SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
IEEE SIGNAL PROCESSING LETTERS, VOL. 22, NO. 1, JANUARY 2015 81
Reversible Image Data Hiding with
Contrast Enhancement
Hao-Tian Wu, Member, IEEE, Jean-Luc Dugelay, Fellow, IEEE, and Yun-Qing Shi, Fellow, IEEE
Abstract—In this letter, a novel reversible data hiding (RDH) al-
gorithm is proposed for digital images. Instead of trying to keep
the PSNR value high, the proposed algorithm enhances the con-
trast of a host image to improve its visual quality. The highest two
bins in the histogram are selected for data embedding so that his-
togram equalization can be performed by repeating the process.
The side information is embedded along with the message bits into
the host image so that the original image is completely recoverable.
The proposed algorithm was implemented on two sets of images to
demonstrate its efficiency. To our best knowledge, it is the first algo-
rithm that achieves image contrast enhancement by RDH. Further-
more, the evaluation results show that the visual quality can be pre-
served after a considerable amount of message bits have been em-
bedded into the contrast-enhanced images, even better than three
specific MATLAB functions used for image contrast enhancement.
Index Terms—Contrast enhancement, histogram modification,
location map, reversible data hiding, visual quality.
I. INTRODUCTION
REVERSIBLE DATA HIDING (RDH) has been inten-
sively studied in the community of signal processing.
Also referred as invertible or lossless data hiding, RDH is to
embed a piece of information into a host signal to generate
the marked one, from which the original signal can be exactly
recovered after extracting the embedded data. The technique of
RDH is useful in some sensitive applications where no perma-
nent change is allowed on the host signal. In the literature, most
of the proposed algorithms are for digital images to embed
invisible data (e.g. [1]–[8]) or a visible watermark (e.g. [9]).
To evaluate the performance of a RDH algorithm, the hiding
rate and the marked image quality are important metrics. There
exists a trade-off between them because increasing the hiding
rate often causes more distortion in image content. To measure
the distortion, the peak signal-to-noise ratio (PSNR) value of
the marked image is often calculated. Generally speaking, direct
Manuscript received June 14, 2014; revised July 19, 2014; accepted August
01, 2014. Date of publication August 13, 2014; date of current version August
26, 2014. This work was supported in part by the NSFC under Grant 61100169
and by the Fundamental Research Funds for the Central Universities of China.
The associate editor coordinating the review of this manuscript and approving
it for publication was Prof. Jing-Ming Guo.
H.-T. Wu is with School of Digital Media, Jiangnan University, Wuxi, JS
214122, China, on leave at the Polytechnic School of Engineering, New York
University, Brooklyn, NY 11201 USA (with the support of China Scholarship
Council) (e-mail: htwu@jiangnan.edu.cn).
J.-L. Dugelay is with the Department of Multimedia Communications, EU-
RECOM, F-06410 Biot, Sophia Antipolis, France (e-mail: jld@eurecom.fr).
Y.-Q. Shi is with Department of Electrical and Computer Engineering, New
Jersey Institute of Technology, Newark, NJ 07103 USA (e-mail: shi@njit.edu).
Color versions of one or more of the figures in this paper are available online
at http://ieeexplore.ieee.org.
Digital Object Identifier 10.1109/LSP.2014.2346989
modification of image histogram [2] provides less embedding
capacity. In contrast, the more recent algorithms (e.g. [5]–[8])
manipulate the more centrally distributed prediction errors by
exploiting the correlations between neighboring pixels so that
less distortion is caused by data hiding.
Although the PSNR of a marked image generated with a pre-
diction error based algorithm is kept high, the visual quality can
hardly be improved because more or less distortion has been in-
troduced by the embedding operations. For the images acquired
with poor illumination, improving the visual quality is more im-
portant than keeping the PSNR value high. Moreover, contrast
enhancement of medical or satellite images is desired to show
the details for visual inspection. Although the PSNR value of
the enhanced image is often low, the visibility of image details
has been improved. To our best knowledge, there is no existing
RDH algorithm that performs the task of contrast enhancement
so as to improve the visual quality of host images. So in this
study, we aim at inventing a new RDH algorithm to achieve
the property of contrast enhancement instead of just keeping the
PSNR value high.
In principle, image contrast enhancement can be achieved by
histogram equalization [10]. To perform data embedding and
contrast enhancement at the same time, the proposed algorithm
is performed by modifying the histogram of pixel values. Firstly,
the two peaks (i.e. the highest two bins) in the histogram are
found out. The bins between the peaks are unchanged while the
outer bins are shifted outward so that each of the two peaks can
be split into two adjacent bins. To increase the embedding ca-
pacity, the highest two bins in the modified histogram can be fur-
ther chosen to be split, and so on until satisfactory contrast en-
hancement effect is achieved. To avoid the overflows and under-
flows due to histogram modification, the bounding pixel values
are pre-processed and a location map is generated to memorize
their locations. For the recovery of the original image, the lo-
cation map is embedded into the host image, together with the
message bits and other side information. So blind data extrac-
tion and complete recovery of the original image are both en-
abled. The proposed algorithm was applied to two set of im-
ages to demonstrate its efficiency. To our best knowledge, it is
the first algorithm that achieves image contrast enhancement by
RDH. Furthermore, the evaluation results show that the visual
quality can be preserved after a considerable amount of mes-
sage bits have been embedded into the contrast-enhanced im-
ages, even better than three specific MATLAB functions used
for image contrast enhancement.
The rest of this letter is organized as follows. Section II
presents the details of the proposed RDH algorithm featured
by contrast enhancement. The experimental results are given in
Section III. Finally, a conclusion is drawn in Section IV.
1070-9908 © 2014 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
www.redpel.com+917620593389
www.redpel.com+917620593389
82 IEEE SIGNAL PROCESSING LETTERS, VOL. 22, NO. 1, JANUARY 2015
II. RDH ALGORITHM WITH CONTRAST ENHANCEMENT
A. Data Embedding by Histogram Modification
The algorithm to be presented is primarily for gray-level
images but can be easily extended to color images. Given
an 8-bit gray-level image , the image histogram can be
calculated by counting the pixels with a gray-level value
for . We use to denote the image
histogram so that represents the number of pixels with a
value . Suppose consists of different pixel values. Then
there are nonempty bins in , from which the two peaks (i.e.
the highest two bins) are chosen and the corresponding smaller
and bigger values are denoted by and , respectively. For a
pixel counted in with value , data embedding is performed
by
(1)
where is the modified pixel value, and is the -th message
bit (0 or 1) to be hidden. By applying Eq. (1) to every pixel
counted in , totally binary values are em-
bedded. Given that there is no bounding value (0 or 255) in
(otherwise pre-process is needed), there will be bins in
the modified histogram. That is, the bins between the two peaks
are unchanged while the outer ones are shifted outward so that
each of the peaks can be split into two adjacent bins (i.e.
and , and , respectively).
The peak values and need to be provided to extract the
embedded data. One way to keep them is to exclude 16 pixels
in from histogram computing. The least significant bits (LSB)
of those pixels are collected and included in the binary values
to be hidden. After applying Eq. (1) to each pixel counted in
for data embedding, the values of and (each with 8 bits)
are used to replace the LSBs of the 16 excluded pixels by bit-
wise operation. To extract the embedded data, the peak values
need to be retrieved and the histogram of the marked image
is calculated excluding the 16 pixels aforementioned. Then the
following operation is performed on any pixel counted in the
histogram and with the value of , , or :
(2)
where is the -th binary value extracted from the marked
image . The extraction operations are performed in the same
order as that of the embedding operations. According to Eq. (1),
the following operation is performed on every pixel counted in
the histogram to recover its original value:
(3)
The original LSBs of 16 excluded pixels are obtained from the
extracted binary values. The excluded pixels can be restored by
writing them back so as to recover the original image.
B. Pre-Process for Complete Recovery
In the aforementioned algorithm, it is required that all pixels
counted in are within . If there is any bounding
pixel value (0 or 255), overflow or underflow will be caused
by histogram shifting. To avoid it, the histogram needs to be
pre-processed prior to the histogram modification operations.
Specifically, the pixel values of 0 and 255 are modified to 1 and
254, respectively. Therefore, no overflow or underflow will be
caused because the possible change of each pixel value is .
To memorize the pre-processed pixels, a location map with the
same size as the original image is generated by assigning 1 to the
location of a modified pixel, and 0 to that of an unchanged one
(including the 16 excluded pixels). The location map can be pre-
computed and included into the binary values to be hidden. In
the extraction and recovery process, it can be obtained from the
data extracted from the marked image so that the pixels modified
in the pre-process can be identified. By restoring the original
values of those pixels accordingly, the original image can be
completely recovered.
C. Contrast Enhancement
In Section II-A, each of the two peaks in the histogram is split
into two adjacent bins with the similar or same heights because
the numbers of 0s and 1s in the message bits are required to
be almost equal. To increase the hiding rate, the highest two
bins in the modified histogram are further chosen to be split
by applying Eq. (1) to all pixels counted in the histogram. The
same process can be repeated by splitting each of the two peaks
into two adjacent bins with the similar heights to achieve the
histogram equalization effect. In this way, data embedding and
contrast enhancement are simultaneously performed. Given that
the pair number of the histogram peaks to be split is , the range
of pixel values from 0 to are added by while the pixels
from to 255 are subtracted by in the pre-process
(noting L is a positive integer). A location map is generated by
assigning 1s to the modified pixels, and 0s to the others.
The location map can be pre-computed and compressed to be
firstly embedded into the host image. The value of , the size of
the compressed location map, and the previous peak values, in
contrary, are embedded with the last two peaks to be split, whose
