Journal
SIGNAL PROCESSING-IMAGE COMMUNICATION
Volume 60, Issue -, Pages 160-172Publisher
ELSEVIER SCIENCE BV
DOI: 10.1016/j.image.2017.10.003
Keywords
Visible watermarking; Watermark removal; Reversible recovery; Data compression; Inpainting
Categories
Funding
- National Natural Science Foundation of China [61672354, 61702332]
- Open Project Program of the National Laboratory of Pattern Recognition [201600003]
- Open Project Program of Shenzhen Key Laboratory of Media Security
- Open Project Program of Shanghai Key Laboratory of Data Science [201609060003]
- Shanghai Key Science and Technology Project in Information Technology Field [14511107902]
- Natural Science Foundation of Shanghai [17ZR1419100]
- Shanghai Leading Academic Discipline Project [XTKX2012]
- Shanghai Engineering Center Project of Massive Internet of Things Technology for Smart Home [GCZX14014]
- Hujiang Foundation of China [C14001, C14002]
- PAPD Fund
- CICAEET Fund
Ask authors/readers for more resources
In this paper, we propose two schemes for visible-watermark removal and reversible image recovery. In the first scheme, we consider the scenario for the image generated by a specific visible (not completely reversible) watermarking algorithm Chen et al. (2017). A run-length coding based method is utilized to compress the difference between the preliminary recovered image and original image. After embedding the difference information invisibly and reversibly, the fmal embedded image can be exactly recovered to its original version after visible-watermark removal, which avoids the problem of overflow and underflow in Chen et al. (2017). In the second scheme, the scenario of visible-watermark removal for the image generated by any visible watermarking algorithms (no matter the sender and the receiver know the algorithms or not) is considered. The scheme can perfectly remove the embedded visible watermark and can also exactly recover original image with the assist of image inpainting technique. In addition, for both two proposed schemes, the invalid user without the knowledge of secret key cannot achieve reversible recovery for original image. Experimental results demonstrate the effectiveness and superiority of our schemes. (C) 2017 Elsevier B.V. All rights reserved.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available