Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2015, Article ID 670535, 12 pages
http://dx.doi.org/10.1155/2015/670535
Research Article

Reversible Watermarking Using Prediction-Error Expansion and Extreme Learning Machine

1School of Information Science & Technology, Jiujiang University, Jiujiang 332005, China
2Institute of Network & Information Security, Jiujiang University, Jiujiang 332005, China

Received 3 May 2015; Revised 29 June 2015; Accepted 30 July 2015

Academic Editor: Roque J. Saltarén

Copyright © 2015 Guangyong Gao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. P. Bas and T. Furon, “A new measure of watermarking security: the effective key length,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 8, pp. 1306–1317, 2013. View at Publisher · View at Google Scholar · View at Scopus
  2. G. Gao, “Composite chaos-based lossless image authentication and tamper localization,” Multimedia Tools and Applications, vol. 63, no. 3, pp. 947–964, 2012. View at Publisher · View at Google Scholar · View at Scopus
  3. Z. Xia, X. Wang, X. Sun, Q. Liu, and N. Xiong, “Steganalysis of LSB matching using differences between nonadjacent pixels,” Multimedia Tools and Applications, 2014. View at Publisher · View at Google Scholar · View at Scopus
  4. J. Tian, “Reversible data embedding using a difference expansion,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 890–896, 2003. View at Publisher · View at Google Scholar · View at Scopus
  5. A. M. Alattar, “Reversible watermark using the difference expansion of a generalized integer transform,” IEEE Transactions on Image Processing, vol. 13, no. 8, pp. 1147–1156, 2004. View at Publisher · View at Google Scholar · View at Scopus
  6. C.-C. Chen and Y.-H. Tsai, “Adaptive reversible image watermarking scheme,” Journal of Systems and Software, vol. 84, no. 3, pp. 428–434, 2011. View at Publisher · View at Google Scholar · View at Scopus
  7. Q. Gu and T. Gao, “A novel reversible robust watermarking algorithm based on chaotic system,” Digital Signal Processing, vol. 23, no. 1, pp. 213–217, 2013. View at Publisher · View at Google Scholar · View at Scopus
  8. Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354–361, 2006. View at Publisher · View at Google Scholar · View at Scopus
  9. J.-X. Wang, J.-Q. Ni, and J.-W. Pan, “A high performance reversible watermarking scheme based on histogram shifting,” Acta Automatica Sinica, vol. 38, no. 1, pp. 88–96, 2012. View at Publisher · View at Google Scholar · View at Scopus
  10. G. Coatrieux, W. Pan, N. Cuppens-Boulahia, F. Cuppens, and C. Roux, “Reversible watermarking based on invariant image classification and dynamic histogram shifting,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 1, pp. 111–120, 2013. View at Publisher · View at Google Scholar · View at Scopus
  11. P. Tsai, Y.-C. Hu, and H.-L. Yeh, “Reversible image hiding scheme using predictive coding and histogram shifting,” Signal Processing, vol. 89, no. 6, pp. 1129–1143, 2009. View at Publisher · View at Google Scholar · View at Scopus
  12. D.-G. Yeo, H.-Y. Lee, and B. M. Kim, “High capacity reversible watermarking using differential histogram shifting and predicted error compensation,” Journal of Electronic Imaging, vol. 20, no. 1, Article ID 013001, 2011. View at Publisher · View at Google Scholar · View at Scopus
  13. D. M. Thodi and J. J. Rodríguez, “Prediction-error-based reversible watermarking,” in Proceedings of the International Conference on Image Processing (ICIP '04), pp. 1549–1552, IEEE, Singapore, October 2004. View at Publisher · View at Google Scholar · View at Scopus
  14. D. M. Thodi and J. J. Rodríguez, “Expansion embedding techniques for reversible watermarking,” IEEE Transactions on Image Processing, vol. 16, no. 3, pp. 721–730, 2007. View at Publisher · View at Google Scholar · View at Scopus
  15. D. Coltuc, “Improved embedding for prediction-based reversible watermarking,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 873–882, 2011. View at Publisher · View at Google Scholar · View at Scopus
  16. V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y. Q. Shi, “Reversible watermarking algorithm using sorting and prediction,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 19, no. 7, pp. 989–999, 2009. View at Publisher · View at Google Scholar · View at Scopus
  17. B. Ou, X. Li, Y. Zhao, R. Ni, and Y.-Q. Shi, “Pairwise prediction-error expansion for efficient reversible data hiding,” IEEE Transactions on Image Processing, vol. 22, no. 12, pp. 5010–5021, 2013. View at Publisher · View at Google Scholar · View at Scopus
  18. I.-C. Dragoi and D. Coltuc, “Local-prediction-based difference expansion reversible watermarking,” IEEE Transactions on Image Processing, vol. 23, no. 4, pp. 1779–1790, 2014. View at Publisher · View at Google Scholar · View at Scopus
