervals of the watermarked vertices, and the graphics recovery is achieved by moving the watermarked vertices to the reverse direction. Moreover, a new polar coordinate system is built to be invariant to overall geometric transformation and vertices rearrangement. Experimental results and analysis indicate that it maintains good authentication ability and semi-fragility. Furthermore, its imperceptibility is significantly improved compared with the existing watermarking schemes under the same experimental conditions.

References

[1]
A. K. Singh and C. Kumar, “Encryption-then-compression-based copyright protection scheme for E-governance,” IT Professional, vol. 22, no. 2, pp. 45–52, 2020.
[2]
X. Niu, C. Shao, and X. Wang, “A survey of digital vector map watermarking,” Int. J. Innov. Comput., Informat. Control, vol. 2, no. 6, pp. 1301–1316, 2006.
[3]
J. Wu, F. Yang, and C. Wu, “Review of digital watermarking for 2D-vector map,” in Proc. IEEE Int. Conf. Green Comput. Commun. IEEE Internet Things IEEE Cyber, Phys. Social Comput., 2013, pp. 2098–2101.
[4]
A. K. Singh, “Data hiding: Current trends, innovation and potential challenges,” ACM Trans. Multimedia Comput. Commun. Appl., vol. 16, no. 3s, pp. 1–16, 2020.
[5]
J. Fridrich, M. Goljan, and R. Du, “Lossless data embedding-new paradigm in digital watermarking,” EURASIP J. Adv. Signal Process., vol. 2002, no. 2, 2002, Art. no.
[6]
M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, “Reversible data hiding,” in Proc. Int. Conf. Image Process., 2002, p. II.
[7]
M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, “Lossless generalized-LSB data embedding,” IEEE Trans. Image Process., vol. 14, no. 2, pp. 253–266, Feb. 2005.
[8]
A. Van Leest, M. van der Veen, and F. Bruekers, “Reversible image watermarking,” in Proc. Int. Conf. Image Process., 2003, pp. II–731.
[9]
Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, Oct. 2006.
[10]
D. Coltuc and J.-M. Chassery, “Very fast watermarking by reversible contrast mapping,” IEEE Signal Process. Lett., vol. 14, no. 4, pp. 255–258, Apr. 2007.
[11]
X. Wang, X. Li, B. Yang, and Z. Guo, “Efficient generalized integer transform for reversible watermarking,” IEEE Signal Process. Lett., vol. 17, no. 6, pp. 567–570, Jun. 2010.
[12]
Y. Qiu, Z. Qian, and L. Yu, “Adaptive reversible data hiding by extending the generalized integer transformation,” IEEE Signal Process. Lett., vol. 23, no. 1, pp. 130–134, Jan. 2016.
[13]
J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, Aug. 2003.
[14]
A. M. Alattar, “Reversible watermark using the difference expansion of a generalized integer transform,” IEEE Trans. Image Process., vol. 13, no. 8, pp. 1147–1156, Aug. 2004.
[15]
Y. Hu, H.-K. Lee, K. Chen, and J. Li, “Difference expansion based reversible data hiding using two embedding directions,” IEEE Trans. Multimedia, vol. 10, no. 8, pp. 1500–1512, Dec. 2008.
[16]
O. M. Al-Qershi and B. E. Khoo, “Two-dimensional difference expansion (2D-DE) scheme with a characteristics-based threshold,” Signal Process., vol. 93, no. 1, pp. 154–162, 2013.
[17]
S. Gujjunoori and M. Oruganti, “Difference expansion based reversible data embedding and edge detection,” Multimedia Tools Appl., vol. 78, pp. 25889–25917, 2019.
[18]
X. Li, B. Yang, and T. Zeng, “Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection,” IEEE Trans. Image Process., vol. 20, no. 12, pp. 3524–3533, Dec. 2011.
[19]
B. Ou, X. Li, Y. Zhao, R. Ni, and Y.-Q. Shi, “Pairwise prediction-error expansion for efficient reversible data hiding,” IEEE Trans. Image Process., vol. 22, no. 12, pp. 5010–5021, Dec. 2013.
[20]
L. Luo, Z. Chen, M. Chen, X. Zeng, and Z. Xiong, “Reversible image watermarking using interpolation technique,” IEEE Trans. Inf. Forensics Secur., vol. 5, no. 1, pp. 187–193, Mar. 2010.
[21]
I.-C. Dragoi and D. Coltuc, “Local-prediction-based difference expansion reversible watermarking,” IEEE Trans. Image Process., vol. 23, no. 4, pp. 1779–1790, Apr. 2014.
[22]
C. Shao, X. Wang, X. Xu, and X. Niu, “Study on lossless data hiding algorithm for digital vector maps,” J. Image Graph., vol. 12, no. 2, pp. 206–211, 2007.
[23]
X. Wang, C. Shao, X. Xu, and X. Niu, “Reversible data-hiding scheme for 2-D vector maps based on difference expansion,” IEEE Trans. Inf. Forensics Secur., vol. 2, no. 3, pp. 311–320, Sep. 2007.
[24]
M. Geng, P. Yu, H. Han, Z. Teng, J. Hu, and Y. Gao, “Reversible watermarking based on invariant sum value for 2D vector maps,” in Proc. 3rd IEEE Int. Conf. Netw. InfraStruct. Digit. Content, 2012, pp. 521–525.
[25]
F. Peng, Z.-J. Yan, and M. Long, “A reversible watermarking for 2D vector map based on triple differences expansion and reversible contrast mapping,” in Proc. Int. Conf. Secur. Privacy Anonymity Comput. Commun. Storage, 2017, pp. 147–158.
[26]
F. Peng, Y.-Z. Lei, M. Long, and X.-M. Sun, “A reversible watermarking scheme for two-dimensional cad engineering graphics based on improved difference expansion,” Comput.-Aided Des., vol. 43, no. 8, pp. 1018–1024, 2011.
[27]
F. Peng and Y.-Z. Lei, “An effective reversible watermarking for 2D CAD engineering graphics based on improved QIM,” Int. J. Digit. Crime Forensics, vol. 3, no. 1, pp. 53–69, 2011.
[28]
D. Xiao, S. Hu, and H. Zheng, “A high capacity combined reversible watermarking scheme for 2-D CAD engineering graphics,” Multimedia Tools Appl., vol. 74, no. 6, pp. 2109–2126, 2015.
[29]
N. Wang, H. Zhang, and C. Men, “A high capacity reversible data hiding method for 2D vector maps based on virtual coordinates,” Comput.-Aided Des., vol. 47, pp. 108–117, 2014.
[30]
Z.-X. Lin, F. Peng, and M. Long, “A low-distortion reversible watermarking for 2D engineering graphics based on region nesting,” IEEE Trans. Inf. Forensics Secur., vol. 13, no. 9, pp. 2372–2382, Sep. 2018.
[31]
Y. Qiu, H. Gu, and J. Sun, “Reversible watermarking algorithm of vector maps based on ECC,” Multimedia Tools Appl., vol. 77, no. 18, pp. 23651–23672, 2018.
[32]
Y. Qiu, H. Duan, J. Sun, and H. Gu, “Rich-information reversible watermarking scheme of vector maps,” Multimedia Tools Appl., vol. 78, no. 17, pp. 24 955–24 977, 2019.
[33]
M. Voigt, B. Yang, and C. Busch, “Reversible watermarking of 2D-vector data,” in Proc. Workshop Multimedia Secur., 2004, pp. 160–165.
[34]
L. Deng and H. Xiao, “A lossless watermarking algorithm for vector graphics based on wavelet transform,” Comput. Knowl. Technol., vol. 6, no. 4, pp. 889–898, 2010.
[35]
S. Tao, X. Dehe, L. Chengming, and S. Jianguo, “Watermarking GIS data for digital map copyright protection,” in Proc. 24th Int. Cartographic Conf., 2009, pp. 1–9.