values are stored in the LSBs of the 16 excluded pixels. In the
extraction process, the last split peak values are retrieved and
the data embedded with them are extracted with Eq. (2). After
restoring the histogram with Eq. (3), the data embedded with
the previously split peaks can also be extracted by processing
them pair by pair. At last, the location map is obtained from
the extracted data to identify the pixel values modified in the
pre-process.
D. Procedure of the Proposed Algorithm
The procedure of the proposed algorithm is illustrated in
Fig. 1. Given that totally pairs of histogram bins are to be
split for data embedding, the embedding procedure includes
the following steps:
1) Pre-process: The pixels in the range of and
are processed as mentioned in Section II-C
excluding the first 16 pixels in the bottom row. A loca-
tion map is generated to record the locations of those pixels
www.redpel.com+917620593389
www.redpel.com+917620593389
WU et al.: REVERSIBLE IMAGE DATA HIDING WITH CONTRAST ENHANCEMENT 83
and compressed by the JBIG2 standard [11] to reduce its
length.
2) The image histogram is calculated without counting the
first 16 pixels in the bottom row.
3) Embedding: The two peaks (i.e. the highest two bins) in the
histogram are split for data embedding by applying Eq. (1)
to every pixel counted in the histogram. Then the two peaks
in the modified histogram are chosen to be split, and so on
until pairs are split. The bitstream of the compressed lo-
cation map is embedded before the message bits (binary
values). The value of , the length of the compressed loca-
tion map, the LSBs collected from the 16 excluded pixels,
and the previous peak values are embedded with the last
two peaks to be split.
4) The lastly split peak values are used to replace the LSBs of
the 16 excluded pixels to form the marked image.
The extraction and recovery process include the following
steps:
1) The LSBs of the 16 excluded pixels are retrieved so that
the values of the last two split peaks are known.
2) The data embedded with the last two split peaks are ex-
tracted by using Eq. (2) so that the value of , the length
of the compressed location map, the original LSBs of 16
excluded pixels, and the previously split peak values are
known. Then the recovery operations are carried out by
processing all pixels except the 16 excluded ones with
Eq. (3). The process of extraction and recovery is repeated
until all of the split peaks are restored and the data em-
bedded with them are extracted.
3) The compressed location map is obtained from the ex-
tracted binary values and decompressed to the original size.
4) With the decompressed map, those pixels modified in pre-
process are identified. Among them, a pixel value is sub-
tracted by if it is less than 128, or increased by other-
wise. To comply with this rule, the maximum value of
is 64 to avoid ambiguity. At last, the original image is re-
covered by writing back the original LSBs of 16 excluded
pixels.
III. EXPERIMENTAL RESULTS
In the experiments, 8 USC-SIPI test images with the size
of [12] and 24 Kodak test images with the size of
[13] were employed and converted into grey-level
images. The only parameter in the proposed algorithm is , i.e.
the pair number of histogram peaks to be split. The message
bits to be hidden can be any string of binary values in which the
numbers of 0s and 1s are almost equal, or some extra bits can
be appended to make so. As shown in Fig. 2, the pure hiding
rates were generally increased by using more histogram peaks
for data embedding. For all test images, blind extraction and
complete recovery were achieved for any . When
64 pairs of histogram peaks were split, the pure hiding rate was
1.536 bit per pixel (bpp) for F-16, 0.732 bpp for Baboon, and av-
eragely 1.085 bpp for the 8 USC-SIPI images, while the average
for the 24 Kodak images was 1.194 bpp. It should be noted that
the hiding rates were calculated by subtracting the bit number
Fig. 1. Procedure of the proposed RDH algorithm.
Fig. 2. The hiding rates generally increase with the number of histogram peaks
used for data embedding.
of the side information for recovery (including the compressed
location map) from the total amount of the embedded bits.
The original and marked images of “Lena” and “Goldhill”
are shown in Fig. 3 and Fig. 4, respectively. The marked im-
ages were obtained by splitting 10, 15 and 20 pairs of histogram
peaks for data embedding, respectively. It can be seen that the
embedded data were invisible in the contrast-enhanced images.
The more histogram peaks were split for data embedding, the
more contrast enhancement effect was obtained. Although the
PSNR value of the contrast-enhanced images decrease with the
data hiding rate, the visual quality has been preserved, as shown
in Fig. 3 and Fig. 4.
Besides the PSNR value, the relative contrast error (RCE),
relative entropy error (REE), relative mean brightness error
(RMBE) and relative structural similarity (RSS) used in [14]
were calculated between the original and contrast-enhanced
images to evaluate the enhancement effect and image quality.
The RCE and REE values greater than 0.5 indicate the enhanced
contrast and increased image data, respectively. The less dif-
ference in mean brightness from the original image, the closer
RMBE is to 1. The greater the structural similarity between
them, the closer RSS is to 1. We further compare the proposed
algorithm with three MATLAB functions used for image con-
trast enhancement, i.e. imadjust, histeq, and adapthisteq. The
MATLAB routines were applied on each test image with the
default settings. For each of the contrast-enhanced images, the
five evaluation values were calculated, including RCE, REE,
RMBE, RSS and PSNR.
Table I and Table II show the statistical results of two sets of
test images, respectively. Each item listed in the two tables is
the mean of 8 or 24 test images. The proposed algorithm using
10, 15 and 20 pairs of histogram peaks are denoted by Prop.10p,
www.redpel.com+917620593389
www.redpel.com+917620593389
84 IEEE SIGNAL PROCESSING LETTERS, VOL. 22, NO. 1, JANUARY 2015
Fig. 3. The original and contrast-enhanced images of “Lena” by splitting 10, 15
and 20 pairs of histogram peaks in the proposed algorithm. (a) Original image
of “Lena”. (b) 10 pairs: 0.185 bpp, 29.10 dB. (c) 15 pairs: 0.268 bpp, 25.97 dB.
(d) 20 pairs: 0.345 bpp, 24.91 dB.
Fig. 4. The original and contrast-enhanced images of “Goldhill” by splitting
10, 15 and 20 pairs of histogram peaks in the proposed algorithm. (a) Original
image of “Goldhill”. (b) 10 pairs: 0.299 bpp, 30.64 dB. (c) 15 pairs: 0.411 bpp,
26.92 dB. (d) 20 pairs: 0.506 bpp, 24.64 dB.
Prop.15p and Prop.20p, respectively. It can be seen that the con-
trast of test images was gradually enhanced by splitting more
histogram peaks in the proposed algorithm but more differences
were introduced in brightness and structural similarity. With
Prop.20p, the obtained RCEs are lower than those of imadjust
and histeq, but higher than adapthisteq, indicating more con-
trast enhancement effect was obtained than adapthisteq. Mean-
while, the obtained REE values indicate that image data have
TABLE I
STATISTICAL EVALUATION (MEAN) OF 8 USC-SIPI IMAGES
TABLE II
STATISTICAL EVALUATION (MEAN) OF 524 KODAK IMAGES
been increased by our proposed algorithm and adapthisteq, but
decreased by imadjust and histeq. As for the RMBE and RSS
values, Prop.20p outperformed all of the three MATLAB func-
tions, indicating that less changes were made to image bright-
ness and structural similarity. Besides the higher PSNR values,
the original image can be directly recovered from the contrast-
enhanced image generated with the proposed algorithm. So it
is more advantageous than the three MATLAB functions for
image contrast enhancement.
IV. CONCLUSION
In this letter, a new reversible data hiding algorithm has been
proposed with the property of contrast enhancement. Basically,
the two peaks (i.e. the highest two bins) in the histogram are
selected for data embedding so that histogram equalization can
be simultaneously performed by repeating the process. The
experimental results have shown that the image contrast can
be enhanced by splitting a number of histogram peaks pair
by pair. Compared with the special MATLAB functions, the
visual quality of the contrast-enhanced images generated by
our algorithm is better preserved. Moreover, the original image
can be exactly recovered without any additional information.
Hence the proposed algorithm has made the image contrast
enhancement reversible. Improving the algorithm robustness,
and applying it to the medical and satellite images for the better
visibility, will be our future work.
ACKNOWLEDGMENT
The authors would like to sincerely thank the editors and
anonymous reviewers for their valuable comments.
www.redpel.com+917620593389
www.redpel.com+917620593389
WU et al.: REVERSIBLE IMAGE DATA HIDING WITH CONTRAST ENHANCEMENT 85
REFERENCES
[1] J. Tian, “Reversible data embedding using a difference expansion,”
IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896,
Aug. 2003.
[2] Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE
Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, Mar.
2006.
[3] D. M. Thodi and J. J. Rodriguez, “Expansion embedding techniques for
reversible watermarking,” IEEE Trans. Image Process., vol. 16, no. 3,
pp. 721–730, Mar. 2007.
[4] D. Coltuc and J.-M. Chassery, “Very fast watermarking by reversible
contrast mapping,” IEEE Signal Process. Lett., vol. 14, no. 4, pp.
255–258, Apr. 2007.
[5] V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y. Q. Shi, “Reversible
watermarking algorithm using sorting and prediction,” IEEE Trans.
Circuits Syst. Video Technol., vol. 19, no. 7, pp. 989–999, Jul. 2009.
[6] X. Li, B. Yang, and T. Zeng, “Efficient reversible watermarking based
on adaptive prediction-error expansion and pixel selection,” IEEE
Trans. Image Process., vol. 20, no. 12, pp. 3524–3533, Jan. 2011.
[7] Z. Zhao, H. Luo, Z.-M. Lu, and J.-S. Pan, “Reversible data hiding based
on multilevel histogram modification and sequential recovery,” Int. J.
Electron. Commun. (AEÜ), vol. 65, pp. 814–826, 2011.
[8] H. T. Wu and J. Huang, “Reversible image watermarking on prediction
error by efficient histogram modification,” Signal Process., vol. 92, no.
12, pp. 3000–3009, Dec. 2012.
[9] Y. Yang, X. Sun, H. Yang, C.-T. Li, and R. Xiao, “A contrast-sensitive
reversible visible image watermarking technique,” IEEE Trans. Cir-
cuits Syst. Video Technol., vol. 19, no. 5, pp. 656–667, May 2009.
[10] J. A. Stark, “Adaptive image contrast enhancement using generaliza-
tions of histogram equalization,” IEEE Trans. Image Process., vol. 9,
no. 5, pp. 889–896, May 2000.
[11] P. G. Howard, F. Kossentini, B. Martins, S. Forchhammer, and W. J.
Rucklidge, “The emerging JBIG2 standard,” IEEE Trans. Circuits Syst.
Video Technol., vol. 8, no. 7, pp. 838–848, Jul. 1998.
[12] The USC-SIPI Image Database [Online]. Available: http://sipi.usc.edu/
database/
[13] Kodak Lossless True Color Image Suite [Online]. Available: http://
www.r0k.us/graphics/kodak/
[14] M.-Z. Gao, Z.-G. Wu, and L. Wang, “Comprehensive evaluation for HE
based contrast enhancement techniques,” Adv. Intell. Syst. Applicat.,
vol. 2, pp. 331–338, 2013.
www.redpel.com+917620593389
www.redpel.com+917620593389

