Data hiding for text document image authentication by connectivity-preserving

被引:0
|
作者
Yang, HJ [1 ]
Kot, AC [1 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, a novel blind data hiding method for text document images aims to preserve the connectivity in a local neighborhood is proposed. The "flippability" of a pixel is determined by imposing the three transition criterions in a 3 x 3 moving window which is centered at the pixel. The "embeddability" of a block is invariant in the watermark embedding process. While the "flipped" pixels can be located by imposing a constraint. The "uneven embeddability" of the host image is considered by embedding the watermark only in those "embeddable" blocks. The location is chosen in such a way that the visual quality of the watermarked image is guaranteed. Different types of blocks are employed and their abilities to increase the capacity are compared. A hard authenticator watermark is also generated to ensure the integrity and authenticity of the document.
引用
收藏
页码:505 / 508
页数:4
相关论文
共 50 条
  • [21] Connectivity-Preserving Rendezvous for Networked Lagrange Systems with Actuator Faults
    Feng, Zhi
    Hu, Guoqiang
    2017 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND BIOMIMETICS (IEEE ROBIO 2017), 2017, : 1363 - 1368
  • [22] Connectivity-preserving consensus: An adaptive event-triggered strategy
    Guo, Tiantian
    Liu, Yungang
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2024, 34 (06) : 3912 - 3928
  • [23] Sampled-Data Connectivity-Preserving Consensus for Multiple Heterogeneous Euler-Lagrange Systems
    Chen, Chen
    Gao, Xingyu
    Zhang, Haiying
    Zou, Wencheng
    Xiang, Zhengrong
    IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2025, 22 : 6619 - 6630
  • [24] Generation of Connectivity-Preserving Surface Models of Multiple Sclerosis Lesions
    Meruvia-Pastor, Oscar
    Xiao, Mei
    Soh, Jung
    Sensen, Christoph W.
    MEDICINE MEETS VIRTUAL REALITY 18, 2011, 163 : 359 - 365
  • [25] A duality theorem for two connectivity-preserving parallel shrinking transformations
    Umeo, H
    Mauri, G
    FUTURE GENERATION COMPUTER SYSTEMS, 2002, 18 (07) : 931 - 937
  • [26] Masking based Data Hiding and Image Authentication Technique (MDHIAT)
    Ghoshal, Nabin
    Sarkar, A.
    Chakraborty, D.
    Ghosh, S.
    Mandal, J. K.
    ADCOM: 2008 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, 2008, : 119 - +
  • [27] Lossless Data Hiding Based on Histogram Modification for Image Authentication
    Chang, Chin-Chen
    Tai, Wei-Liang
    Chen, Kuo-Nan
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 1, MAIN CONFERENCE, 2008, : 506 - +
  • [28] Passive Multiuser Teleoperation of a Multirobot System With Connectivity-Preserving Containment
    Yang, Yuan
    Constantinescu, Daniela
    Shi, Yang
    IEEE TRANSACTIONS ON ROBOTICS, 2022, 38 (01) : 209 - 228
  • [29] Robust Image Data Hiding designed for Semi-Fragile Image Authentication
    Geetamma, T.
    Seventline, J. Beatrice
    2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO), 2015,
  • [30] A new data hiding scheme for binary image authentication with small image distortion
    Lee, Younho
    Kim, Heeyoul
    Park, Yongsu
    INFORMATION SCIENCES, 2009, 179 (22) : 3866 - 3884