EAG: Edge Adaptive Grid Data Hiding for Binary Image Authentication

被引:0
|
作者
Cao, Hong [1 ]
Kot, Alex C. [2 ]
机构
[1] ASTAR, Inst Infocomm Res, Singapore, Singapore
[2] Nanyang Technol Univ, Singapore, Singapore
关键词
DISTORTION MEASURE; WATERMARKING;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proposes a novel data hiding method for authenticating binary images through establishing dense edge adaptive grids (EAG) for invariantly selecting good data carrying pixel locations (DCPL). Our method employs dynamic system structure with carefully designed local content adaptive processes (CAP) to iteratively trace new contour segments and to search for new DCPLs. By maintaining and updating a location status map, we re-design the fundamental content adaptive switch and a protection mechanism is proposed to preserve the local CAPs' contexts as well as their corresponding outcomes. Different from existing contour-based methods, our method addresses a key interference issue and has unprecedentedly demonstrated to invariantly select a same sequence of DCPLs for an arbitrary binary host image and its marked versions for our contour-tracing based hiding method. Comparison also shows that our method achieves better trade-off between large capacity and good perceptional quality as compared with several prior works for representative binary text and cartoon images.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Robust and secured image-adaptive data hiding
    Mali, Suresh N.
    Patil, Pradeep M.
    Jalnekar, Rajesh M.
    DIGITAL SIGNAL PROCESSING, 2012, 22 (02) : 314 - 323
  • [22] Secure Data Pixels for Binary Host Images Using Edge-Adaptive Grid Technique
    Khan, Sofia
    Bhattacharya, Antara
    2015 GLOBAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (GCCT), 2015, : 679 - 683
  • [23] Data hiding method in binary images based on block masking for key authentication
    Jung, Ki-Hyun
    Yoo, Kee-Young
    INFORMATION SCIENCES, 2014, 277 : 188 - 196
  • [24] Digital Image Authentication Model Based on Edge Adaptive Steganography
    Grover, Nidhi
    Mohapatra, A. K.
    2013 SECOND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND SECURITY (ADCONS 2013), 2013, : 238 - 242
  • [25] Robust lossless image data hiding designed for semi-fragile image authentication
    Ni, Zhicheng
    Shi, Yun Q.
    Ansari, Nirwan
    Su, Wei
    Sun, Qibin
    Lin, Xiao
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2008, 18 (04) : 497 - 509
  • [26] Reversible data hiding in binary images based on image magnification
    Zhang, Fang
    Lu, Wei
    Liu, Hongmei
    Yeung, Yuileong
    Xue, Yingjie
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (15) : 21891 - 21915
  • [27] Reversible data hiding in binary images based on image magnification
    Fang Zhang
    Wei Lu
    Hongmei Liu
    Yuileong Yeung
    Yingjie Xue
    Multimedia Tools and Applications, 2019, 78 : 21891 - 21915
  • [28] Adaptive Image Encryption for High Capacity Reversible Data Hiding
    Choi, Ka-Cheng
    Pun, Chi-Man
    2017 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING, 2017, : 429 - 432
  • [29] Reversible Image Data Hiding with Local Adaptive Contrast Enhancement
    Jiang, Ruiqi
    Zhang, Weiming
    Xu, Jiajia
    Yu, Nenghai
    Hu, Xiaocheng
    ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING: FUTURETECH & MUE, 2016, 393 : 445 - 452
  • [30] Reversible data hiding for binary images based on adaptive overlapping pattern
    Keming Dong
    Hyoung Joong Kim
    Xiaohan Yu
    Xiaoqing Feng
    EURASIP Journal on Information Security, 2020