Mais conteúdo relacionado

Mais procurados

Modified clahe an adaptive algorithm for contrast enhancement of aerial medi...
Modified clahe an adaptive algorithm for contrast enhancement of aerial  medi...Modified clahe an adaptive algorithm for contrast enhancement of aerial  medi...
Modified clahe an adaptive algorithm for contrast enhancement of aerial medi...IAEME Publication
 
A comparative study of histogram equalization based image enhancement techniq...
A comparative study of histogram equalization based image enhancement techniq...A comparative study of histogram equalization based image enhancement techniq...
A comparative study of histogram equalization based image enhancement techniq...sipij
 
An enhanced difference pair mapping steganography method to improve embedding...
An enhanced difference pair mapping steganography method to improve embedding...An enhanced difference pair mapping steganography method to improve embedding...
An enhanced difference pair mapping steganography method to improve embedding...eSAT Publishing House
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Use of horizontal and vertical edge processing technique to improve number pl...
Use of horizontal and vertical edge processing technique to improve number pl...Use of horizontal and vertical edge processing technique to improve number pl...
Use of horizontal and vertical edge processing technique to improve number pl...eSAT Journals
 
OBTAINING SUPER-RESOLUTION IMAGES BY COMBINING LOW-RESOLUTION IMAGES WITH HIG...
OBTAINING SUPER-RESOLUTION IMAGES BY COMBINING LOW-RESOLUTION IMAGES WITH HIG...OBTAINING SUPER-RESOLUTION IMAGES BY COMBINING LOW-RESOLUTION IMAGES WITH HIG...
OBTAINING SUPER-RESOLUTION IMAGES BY COMBINING LOW-RESOLUTION IMAGES WITH HIG...ijcsit
 
An Efficient Approach for Image Enhancement Based on Image Fusion with Retine...
An Efficient Approach for Image Enhancement Based on Image Fusion with Retine...An Efficient Approach for Image Enhancement Based on Image Fusion with Retine...
An Efficient Approach for Image Enhancement Based on Image Fusion with Retine...ijsrd.com
 
IRJET- Satellite Image Resolution Enhancement using Dual-tree Complex Wav...
IRJET-  	  Satellite Image Resolution Enhancement using Dual-tree Complex Wav...IRJET-  	  Satellite Image Resolution Enhancement using Dual-tree Complex Wav...
IRJET- Satellite Image Resolution Enhancement using Dual-tree Complex Wav...IRJET Journal
 
Project report_DTRL_subrat
Project report_DTRL_subratProject report_DTRL_subrat
Project report_DTRL_subratSubrat Prasad
 
Quality Assessment of Gray and Color Images through Image Fusion Technique
Quality Assessment of Gray and Color Images through Image Fusion TechniqueQuality Assessment of Gray and Color Images through Image Fusion Technique
Quality Assessment of Gray and Color Images through Image Fusion TechniqueIJEEE
 
COLOUR IMAGE ENHANCEMENT BASED ON HISTOGRAM EQUALIZATION
COLOUR IMAGE ENHANCEMENT BASED ON HISTOGRAM EQUALIZATIONCOLOUR IMAGE ENHANCEMENT BASED ON HISTOGRAM EQUALIZATION
COLOUR IMAGE ENHANCEMENT BASED ON HISTOGRAM EQUALIZATIONecij
 
Modified CSLBP
Modified CSLBPModified CSLBP
Modified CSLBPIJECEIAES
 
Improved Weighted Least Square Filter Based Pan Sharpening using Fuzzy Logic
Improved Weighted Least Square Filter Based Pan Sharpening using Fuzzy LogicImproved Weighted Least Square Filter Based Pan Sharpening using Fuzzy Logic
Improved Weighted Least Square Filter Based Pan Sharpening using Fuzzy LogicIRJET Journal
 
Image Resolution Enhancement using DWT and Spatial Domain Interpolation Techn...
Image Resolution Enhancement using DWT and Spatial Domain Interpolation Techn...Image Resolution Enhancement using DWT and Spatial Domain Interpolation Techn...
Image Resolution Enhancement using DWT and Spatial Domain Interpolation Techn...IJERA Editor
 
Image resolution enhancement by using wavelet transform 2
Image resolution enhancement by using wavelet transform 2Image resolution enhancement by using wavelet transform 2
Image resolution enhancement by using wavelet transform 2IAEME Publication
 
Satellite Image Enhancement Using Dual Tree Complex Wavelet Transform
Satellite Image Enhancement Using Dual Tree Complex Wavelet TransformSatellite Image Enhancement Using Dual Tree Complex Wavelet Transform
Satellite Image Enhancement Using Dual Tree Complex Wavelet TransformjournalBEEI
 

Mais procurados (20)

C010231217
C010231217C010231217
C010231217
 
D046022629
D046022629D046022629
D046022629
 
Modified clahe an adaptive algorithm for contrast enhancement of aerial medi...
Modified clahe an adaptive algorithm for contrast enhancement of aerial  medi...Modified clahe an adaptive algorithm for contrast enhancement of aerial  medi...
Modified clahe an adaptive algorithm for contrast enhancement of aerial medi...
 