  19. X. Li, B. Yang, and T. Zeng, “Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection,” IEEE Transactions on Image Processing, vol. 20, no. 12, pp. 3524–3533, 2011. View at Publisher · View at Google Scholar · View at Scopus
  20. B. Lei, E.-L. Tan, S. Chen, D. Ni, T. Wang, and H. Lei, “Reversible watermarking scheme for medical image based on differential evolution,” Expert Systems with Applications, vol. 41, no. 7, pp. 3178–3188, 2014. View at Publisher · View at Google Scholar · View at Scopus
  21. M. Arsalan, S. A. Malik, and A. Khan, “Intelligent reversible watermarking in integer wavelet domain for medical images,” Journal of Systems and Software, vol. 85, no. 4, pp. 883–894, 2012. View at Publisher · View at Google Scholar · View at Scopus
  22. G. Xuan, C. Yang, Y. Zhen, Y. Q. Shi, and Z. Ni, “Reversible data hiding using integer wavelet transform and companding technique,” in Digital Watermarking, vol. 3304 of Lecture Notes in Computer Science, pp. 115–124, Springer, Berlin, Germany, 2005. View at Publisher · View at Google Scholar
  23. G.-B. Huang, Q.-Y. Zhu, and C.-K. Siew, “Extreme learning machine: a new learning scheme of feedforward neural networks,” in Proceedings of the IEEE International Joint Conference on Neural Networks, pp. 985–990, July 2004. View at Publisher · View at Google Scholar · View at Scopus
  24. G.-B. Huang, Q.-Y. Zhu, and C.-K. Siew, “Extreme learning machine: theory and applications,” Neurocomputing, vol. 70, no. 1–3, pp. 489–501, 2006. View at Publisher · View at Google Scholar · View at Scopus
  25. M. J. Weinberger, G. Seroussi, and G. Sapiro, “The LOCO-I lossless image compression algorithm: principles and standardization into JPEG-LS,” IEEE Transactions on Image Processing, vol. 9, no. 8, pp. 1309–1324, 2000. View at Publisher · View at Google Scholar · View at Scopus
  26. X. Wu and N. Memon, “Context-based, adaptive, lossless image coding,” IEEE Transactions on Communications, vol. 45, no. 4, pp. 437–444, 1997. View at Publisher · View at Google Scholar · View at Scopus
  27. S. R. Arya and B. Singh, “Neural network based conductance estimation control algorithm for shunt compensation,” IEEE Transactions on Industrial Informatics, vol. 10, no. 1, pp. 569–577, 2014. View at Publisher · View at Google Scholar · View at Scopus
  28. Z. Xia, X. Wang, X. Sun, Q. Liu, and Q. Wang, “A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data,” IEEE Transactions on Parallel and Distributed Systems, 2015. View at Publisher · View at Google Scholar
  29. B. Gu, V. S. Sheng, K. Y. Tay, W. Romano, and S. Li, “Incremental support vector learning for ordinal regression,” IEEE Transactions on Neural Networks and Learning Systems, vol. 26, no. 7, pp. 1403–1416, 2015. View at Publisher · View at Google Scholar · View at Scopus
  30. Z. Xia, X. Wang, X. Sun, and B. Wang, “Steganalysis of least significant bit matching using multi-order differences,” Security and Communication Networks, vol. 7, no. 8, pp. 1283–1291, 2014. View at Publisher · View at Google Scholar · View at Scopus
  31. B. Gu, V. S. Sheng, Z. Wang, D. Ho, S. Osman, and S. Li, “Incremental learning for ν-support vector regression,” Neural Networks, vol. 67, pp. 140–150, 2015. View at Publisher · View at Google Scholar
  32. X.-F. Yuan and Y.-N. Wang, “Selection of SVM parameters using chaos optimization algorithms,” Control and Decision, vol. 21, no. 1, pp. 111–113, 2006. View at Google Scholar · View at Scopus
  33. Q.-Y. Zhu, A. K. Qin, P. N. Suganthan, and G.-B. Huang, “Evolutionary extreme learning machine,” Pattern Recognition, vol. 38, no. 10, pp. 1759–1763, 2005. View at Publisher · View at Google Scholar · View at Scopus
  34. P. L. Bartlett, “The sample complexity of pattern classification with neural networks: the size of the weights is more important than the size of the network,” IEEE Transactions on Information Theory, vol. 44, no. 2, pp. 525–536, 1998. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  35. M. Fallahpour, “Reversible image data hiding based on gradient adjusted prediction,” IEICE Electronics Express, vol. 5, no. 20, pp. 870–876, 2008. View at Publisher · View at Google Scholar · View at Scopus
  36. M. Chen, Z. Chen, X. Zeng, and Z. Xiong, “Reversible data hiding using additive prediction-error expansion,” in Proceedings of the 11th ACM Workshop on Multimedia and Security, pp. 19–24, September 2009. View at Publisher · View at Google Scholar · View at Scopus
  37. K.-S. Kim, M.-J. Lee, H.-Y. Lee, and H.-K. Lee, “Reversible data hiding exploiting spatial correlation between sub-sampled images,” Pattern Recognition, vol. 42, no. 11, pp. 3083–3096, 2009. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus