Cart (Loading....) | Create Account
Close category search window
 

Reversible Data-Hiding Scheme for 2-D Vector Maps Based on Difference Expansion

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Wang, Xiaotong ; Dept. of Navig., Dalian Naval Acad., Dalian ; ChengYong Shao ; Xu, Xiaogang ; XiaMu Niu

Reversible watermarking is suitable for hiding data in 2-D vector maps because the distortions induced by data embedding can be removed after extracting the hidden bits. In this paper, two reversible data-hiding schemes are explored based on the idea of difference expansion. The first scheme takes the coordinates of vertices as the cover data and hides data by modifying the differences between the adjacent coordinates. The scheme achieves high capacity in the maps with highly correlated coordinates. Instead of the raw coordinates, the second scheme adopts the manhattan distances between neighbor vertices as the cover data. A set of invertible integer mappings is defined to extract manhattan distances from coordinates and the hidden data are embedded by modifying the differences between the adjacent distances. For those maps where distances exhibit high correlation, this scheme shows better performance than the former one, both in capacity and invisibility. Three different maps with distinct features are used for the experiments. The results indicate that two proposed schemes suit different types of maps, respectively, according to the correlation of the selected cover data. Both schemes are strictly reversible. In addition, they can be slightly robust for low amplitude distortions by selecting higher digits for data hiding. The potential applications of proposed schemes may include map data authentication, secret communication, etc.

Published in:

Information Forensics and Security, IEEE Transactions on  (Volume:2 ,  Issue: 3 )

Date of Publication:

Sept. 2007

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.