A comparative study of histogram equalization based image enhancement techniq...
A comparative study of histogram equalization based image enhancement techniq...A comparative study of histogram equalization based image enhancement techniq...
A comparative study of histogram equalization based image enhancement techniq...
 
An enhanced difference pair mapping steganography method to improve embedding...
An enhanced difference pair mapping steganography method to improve embedding...An enhanced difference pair mapping steganography method to improve embedding...
An enhanced difference pair mapping steganography method to improve embedding...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
337
337337
337
 
Use of horizontal and vertical edge processing technique to improve number pl...
Use of horizontal and vertical edge processing technique to improve number pl...Use of horizontal and vertical edge processing technique to improve number pl...
Use of horizontal and vertical edge processing technique to improve number pl...
 
OBTAINING SUPER-RESOLUTION IMAGES BY COMBINING LOW-RESOLUTION IMAGES WITH HIG...
OBTAINING SUPER-RESOLUTION IMAGES BY COMBINING LOW-RESOLUTION IMAGES WITH HIG...OBTAINING SUPER-RESOLUTION IMAGES BY COMBINING LOW-RESOLUTION IMAGES WITH HIG...
OBTAINING SUPER-RESOLUTION IMAGES BY COMBINING LOW-RESOLUTION IMAGES WITH HIG...
 
An Efficient Approach for Image Enhancement Based on Image Fusion with Retine...
An Efficient Approach for Image Enhancement Based on Image Fusion with Retine...An Efficient Approach for Image Enhancement Based on Image Fusion with Retine...
An Efficient Approach for Image Enhancement Based on Image Fusion with Retine...
 
IRJET- Satellite Image Resolution Enhancement using Dual-tree Complex Wav...
IRJET-  	  Satellite Image Resolution Enhancement using Dual-tree Complex Wav...IRJET-  	  Satellite Image Resolution Enhancement using Dual-tree Complex Wav...
IRJET- Satellite Image Resolution Enhancement using Dual-tree Complex Wav...
 
Project report_DTRL_subrat
Project report_DTRL_subratProject report_DTRL_subrat
Project report_DTRL_subrat
 
Quality Assessment of Gray and Color Images through Image Fusion Technique
Quality Assessment of Gray and Color Images through Image Fusion TechniqueQuality Assessment of Gray and Color Images through Image Fusion Technique
Quality Assessment of Gray and Color Images through Image Fusion Technique
 
COLOUR IMAGE ENHANCEMENT BASED ON HISTOGRAM EQUALIZATION
COLOUR IMAGE ENHANCEMENT BASED ON HISTOGRAM EQUALIZATIONCOLOUR IMAGE ENHANCEMENT BASED ON HISTOGRAM EQUALIZATION
COLOUR IMAGE ENHANCEMENT BASED ON HISTOGRAM EQUALIZATION
 
Modified CSLBP
Modified CSLBPModified CSLBP
Modified CSLBP
 
Improved Weighted Least Square Filter Based Pan Sharpening using Fuzzy Logic
Improved Weighted Least Square Filter Based Pan Sharpening using Fuzzy LogicImproved Weighted Least Square Filter Based Pan Sharpening using Fuzzy Logic
Improved Weighted Least Square Filter Based Pan Sharpening using Fuzzy Logic
 
50120140501016
5012014050101650120140501016
50120140501016
 
Image Resolution Enhancement using DWT and Spatial Domain Interpolation Techn...
Image Resolution Enhancement using DWT and Spatial Domain Interpolation Techn...Image Resolution Enhancement using DWT and Spatial Domain Interpolation Techn...
Image Resolution Enhancement using DWT and Spatial Domain Interpolation Techn...
 
Image resolution enhancement by using wavelet transform 2
Image resolution enhancement by using wavelet transform 2Image resolution enhancement by using wavelet transform 2
Image resolution enhancement by using wavelet transform 2
 
Satellite Image Enhancement Using Dual Tree Complex Wavelet Transform
Satellite Image Enhancement Using Dual Tree Complex Wavelet TransformSatellite Image Enhancement Using Dual Tree Complex Wavelet Transform
Satellite Image Enhancement Using Dual Tree Complex Wavelet Transform
 

Semelhante a Reversible Image Contrast Enhancement

Efficient Reversible Data Hiding Algorithms Based on Dual Prediction
Efficient Reversible Data Hiding Algorithms Based on Dual PredictionEfficient Reversible Data Hiding Algorithms Based on Dual Prediction
Efficient Reversible Data Hiding Algorithms Based on Dual Predictionsipij
 
Ijarcet vol-2-issue-7-2319-2322
Ijarcet vol-2-issue-7-2319-2322Ijarcet vol-2-issue-7-2319-2322
Ijarcet vol-2-issue-7-2319-2322Editor IJARCET
 
MODIFIED HISTOGRAM EQUALIZATION FOR IMAGE CONTRAST ENHANCEMENT USING PARTICLE...
MODIFIED HISTOGRAM EQUALIZATION FOR IMAGE CONTRAST ENHANCEMENT USING PARTICLE...MODIFIED HISTOGRAM EQUALIZATION FOR IMAGE CONTRAST ENHANCEMENT USING PARTICLE...
MODIFIED HISTOGRAM EQUALIZATION FOR IMAGE CONTRAST ENHANCEMENT USING PARTICLE...ijcseit
 
MODIFIED HISTOGRAM EQUALIZATION FOR IMAGE CONTRAST ENHANCEMENT USING PARTICLE...
MODIFIED HISTOGRAM EQUALIZATION FOR IMAGE CONTRAST ENHANCEMENT USING PARTICLE...MODIFIED HISTOGRAM EQUALIZATION FOR IMAGE CONTRAST ENHANCEMENT USING PARTICLE...
MODIFIED HISTOGRAM EQUALIZATION FOR IMAGE CONTRAST ENHANCEMENT USING PARTICLE...ijcseit
 
ANALYSIS OF IMAGE ENHANCEMENT TECHNIQUES USING MATLAB
ANALYSIS OF IMAGE ENHANCEMENT TECHNIQUES USING MATLABANALYSIS OF IMAGE ENHANCEMENT TECHNIQUES USING MATLAB
ANALYSIS OF IMAGE ENHANCEMENT TECHNIQUES USING MATLABJim Jimenez
 
Performance analysis of high resolution images using interpolation techniques...
Performance analysis of high resolution images using interpolation techniques...Performance analysis of high resolution images using interpolation techniques...
Performance analysis of high resolution images using interpolation techniques...sipij
 
Contrast enhancement using various statistical operations and neighborhood pr...
Contrast enhancement using various statistical operations and neighborhood pr...Contrast enhancement using various statistical operations and neighborhood pr...
Contrast enhancement using various statistical operations and neighborhood pr...sipij
 
MULTIPLE REGION OF INTEREST TRACKING OF NON-RIGID OBJECTS USING DEMON'S ALGOR...
MULTIPLE REGION OF INTEREST TRACKING OF NON-RIGID OBJECTS USING DEMON'S ALGOR...MULTIPLE REGION OF INTEREST TRACKING OF NON-RIGID OBJECTS USING DEMON'S ALGOR...
MULTIPLE REGION OF INTEREST TRACKING OF NON-RIGID OBJECTS USING DEMON'S ALGOR...cscpconf
 
Multiple region of interest tracking of non rigid objects using demon's algor...
Multiple region of interest tracking of non rigid objects using demon's algor...Multiple region of interest tracking of non rigid objects using demon's algor...
Multiple region of interest tracking of non rigid objects using demon's algor...csandit
 
HUMAN VISION THRESHOLDING WITH ENHANCEMENT FOR DARK BLURRED IMAGES FOR LOCAL ...
HUMAN VISION THRESHOLDING WITH ENHANCEMENT FOR DARK BLURRED IMAGES FOR LOCAL ...HUMAN VISION THRESHOLDING WITH ENHANCEMENT FOR DARK BLURRED IMAGES FOR LOCAL ...
HUMAN VISION THRESHOLDING WITH ENHANCEMENT FOR DARK BLURRED IMAGES FOR LOCAL ...cscpconf
 