Cited By

View all
  • (2024)Expansion high payload imperceptible steganography using parameterized multilayer EMD with clock-adjustment modelJournal on Image and Video Processing10.1186/s13640-024-00653-02024:1Online publication date: 13-Oct-2024
  • (2024)A Scheme of PVO with Median Preserving upon Reversible Data Hiding Using Adaptive Embedding MechanismsProceedings of the 2024 5th International Conference on Computing, Networks and Internet of Things10.1145/3670105.3670191(490-495)Online publication date: 24-May-2024
  • (2024)Client-Side Embedding of Screen-Shooting Resilient Image WatermarkingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.339704319(5357-5372)Online publication date: 6-May-2024

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Transactions on Dependable and Secure Computing
IEEE Transactions on Dependable and Secure Computing  Volume 20, Issue 3
May-June 2023
903 pages

Publisher

IEEE Computer Society Press

Washington, DC, United States

Publication History

Published: 01 May 2023

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Expansion high payload imperceptible steganography using parameterized multilayer EMD with clock-adjustment modelJournal on Image and Video Processing10.1186/s13640-024-00653-02024:1Online publication date: 13-Oct-2024
  • (2024)A Scheme of PVO with Median Preserving upon Reversible Data Hiding Using Adaptive Embedding MechanismsProceedings of the 2024 5th International Conference on Computing, Networks and Internet of Things10.1145/3670105.3670191(490-495)Online publication date: 24-May-2024
  • (2024)Client-Side Embedding of Screen-Shooting Resilient Image WatermarkingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.339704319(5357-5372)Online publication date: 6-May-2024

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media