Title: A robust reversible image watermarking scheme in DCT domain using Arnold scrambling and histogram modification

Authors: Soumitra Roy; Arup Kumar Pal

Addresses: Department of Computer Science and Engineering, Dr. B.C. Roy Engineering College, Durgapur, West Bengal-713206, India ' Department of Computer Science and Engineering, Indian Institute of Technology (Indian School of Mines), Dhanbad, Jharkhand-826004, India

Abstract: Among the various watermarking schemes, the reversible watermarking scheme has drawn extensive attention in the recent years for its application in sensitive issues like medical, military and typical law-enforcement images. Cover image dependent embedding capacity and lack of robustness are the most crucial concerns of the reversible watermarking methods. To overcome these issues, a discrete cosine transform (DCT) and histogram shifting based robust reversible image watermarking scheme using Arnold scrambling is presented in this paper. Initially, the image is decomposed into non-overlapping blocks and consequently DCT are applied to each block to embed a binary bit of watermark into each transformed block by modifying one pair of middle significant AC coefficients. In this initial step, location map is also generated for the cover image restoration purpose in the extracting side. Then, this location map is embedded in the cover image using histogram modification technique. In the receiver side, at first location map is generated from an image using histogram modification method and watermark is recovered from the corresponding image. Using location map reversible image is reversed in the following extracting phase of the proposed method. The proposed reversible watermarking scheme has also been experimented to verify the robustness property against several image processing attacks and satisfactory results are achieved.

Keywords: Arnold scrambling; discrete cosine transform; DCT; histogram modification; reversible watermarking; robustness.

DOI: 10.1504/IJICS.2018.091469

International Journal of Information and Computer Security, 2018 Vol.10 No.2/3, pp.216 - 236

Available online: 23 Apr 2018 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article