Novel Iterative Back Projection Approach
Novel Iterative Back Projection ApproachNovel Iterative Back Projection Approach
Novel Iterative Back Projection ApproachIOSR Journals
 
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...IRJET Journal
 
Image Denoising by using Modified SGHP Algorithm
Image Denoising by using Modified SGHP Algorithm Image Denoising by using Modified SGHP Algorithm
Image Denoising by using Modified SGHP Algorithm IJECEIAES
 
Analysis of Cholesterol Quantity Detection and ANN Classification
Analysis of Cholesterol Quantity Detection and ANN ClassificationAnalysis of Cholesterol Quantity Detection and ANN Classification
Analysis of Cholesterol Quantity Detection and ANN ClassificationIJCSIS Research Publications
 
Icamme managed brightness and contrast enhancement using adapted histogram eq...
Icamme managed brightness and contrast enhancement using adapted histogram eq...Icamme managed brightness and contrast enhancement using adapted histogram eq...
Icamme managed brightness and contrast enhancement using adapted histogram eq...Jagan Rampalli
 
High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...IAEME Publication
 

Semelhante a Reversible Image Contrast Enhancement (20)

Efficient Reversible Data Hiding Algorithms Based on Dual Prediction
Efficient Reversible Data Hiding Algorithms Based on Dual PredictionEfficient Reversible Data Hiding Algorithms Based on Dual Prediction
Efficient Reversible Data Hiding Algorithms Based on Dual Prediction
 
Ijarcet vol-2-issue-7-2319-2322
Ijarcet vol-2-issue-7-2319-2322Ijarcet vol-2-issue-7-2319-2322
Ijarcet vol-2-issue-7-2319-2322
 
MODIFIED HISTOGRAM EQUALIZATION FOR IMAGE CONTRAST ENHANCEMENT USING PARTICLE...
MODIFIED HISTOGRAM EQUALIZATION FOR IMAGE CONTRAST ENHANCEMENT USING PARTICLE...MODIFIED HISTOGRAM EQUALIZATION FOR IMAGE CONTRAST ENHANCEMENT USING PARTICLE...
MODIFIED HISTOGRAM EQUALIZATION FOR IMAGE CONTRAST ENHANCEMENT USING PARTICLE...
 
MODIFIED HISTOGRAM EQUALIZATION FOR IMAGE CONTRAST ENHANCEMENT USING PARTICLE...
MODIFIED HISTOGRAM EQUALIZATION FOR IMAGE CONTRAST ENHANCEMENT USING PARTICLE...MODIFIED HISTOGRAM EQUALIZATION FOR IMAGE CONTRAST ENHANCEMENT USING PARTICLE...
MODIFIED HISTOGRAM EQUALIZATION FOR IMAGE CONTRAST ENHANCEMENT USING PARTICLE...
 
ANALYSIS OF IMAGE ENHANCEMENT TECHNIQUES USING MATLAB
ANALYSIS OF IMAGE ENHANCEMENT TECHNIQUES USING MATLABANALYSIS OF IMAGE ENHANCEMENT TECHNIQUES USING MATLAB
ANALYSIS OF IMAGE ENHANCEMENT TECHNIQUES USING MATLAB
 
I07015261
I07015261I07015261
I07015261
 
Performance analysis of high resolution images using interpolation techniques...
Performance analysis of high resolution images using interpolation techniques...Performance analysis of high resolution images using interpolation techniques...
Performance analysis of high resolution images using interpolation techniques...
 
Contrast enhancement using various statistical operations and neighborhood pr...
Contrast enhancement using various statistical operations and neighborhood pr...Contrast enhancement using various statistical operations and neighborhood pr...
Contrast enhancement using various statistical operations and neighborhood pr...
 
H010315356
H010315356H010315356
H010315356
 
MULTIPLE REGION OF INTEREST TRACKING OF NON-RIGID OBJECTS USING DEMON'S ALGOR...
MULTIPLE REGION OF INTEREST TRACKING OF NON-RIGID OBJECTS USING DEMON'S ALGOR...MULTIPLE REGION OF INTEREST TRACKING OF NON-RIGID OBJECTS USING DEMON'S ALGOR...
MULTIPLE REGION OF INTEREST TRACKING OF NON-RIGID OBJECTS USING DEMON'S ALGOR...
 
Multiple region of interest tracking of non rigid objects using demon's algor...
Multiple region of interest tracking of non rigid objects using demon's algor...Multiple region of interest tracking of non rigid objects using demon's algor...
Multiple region of interest tracking of non rigid objects using demon's algor...
 
HUMAN VISION THRESHOLDING WITH ENHANCEMENT FOR DARK BLURRED IMAGES FOR LOCAL ...
HUMAN VISION THRESHOLDING WITH ENHANCEMENT FOR DARK BLURRED IMAGES FOR LOCAL ...HUMAN VISION THRESHOLDING WITH ENHANCEMENT FOR DARK BLURRED IMAGES FOR LOCAL ...
HUMAN VISION THRESHOLDING WITH ENHANCEMENT FOR DARK BLURRED IMAGES FOR LOCAL ...
 
Novel Iterative Back Projection Approach
Novel Iterative Back Projection ApproachNovel Iterative Back Projection Approach
Novel Iterative Back Projection Approach
 
K01116569
K01116569K01116569
K01116569
 
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
 
Image Denoising by using Modified SGHP Algorithm
Image Denoising by using Modified SGHP Algorithm Image Denoising by using Modified SGHP Algorithm
Image Denoising by using Modified SGHP Algorithm
 
Analysis of Cholesterol Quantity Detection and ANN Classification
Analysis of Cholesterol Quantity Detection and ANN ClassificationAnalysis of Cholesterol Quantity Detection and ANN Classification
Analysis of Cholesterol Quantity Detection and ANN Classification
 
Icamme managed brightness and contrast enhancement using adapted histogram eq...
Icamme managed brightness and contrast enhancement using adapted histogram eq...Icamme managed brightness and contrast enhancement using adapted histogram eq...
Icamme managed brightness and contrast enhancement using adapted histogram eq...
 
High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...
 
557 480-486
557 480-486557 480-486
557 480-486
 

Mais de redpel dot com

An efficient tree based self-organizing protocol for internet of things
An efficient tree based self-organizing protocol for internet of thingsAn efficient tree based self-organizing protocol for internet of things
An efficient tree based self-organizing protocol for internet of thingsredpel dot com
 
Validation of pervasive cloud task migration with colored petri net
Validation of pervasive cloud task migration with colored petri netValidation of pervasive cloud task migration with colored petri net
Validation of pervasive cloud task migration with colored petri netredpel dot com
 
Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...
Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...
Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...redpel dot com
 
Towards a virtual domain based authentication on mapreduce
Towards a virtual domain based authentication on mapreduceTowards a virtual domain based authentication on mapreduce
Towards a virtual domain based authentication on mapreduceredpel dot com
 
Toward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architectureToward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architectureredpel dot com
 
Protection of big data privacy
Protection of big data privacyProtection of big data privacy
Protection of big data privacyredpel dot com
 
Privacy preserving and delegated access control for cloud applications
Privacy preserving and delegated access control for cloud applicationsPrivacy preserving and delegated access control for cloud applications
Privacy preserving and delegated access control for cloud applicationsredpel dot com
 
Performance evaluation and estimation model using regression method for hadoo...
Performance evaluation and estimation model using regression method for hadoo...Performance evaluation and estimation model using regression method for hadoo...
Performance evaluation and estimation model using regression method for hadoo...redpel dot com
 
Frequency and similarity aware partitioning for cloud storage based on space ...
Frequency and similarity aware partitioning for cloud storage based on space ...Frequency and similarity aware partitioning for cloud storage based on space ...
Frequency and similarity aware partitioning for cloud storage based on space ...redpel dot com
 
Multiagent multiobjective interaction game system for service provisoning veh...
Multiagent multiobjective interaction game system for service provisoning veh...Multiagent multiobjective interaction game system for service provisoning veh...
Multiagent multiobjective interaction game system for service provisoning veh...redpel dot com
 
Efficient multicast delivery for data redundancy minimization over wireless d...
Efficient multicast delivery for data redundancy minimization over wireless d...Efficient multicast delivery for data redundancy minimization over wireless d...
Efficient multicast delivery for data redundancy minimization over wireless d...redpel dot com
 
Cloud assisted io t-based scada systems security- a review of the state of th...
Cloud assisted io t-based scada systems security- a review of the state of th...Cloud assisted io t-based scada systems security- a review of the state of th...
Cloud assisted io t-based scada systems security- a review of the state of th...redpel dot com
 
