EAG: Edge Adaptive Grid Data Hiding for Binary Image Authentication

被引:0
|
作者
Cao, Hong [1 ]
Kot, Alex C. [2 ]
机构
[1] ASTAR, Inst Infocomm Res, Singapore, Singapore
[2] Nanyang Technol Univ, Singapore, Singapore
关键词
DISTORTION MEASURE; WATERMARKING;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proposes a novel data hiding method for authenticating binary images through establishing dense edge adaptive grids (EAG) for invariantly selecting good data carrying pixel locations (DCPL). Our method employs dynamic system structure with carefully designed local content adaptive processes (CAP) to iteratively trace new contour segments and to search for new DCPLs. By maintaining and updating a location status map, we re-design the fundamental content adaptive switch and a protection mechanism is proposed to preserve the local CAPs' contexts as well as their corresponding outcomes. Different from existing contour-based methods, our method addresses a key interference issue and has unprecedentedly demonstrated to invariantly select a same sequence of DCPLs for an arbitrary binary host image and its marked versions for our contour-tracing based hiding method. Comparison also shows that our method achieves better trade-off between large capacity and good perceptional quality as compared with several prior works for representative binary text and cartoon images.
引用
收藏
页数:6
相关论文
共 50 条
  • [11] Data Hiding in Binary Image with High Payload
    Ding, Wenjia
    Wang, Yulin
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (12) : 7737 - 7745
  • [12] Data hiding for binary images authentication by considering a larger neighborhood
    Yang, Huijuan
    Kot, Alex C.
    2007 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-11, 2007, : 1269 - 1272
  • [13] Data Hiding in Binary Image with High Payload
    Wenjia Ding
    Yulin Wang
    Arabian Journal for Science and Engineering, 2018, 43 : 7737 - 7745
  • [14] A new data hiding method in binary image
    Chen, J
    Chen, TS
    Cheng, MW
    IEEE FIFTH INTERNATIOANL SYMPOSIUM ON MULTIMEDIA SOFTWARE ENGINEERING, PROCEEDINGS, 2003, : 88 - 93
  • [15] Adaptive image steganography by reversible data hiding
    Liu, Guangjie
    Dai, Yuewei
    Wang, Zhiquan
    Shiguo, Lian
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND KNOWLEDGE ENGINEERING (ISKE 2007), 2007,
  • [16] Masking based Data Hiding and Image Authentication Technique (MDHIAT)
    Ghoshal, Nabin
    Sarkar, A.
    Chakraborty, D.
    Ghosh, S.
    Mandal, J. K.
    ADCOM: 2008 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, 2008, : 119 - +
  • [17] Lossless Data Hiding Based on Histogram Modification for Image Authentication
    Chang, Chin-Chen
    Tai, Wei-Liang
    Chen, Kuo-Nan
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 1, MAIN CONFERENCE, 2008, : 506 - +
  • [18] Robust Image Data Hiding designed for Semi-Fragile Image Authentication
    Geetamma, T.
    Seventline, J. Beatrice
    2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO), 2015,
  • [19] Data hiding for text document image authentication by connectivity-preserving
    Yang, HJ
    Kot, AC
    2005 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1-5: SPEECH PROCESSING, 2005, : 505 - 508
  • [20] A content-based image authentication system with lossless data hiding
    Zou, DK
    Wu, CW
    Xuan, GR
    Shi, YQ
    2003 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL II, PROCEEDINGS, 2003, : 213 - 216