EAG: Edge Adaptive Grid Data Hiding for Binary Image Authentication

被引:0
|
作者
Cao, Hong [1 ]
Kot, Alex C. [2 ]
机构
[1] ASTAR, Inst Infocomm Res, Singapore, Singapore
[2] Nanyang Technol Univ, Singapore, Singapore
关键词
DISTORTION MEASURE; WATERMARKING;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proposes a novel data hiding method for authenticating binary images through establishing dense edge adaptive grids (EAG) for invariantly selecting good data carrying pixel locations (DCPL). Our method employs dynamic system structure with carefully designed local content adaptive processes (CAP) to iteratively trace new contour segments and to search for new DCPLs. By maintaining and updating a location status map, we re-design the fundamental content adaptive switch and a protection mechanism is proposed to preserve the local CAPs' contexts as well as their corresponding outcomes. Different from existing contour-based methods, our method addresses a key interference issue and has unprecedentedly demonstrated to invariantly select a same sequence of DCPLs for an arbitrary binary host image and its marked versions for our contour-tracing based hiding method. Comparison also shows that our method achieves better trade-off between large capacity and good perceptional quality as compared with several prior works for representative binary text and cartoon images.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] On Establishing Edge Adaptive Grid for Bilevel Image Data Hiding
    Cao, Hong
    Kot, Alex C.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (09) : 1508 - 1518
  • [2] Data hiding in binary image for authentication and annotation
    Wu, M
    Liu, BD
    IEEE TRANSACTIONS ON MULTIMEDIA, 2004, 6 (04) : 528 - 538
  • [3] A new data hiding scheme for binary image authentication with small image distortion
    Lee, Younho
    Kim, Heeyoul
    Park, Yongsu
    INFORMATION SCIENCES, 2009, 179 (22) : 3866 - 3884
  • [4] Steganalysis of content-adaptive binary image data hiding
    Feng, Bingwen
    Weng, Jian
    Lu, Wei
    Pei, Bei
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2017, 46 : 119 - 127
  • [5] Pattern-based data hiding for binary image authentication by connectivity-preserving
    Yang, Huijuan
    Kot, Alex C.
    IEEE TRANSACTIONS ON MULTIMEDIA, 2007, 9 (03) : 475 - 486
  • [6] Data hiding in digital binary image
    Wu, M
    Tang, E
    Liu, BD
    2000 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, PROCEEDINGS VOLS I-III, 2000, : 393 - 396
  • [7] Secure data hiding in binary document images for authentication
    Lu, HP
    Kot, AC
    Cheng, J
    PROCEEDINGS OF THE 2003 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL III: GENERAL & NONLINEAR CIRCUITS AND SYSTEMS, 2003, : 806 - 809
  • [8] An algorithm of binary text image authentication based on information hiding
    Gao, Baojian
    Huang, Meiru
    Wang, Jun
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, : 894 - 899
  • [9] An adaptive data hiding technique for binary images
    Liu, TH
    Chang, LW
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, VOL 4, 2004, : 831 - 834
  • [10] A Novel Robust Data Hiding Scheme for Image Authentication
    Hsu, You-Hsiang
    Anistyasari, Yeni
    Chen, Yi-Hui
    Hua, Kai-Lung
    2015 ASIA PACIFIC CONFERENCE ON MULTIMEDIA AND BROADCASTING, 2015, : 27 - 32