I-Sieve: An inline High Performance Deduplication System Used in cloud storage
I-Sieve: An inline High Performance Deduplication System Used in cloud storageI-Sieve: An inline High Performance Deduplication System Used in cloud storage
I-Sieve: An inline High Performance Deduplication System Used in cloud storageredpel dot com
 
Bayes based arp attack detection algorithm for cloud centers
Bayes based arp attack detection algorithm for cloud centersBayes based arp attack detection algorithm for cloud centers
Bayes based arp attack detection algorithm for cloud centersredpel dot com
 
Architecture harmonization between cloud radio access network and fog network
Architecture harmonization between cloud radio access network and fog networkArchitecture harmonization between cloud radio access network and fog network
Architecture harmonization between cloud radio access network and fog networkredpel dot com
 
Analysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingAnalysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingredpel dot com
 
An anomalous behavior detection model in cloud computing
An anomalous behavior detection model in cloud computingAn anomalous behavior detection model in cloud computing
An anomalous behavior detection model in cloud computingredpel dot com
 
A tutorial on secure outsourcing of large scalecomputation for big data
A tutorial on secure outsourcing of large scalecomputation for big dataA tutorial on secure outsourcing of large scalecomputation for big data
A tutorial on secure outsourcing of large scalecomputation for big dataredpel dot com
 
A parallel patient treatment time prediction algorithm and its applications i...
A parallel patient treatment time prediction algorithm and its applications i...A parallel patient treatment time prediction algorithm and its applications i...
A parallel patient treatment time prediction algorithm and its applications i...redpel dot com
 
A mobile offloading game against smart attacks
A mobile offloading game against smart attacksA mobile offloading game against smart attacks
A mobile offloading game against smart attacksredpel dot com
 

Mais de redpel dot com (20)

An efficient tree based self-organizing protocol for internet of things
An efficient tree based self-organizing protocol for internet of thingsAn efficient tree based self-organizing protocol for internet of things
An efficient tree based self-organizing protocol for internet of things
 
Validation of pervasive cloud task migration with colored petri net
Validation of pervasive cloud task migration with colored petri netValidation of pervasive cloud task migration with colored petri net
Validation of pervasive cloud task migration with colored petri net
 
Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...
Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...
Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...
 
Towards a virtual domain based authentication on mapreduce
Towards a virtual domain based authentication on mapreduceTowards a virtual domain based authentication on mapreduce
Towards a virtual domain based authentication on mapreduce
 
Toward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architectureToward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architecture
 
Protection of big data privacy
Protection of big data privacyProtection of big data privacy
Protection of big data privacy
 
Privacy preserving and delegated access control for cloud applications
Privacy preserving and delegated access control for cloud applicationsPrivacy preserving and delegated access control for cloud applications
Privacy preserving and delegated access control for cloud applications
 
Performance evaluation and estimation model using regression method for hadoo...
Performance evaluation and estimation model using regression method for hadoo...Performance evaluation and estimation model using regression method for hadoo...
Performance evaluation and estimation model using regression method for hadoo...
 
Frequency and similarity aware partitioning for cloud storage based on space ...
Frequency and similarity aware partitioning for cloud storage based on space ...Frequency and similarity aware partitioning for cloud storage based on space ...
Frequency and similarity aware partitioning for cloud storage based on space ...
 
Multiagent multiobjective interaction game system for service provisoning veh...
Multiagent multiobjective interaction game system for service provisoning veh...Multiagent multiobjective interaction game system for service provisoning veh...
Multiagent multiobjective interaction game system for service provisoning veh...
 
Efficient multicast delivery for data redundancy minimization over wireless d...
Efficient multicast delivery for data redundancy minimization over wireless d...Efficient multicast delivery for data redundancy minimization over wireless d...
Efficient multicast delivery for data redundancy minimization over wireless d...
 
Cloud assisted io t-based scada systems security- a review of the state of th...
Cloud assisted io t-based scada systems security- a review of the state of th...Cloud assisted io t-based scada systems security- a review of the state of th...
Cloud assisted io t-based scada systems security- a review of the state of th...
 
I-Sieve: An inline High Performance Deduplication System Used in cloud storage
I-Sieve: An inline High Performance Deduplication System Used in cloud storageI-Sieve: An inline High Performance Deduplication System Used in cloud storage
I-Sieve: An inline High Performance Deduplication System Used in cloud storage
 
Bayes based arp attack detection algorithm for cloud centers
Bayes based arp attack detection algorithm for cloud centersBayes based arp attack detection algorithm for cloud centers
Bayes based arp attack detection algorithm for cloud centers
 
Architecture harmonization between cloud radio access network and fog network
Architecture harmonization between cloud radio access network and fog networkArchitecture harmonization between cloud radio access network and fog network
Architecture harmonization between cloud radio access network and fog network
 
Analysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingAnalysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computing
 
An anomalous behavior detection model in cloud computing
An anomalous behavior detection model in cloud computingAn anomalous behavior detection model in cloud computing
An anomalous behavior detection model in cloud computing
 
A tutorial on secure outsourcing of large scalecomputation for big data
A tutorial on secure outsourcing of large scalecomputation for big dataA tutorial on secure outsourcing of large scalecomputation for big data
A tutorial on secure outsourcing of large scalecomputation for big data
 
A parallel patient treatment time prediction algorithm and its applications i...
A parallel patient treatment time prediction algorithm and its applications i...A parallel patient treatment time prediction algorithm and its applications i...
A parallel patient treatment time prediction algorithm and its applications i...
 
A mobile offloading game against smart attacks
A mobile offloading game against smart attacksA mobile offloading game against smart attacks
A mobile offloading game against smart attacks
 

