Analysis and Comparison of Typical Reversible Watermarking Methods

  • Yongjian Hu
  • Byeungwoo Jeon
  • Zhiquan Lin
  • Hui Yang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4283)


In sensitive imagery, such as deep space exploration, military reconnaissance and medical diagnosis, traditional watermarks can be hardly found useful. The main reason is that the users are too worried about the loss of original information after the image being embedded with other data. Although early watermarking methods only distort the host signal imperceptibly, there is still some host information that may be permanently (irreversibly) lost. To avoid this disadvantage, some researchers (e.g. [1]-[3]) proposed the concept of reversible (lossless) watermark. Recently, more and more reversible watermarking methods have been proposed. However, the influence of [1]-[3] is obvious. In this paper, we focus on analyzing and comparing these three reversible watermarking methods. Our investigation covers several aspects including data hiding capacity, image quality, capacity resilience and control, computational complexity, security, and blind data extraction. Such analysis and comparison provide indispensable information for the design of new reversible watermarking techniques.


reversible watermarking lossless watermark data hiding data compression 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Fridrich, J., Goljan, M., Du, R.: Invertible authentication. In: Wong, P.W., Delp, E.J. (eds.) Proc. of SPIE 2001, Security and Watermarking of Multimedia Contents III, vol. 4314, pp. 197–208 (2001)Google Scholar
  2. 2.
    Fridrich, J., Goljan, M., Du, R.: Distortion-free Data Embedding for Images. In: Proc. 4th Information Hiding Workshop, Pittsburgh, Pennsylvania, April 25-27 (2001)Google Scholar
  3. 3.
    Tian, J.: Wavelet-based reversible watermarking for authentication. In: Wong, P.W., Delp, E.J. (eds.) Proc. of SPIE 2002, Security and Watermarking of Multimedia Contents III, vol. 4675, pp. 679–690 (2002)Google Scholar
  4. 4.
    Wong, P.W., Memon, N.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. on Image Processing 10(10), 1593–1601 (2001)zbMATHCrossRefGoogle Scholar
  5. 5.
    Honsinger, C.W., Jones, P., Rabbani, M., Stoffel, J.C.: Lossless recovery of an original image containing embedded data. U.S patent application, Docket No 77 102/E-D (1999)Google Scholar
  6. 6.
    Celik, M.U., Sharma, G., Tekalp, A.M., Saber, E.: Lossless generalized-LSB data embedding. IEEE Trans. on Image Processing 12(2), 157–160 (2005)Google Scholar
  7. 7.
    Celik, M.U., Sharma, G., Tekalp, A.M.: Lossless watermarking for image authentication: a new framework and an implementation. IEEE Trans. on Image Processing 15(4), 1042–1049 (2006)CrossRefGoogle Scholar
  8. 8.
    Alattar, A.M.: Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans. on Image Processing 13(8), 1147–1156 (2004)CrossRefMathSciNetGoogle Scholar
  9. 9.
    Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. on Circuits and Systems for Video Technology 13(8), 890–896 (2003)CrossRefGoogle Scholar
  10. 10.
    Kamstra, L., Heijmans, H.J.A.M.: Reversible data embedding into images using wavelet techniques and sorting. IEEE Trans. on Image Processing 14(12), 2082–2090 (2005)CrossRefMathSciNetGoogle Scholar
  11. 11.
    van Leest, A., van der Veen, M., Bruekers, F.: Reversible image watermarking. In: Proc. IEEE Int. Conf. on Image Processing, Barcelona, Spain, September 2003, vol. II, pp. 731–734 (2003)Google Scholar
  12. 12.
    Kalker, T., Willems, F.M.J.: Capacity bounds and constructions for reversible data-hiding. In: Proc. IEEE Int. Conf. on Digital Signal Processing, vol. 1, pp. 71–76 (July 2002)Google Scholar
  13. 13.
    De Vleeschouwer, C., Delaigle, J.-F., Macq, B.: Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans. on Multimedia 5(1), 97–105 (2003)CrossRefGoogle Scholar
  14. 14.
    Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. on Circuits and Systems for Video Technology 16(3), 354–362 (2006)CrossRefGoogle Scholar
  15. 15.
    Hu, Y.J., Jeon, B.: Reversible visible watermarking and lossless recovery of original images. IEEE Trans. on Circuits and Systems for Video Technology (to appear)Google Scholar
  16. 16.
    Fridrich, J., Goljan, M., Du, R.: Lossless Data Embedding - New Paradigm in Digital Watermarking. Special Issue on Emerging Applications of Multimedia Data Hiding, PDF Journal Editorial 2002(2), 185–196 (2002)zbMATHGoogle Scholar
  17. 17.
    Moffat, A., Neal, R.M., Witten, I.H.: Arithmetic coding revisited. ACM Trans. on Information Systems 16, 56–294 (1998)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Yongjian Hu
    • 1
    • 2
  • Byeungwoo Jeon
    • 1
  • Zhiquan Lin
    • 2
  • Hui Yang
    • 2
  1. 1.School of Information and Communication EngineeringSungkyunkwan UniversityKorea
  2. 2.College of Automation Science and EngineeringSouth China University of TechnologyGuangzhouPRC

Personalised recommendations