Último

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 

Último (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 

Reversible Image Contrast Enhancement

  • 1. IEEE SIGNAL PROCESSING LETTERS, VOL. 22, NO. 1, JANUARY 2015 81 Reversible Image Data Hiding with Contrast Enhancement Hao-Tian Wu, Member, IEEE, Jean-Luc Dugelay, Fellow, IEEE, and Yun-Qing Shi, Fellow, IEEE Abstract—In this letter, a novel reversible data hiding (RDH) al- gorithm is proposed for digital images. Instead of trying to keep the PSNR value high, the proposed algorithm enhances the con- trast of a host image to improve its visual quality. The highest two bins in the histogram are selected for data embedding so that his- togram equalization can be performed by repeating the process. The side information is embedded along with the message bits into the host image so that the original image is completely recoverable. The proposed algorithm was implemented on two sets of images to demonstrate its efficiency. To our best knowledge, it is the first algo- rithm that achieves image contrast enhancement by RDH. Further- more, the evaluation results show that the visual quality can be pre- served after a considerable amount of message bits have been em- bedded into the contrast-enhanced images, even better than three specific MATLAB functions used for image contrast enhancement. Index Terms—Contrast enhancement, histogram modification, location map, reversible data hiding, visual quality. I. INTRODUCTION REVERSIBLE DATA HIDING (RDH) has been inten- sively studied in the community of signal processing. Also referred as invertible or lossless data hiding, RDH is to embed a piece of information into a host signal to generate the marked one, from which the original signal can be exactly recovered after extracting the embedded data. The technique of RDH is useful in some sensitive applications where no perma- nent change is allowed on the host signal. In the literature, most of the proposed algorithms are for digital images to embed invisible data (e.g. [1]–[8]) or a visible watermark (e.g. [9]). To evaluate the performance of a RDH algorithm, the hiding rate and the marked image quality are important metrics. There exists a trade-off between them because increasing the hiding rate often causes more distortion in image content. To measure the distortion, the peak signal-to-noise ratio (PSNR) value of the marked image is often calculated. Generally speaking, direct Manuscript received June 14, 2014; revised July 19, 2014; accepted August 01, 2014. Date of publication August 13, 2014; date of current version August 26, 2014. This work was supported in part by the NSFC under Grant 61100169 and by the Fundamental Research Funds for the Central Universities of China. The associate editor coordinating the review of this manuscript and approving it for publication was Prof. Jing-Ming Guo. H.-T. Wu is with School of Digital Media, Jiangnan University, Wuxi, JS 214122, China, on leave at the Polytechnic School of Engineering, New York University, Brooklyn, NY 11201 USA (with the support of China Scholarship Council) (e-mail: htwu@jiangnan.edu.cn). J.-L. Dugelay is with the Department of Multimedia Communications, EU- RECOM, F-06410 Biot, Sophia Antipolis, France (e-mail: jld@eurecom.fr). Y.-Q. Shi is with Department of Electrical and Computer Engineering, New Jersey Institute of Technology, Newark, NJ 07103 USA (e-mail: shi@njit.edu). Color versions of one or more of the figures in this paper are available online at http://ieeexplore.ieee.org. Digital Object Identifier 10.1109/LSP.2014.2346989 modification of image histogram [2] provides less embedding capacity. In contrast, the more recent algorithms (e.g. [5]–[8]) manipulate the more centrally distributed prediction errors by exploiting the correlations between neighboring pixels so that less distortion is caused by data hiding. Although the PSNR of a marked image generated with a pre- diction error based algorithm is kept high, the visual quality can hardly be improved because more or less distortion has been in- troduced by the embedding operations. For the images acquired with poor illumination, improving the visual quality is more im- portant than keeping the PSNR value high. Moreover, contrast enhancement of medical or satellite images is desired to show the details for visual inspection. Although the PSNR value of the enhanced image is often low, the visibility of image details has been improved. To our best knowledge, there is no existing RDH algorithm that performs the task of contrast enhancement so as to improve the visual quality of host images. So in this study, we aim at inventing a new RDH algorithm to achieve the property of contrast enhancement instead of just keeping the PSNR value high. In principle, image contrast enhancement can be achieved by histogram equalization [10]. To perform data embedding and contrast enhancement at the same time, the proposed algorithm is performed by modifying the histogram of pixel values. Firstly, the two peaks (i.e. the highest two bins) in the histogram are found out. The bins between the peaks are unchanged while the outer bins are shifted outward so that each of the two peaks can be split into two adjacent bins. To increase the embedding ca- pacity, the highest two bins in the modified histogram can be fur- ther chosen to be split, and so on until satisfactory contrast en- hancement effect is achieved. To avoid the overflows and under- flows due to histogram modification, the bounding pixel values are pre-processed and a location map is generated to memorize their locations. For the recovery of the original image, the lo- cation map is embedded into the host image, together with the message bits and other side information. So blind data extrac- tion and complete recovery of the original image are both en- abled. The proposed algorithm was applied to two set of im- ages to demonstrate its efficiency. To our best knowledge, it is the first algorithm that achieves image contrast enhancement by RDH. Furthermore, the evaluation results show that the visual quality can be preserved after a considerable amount of mes- sage bits have been embedded into the contrast-enhanced im- ages, even better than three specific MATLAB functions used for image contrast enhancement. The rest of this letter is organized as follows. Section II presents the details of the proposed RDH algorithm featured by contrast enhancement. The experimental results are given in Section III. Finally, a conclusion is drawn in Section IV. 1070-9908 © 2014 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. www.redpel.com+917620593389 www.redpel.com+917620593389
  • 2. 82 IEEE SIGNAL PROCESSING LETTERS, VOL. 22, NO. 1, JANUARY 2015 II. RDH ALGORITHM WITH CONTRAST ENHANCEMENT A. Data Embedding by Histogram Modification The algorithm to be presented is primarily for gray-level images but can be easily extended to color images. Given an 8-bit gray-level image , the image histogram can be calculated by counting the pixels with a gray-level value for . We use to denote the image histogram so that represents the number of pixels with a value . Suppose consists of different pixel values. Then there are nonempty bins in , from which the two peaks (i.e. the highest two bins) are chosen and the corresponding smaller and bigger values are denoted by and , respectively. For a pixel counted in with value , data embedding is performed by (1) where is the modified pixel value, and is the -th message bit (0 or 1) to be hidden. By applying Eq. (1) to every pixel counted in , totally binary values are em- bedded. Given that there is no bounding value (0 or 255) in (otherwise pre-process is needed), there will be bins in the modified histogram. That is, the bins between the two peaks are unchanged while the outer ones are shifted outward so that each of the peaks can be split into two adjacent bins (i.e. and , and , respectively). The peak values and need to be provided to extract the embedded data. One way to keep them is to exclude 16 pixels in from histogram computing. The least significant bits (LSB) of those pixels are collected and included in the binary values to be hidden. After applying Eq. (1) to each pixel counted in for data embedding, the values of and (each with 8 bits) are used to replace the LSBs of the 16 excluded pixels by bit- wise operation. To extract the embedded data, the peak values need to be retrieved and the histogram of the marked image is calculated excluding the 16 pixels aforementioned. Then the following operation is performed on any pixel counted in the histogram and with the value of , , or : (2) where is the -th binary value extracted from the marked image . The extraction operations are performed in the same order as that of the embedding operations. According to Eq. (1), the following operation is performed on every pixel counted in the histogram to recover its original value: (3) The original LSBs of 16 excluded pixels are obtained from the extracted binary values. The excluded pixels can be restored by writing them back so as to recover the original image. B. Pre-Process for Complete Recovery In the aforementioned algorithm, it is required that all pixels counted in are within . If there is any bounding pixel value (0 or 255), overflow or underflow will be caused by histogram shifting. To avoid it, the histogram needs to be pre-processed prior to the histogram modification operations. Specifically, the pixel values of 0 and 255 are modified to 1 and 254, respectively. Therefore, no overflow or underflow will be caused because the possible change of each pixel value is . To memorize the pre-processed pixels, a location map with the same size as the original image is generated by assigning 1 to the location of a modified pixel, and 0 to that of an unchanged one (including the 16 excluded pixels). The location map can be pre- computed and included into the binary values to be hidden. In the extraction and recovery process, it can be obtained from the data extracted from the marked image so that the pixels modified in the pre-process can be identified. By restoring the original values of those pixels accordingly, the original image can be completely recovered. C. Contrast Enhancement In Section II-A, each of the two peaks in the histogram is split into two adjacent bins with the similar or same heights because the numbers of 0s and 1s in the message bits are required to be almost equal. To increase the hiding rate, the highest two bins in the modified histogram are further chosen to be split by applying Eq. (1) to all pixels counted in the histogram. The same process can be repeated by splitting each of the two peaks into two adjacent bins with the similar heights to achieve the histogram equalization effect. In this way, data embedding and contrast enhancement are simultaneously performed. Given that the pair number of the histogram peaks to be split is , the range of pixel values from 0 to are added by while the pixels from to 255 are subtracted by in the pre-process (noting L is a positive integer). A location map is generated by assigning 1s to the modified pixels, and 0s to the others. The location map can be pre-computed and compressed to be firstly embedded into the host image. The value of , the size of the compressed location map, and the previous peak values, in contrary, are embedded with the last two peaks to be split, whose values are stored in the LSBs of the 16 excluded pixels. In the extraction process, the last split peak values are retrieved and the data embedded with them are extracted with Eq. (2). After restoring the histogram with Eq. (3), the data embedded with the previously split peaks can also be extracted by processing them pair by pair. At last, the location map is obtained from the extracted data to identify the pixel values modified in the pre-process. D. Procedure of the Proposed Algorithm The procedure of the proposed algorithm is illustrated in Fig. 1. Given that totally pairs of histogram bins are to be split for data embedding, the embedding procedure includes the following steps: 1) Pre-process: The pixels in the range of and are processed as mentioned in Section II-C excluding the first 16 pixels in the bottom row. A loca- tion map is generated to record the locations of those pixels www.redpel.com+917620593389 www.redpel.com+917620593389
  • 3. WU et al.: REVERSIBLE IMAGE DATA HIDING WITH CONTRAST ENHANCEMENT 83 and compressed by the JBIG2 standard [11] to reduce its length. 2) The image histogram is calculated without counting the first 16 pixels in the bottom row. 3) Embedding: The two peaks (i.e. the highest two bins) in the histogram are split for data embedding by applying Eq. (1) to every pixel counted in the histogram. Then the two peaks in the modified histogram are chosen to be split, and so on until pairs are split. The bitstream of the compressed lo- cation map is embedded before the message bits (binary values). The value of , the length of the compressed loca- tion map, the LSBs collected from the 16 excluded pixels, and the previous peak values are embedded with the last two peaks to be split. 4) The lastly split peak values are used to replace the LSBs of the 16 excluded pixels to form the marked image. The extraction and recovery process include the following steps: 1) The LSBs of the 16 excluded pixels are retrieved so that the values of the last two split peaks are known. 2) The data embedded with the last two split peaks are ex- tracted by using Eq. (2) so that the value of , the length of the compressed location map, the original LSBs of 16 excluded pixels, and the previously split peak values are known. Then the recovery operations are carried out by processing all pixels except the 16 excluded ones with Eq. (3). The process of extraction and recovery is repeated until all of the split peaks are restored and the data em- bedded with them are extracted. 3) The compressed location map is obtained from the ex- tracted binary values and decompressed to the original size. 4) With the decompressed map, those pixels modified in pre- process are identified. Among them, a pixel value is sub- tracted by if it is less than 128, or increased by other- wise. To comply with this rule, the maximum value of is 64 to avoid ambiguity. At last, the original image is re- covered by writing back the original LSBs of 16 excluded pixels. III. EXPERIMENTAL RESULTS In the experiments, 8 USC-SIPI test images with the size of [12] and 24 Kodak test images with the size of [13] were employed and converted into grey-level images. The only parameter in the proposed algorithm is , i.e. the pair number of histogram peaks to be split. The message bits to be hidden can be any string of binary values in which the numbers of 0s and 1s are almost equal, or some extra bits can be appended to make so. As shown in Fig. 2, the pure hiding rates were generally increased by using more histogram peaks for data embedding. For all test images, blind extraction and complete recovery were achieved for any . When 64 pairs of histogram peaks were split, the pure hiding rate was 1.536 bit per pixel (bpp) for F-16, 0.732 bpp for Baboon, and av- eragely 1.085 bpp for the 8 USC-SIPI images, while the average for the 24 Kodak images was 1.194 bpp. It should be noted that the hiding rates were calculated by subtracting the bit number Fig. 1. Procedure of the proposed RDH algorithm. Fig. 2. The hiding rates generally increase with the number of histogram peaks used for data embedding. of the side information for recovery (including the compressed location map) from the total amount of the embedded bits. The original and marked images of “Lena” and “Goldhill” are shown in Fig. 3 and Fig. 4, respectively. The marked im- ages were obtained by splitting 10, 15 and 20 pairs of histogram peaks for data embedding, respectively. It can be seen that the embedded data were invisible in the contrast-enhanced images. The more histogram peaks were split for data embedding, the more contrast enhancement effect was obtained. Although the PSNR value of the contrast-enhanced images decrease with the data hiding rate, the visual quality has been preserved, as shown in Fig. 3 and Fig. 4. Besides the PSNR value, the relative contrast error (RCE), relative entropy error (REE), relative mean brightness error (RMBE) and relative structural similarity (RSS) used in [14] were calculated between the original and contrast-enhanced images to evaluate the enhancement effect and image quality. The RCE and REE values greater than 0.5 indicate the enhanced contrast and increased image data, respectively. The less dif- ference in mean brightness from the original image, the closer RMBE is to 1. The greater the structural similarity between them, the closer RSS is to 1. We further compare the proposed algorithm with three MATLAB functions used for image con- trast enhancement, i.e. imadjust, histeq, and adapthisteq. The MATLAB routines were applied on each test image with the default settings. For each of the contrast-enhanced images, the five evaluation values were calculated, including RCE, REE, RMBE, RSS and PSNR. Table I and Table II show the statistical results of two sets of test images, respectively. Each item listed in the two tables is the mean of 8 or 24 test images. The proposed algorithm using 10, 15 and 20 pairs of histogram peaks are denoted by Prop.10p, www.redpel.com+917620593389 www.redpel.com+917620593389
  • 4. 84 IEEE SIGNAL PROCESSING LETTERS, VOL. 22, NO. 1, JANUARY 2015 Fig. 3. The original and contrast-enhanced images of “Lena” by splitting 10, 15 and 20 pairs of histogram peaks in the proposed algorithm. (a) Original image of “Lena”. (b) 10 pairs: 0.185 bpp, 29.10 dB. (c) 15 pairs: 0.268 bpp, 25.97 dB. (d) 20 pairs: 0.345 bpp, 24.91 dB. Fig. 4. The original and contrast-enhanced images of “Goldhill” by splitting 10, 15 and 20 pairs of histogram peaks in the proposed algorithm. (a) Original image of “Goldhill”. (b) 10 pairs: 0.299 bpp, 30.64 dB. (c) 15 pairs: 0.411 bpp, 26.92 dB. (d) 20 pairs: 0.506 bpp, 24.64 dB. Prop.15p and Prop.20p, respectively. It can be seen that the con- trast of test images was gradually enhanced by splitting more histogram peaks in the proposed algorithm but more differences were introduced in brightness and structural similarity. With Prop.20p, the obtained RCEs are lower than those of imadjust and histeq, but higher than adapthisteq, indicating more con- trast enhancement effect was obtained than adapthisteq. Mean- while, the obtained REE values indicate that image data have TABLE I STATISTICAL EVALUATION (MEAN) OF 8 USC-SIPI IMAGES TABLE II STATISTICAL EVALUATION (MEAN) OF 524 KODAK IMAGES been increased by our proposed algorithm and adapthisteq, but decreased by imadjust and histeq. As for the RMBE and RSS values, Prop.20p outperformed all of the three MATLAB func- tions, indicating that less changes were made to image bright- ness and structural similarity. Besides the higher PSNR values, the original image can be directly recovered from the contrast- enhanced image generated with the proposed algorithm. So it is more advantageous than the three MATLAB functions for image contrast enhancement. IV. CONCLUSION In this letter, a new reversible data hiding algorithm has been proposed with the property of contrast enhancement. Basically, the two peaks (i.e. the highest two bins) in the histogram are selected for data embedding so that histogram equalization can be simultaneously performed by repeating the process. The experimental results have shown that the image contrast can be enhanced by splitting a number of histogram peaks pair by pair. Compared with the special MATLAB functions, the visual quality of the contrast-enhanced images generated by our algorithm is better preserved. Moreover, the original image can be exactly recovered without any additional information. Hence the proposed algorithm has made the image contrast enhancement reversible. Improving the algorithm robustness, and applying it to the medical and satellite images for the better visibility, will be our future work. ACKNOWLEDGMENT The authors would like to sincerely thank the editors and anonymous reviewers for their valuable comments. www.redpel.com+917620593389 www.redpel.com+917620593389
  • 5. WU et al.: REVERSIBLE IMAGE DATA HIDING WITH CONTRAST ENHANCEMENT 85 REFERENCES [1] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, Aug. 2003. [2] Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, Mar. 2006. [3] D. M. Thodi and J. J. Rodriguez, “Expansion embedding techniques for reversible watermarking,” IEEE Trans. Image Process., vol. 16, no. 3, pp. 721–730, Mar. 2007. [4] D. Coltuc and J.-M. Chassery, “Very fast watermarking by reversible contrast mapping,” IEEE Signal Process. Lett., vol. 14, no. 4, pp. 255–258, Apr. 2007. [5] V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y. Q. Shi, “Reversible watermarking algorithm using sorting and prediction,” IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 7, pp. 989–999, Jul. 2009. [6] X. Li, B. Yang, and T. Zeng, “Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection,” IEEE Trans. Image Process., vol. 20, no. 12, pp. 3524–3533, Jan. 2011. [7] Z. Zhao, H. Luo, Z.-M. Lu, and J.-S. Pan, “Reversible data hiding based on multilevel histogram modification and sequential recovery,” Int. J. Electron. Commun. (AEÜ), vol. 65, pp. 814–826, 2011. [8] H. T. Wu and J. Huang, “Reversible image watermarking on prediction error by efficient histogram modification,” Signal Process., vol. 92, no. 12, pp. 3000–3009, Dec. 2012. [9] Y. Yang, X. Sun, H. Yang, C.-T. Li, and R. Xiao, “A contrast-sensitive reversible visible image watermarking technique,” IEEE Trans. Cir- cuits Syst. Video Technol., vol. 19, no. 5, pp. 656–667, May 2009. [10] J. A. Stark, “Adaptive image contrast enhancement using generaliza- tions of histogram equalization,” IEEE Trans. Image Process., vol. 9, no. 5, pp. 889–896, May 2000. [11] P. G. Howard, F. Kossentini, B. Martins, S. Forchhammer, and W. J. Rucklidge, “The emerging JBIG2 standard,” IEEE Trans. Circuits Syst. Video Technol., vol. 8, no. 7, pp. 838–848, Jul. 1998. [12] The USC-SIPI Image Database [Online]. Available: http://sipi.usc.edu/ database/ [13] Kodak Lossless True Color Image Suite [Online]. Available: http:// www.r0k.us/graphics/kodak/ [14] M.-Z. Gao, Z.-G. Wu, and L. Wang, “Comprehensive evaluation for HE based contrast enhancement techniques,” Adv. Intell. Syst. Applicat., vol. 2, pp. 331–338, 2013. www.redpel.com+917620593389 www.redpel.com+917620593389