Data hiding for text document image authentication by connectivity-preserving

被引:0
|
作者
Yang, HJ [1 ]
Kot, AC [1 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
来源
2005 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1-5: SPEECH PROCESSING | 2005年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, a novel blind data hiding method for text document images aims to preserve the connectivity in a local neighborhood is proposed. The "flippability" of a pixel is determined by imposing the three transition criterions in a 3 x 3 moving window which is centered at the pixel. The "embeddability" of a block is invariant in the watermark embedding process. While the "flipped" pixels can be located by imposing a constraint. The "uneven embeddability" of the host image is considered by embedding the watermark only in those "embeddable" blocks. The location is chosen in such a way that the visual quality of the watermarked image is guaranteed. Different types of blocks are employed and their abilities to increase the capacity are compared. A hard authenticator watermark is also generated to ensure the integrity and authenticity of the document.
引用
收藏
页码:505 / 508
页数:4
相关论文
共 50 条
  • [41] EAG: Edge Adaptive Grid Data Hiding for Binary Image Authentication
    Cao, Hong
    Kot, Alex C.
    2012 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2012,
  • [42] A content-based image authentication system with lossless data hiding
    Zou, DK
    Wu, CW
    Xuan, GR
    Shi, YQ
    2003 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL II, PROCEEDINGS, 2003, : 213 - 216
  • [43] Robust lossless image data hiding designed for semi-fragile image authentication
    Ni, Zhicheng
    Shi, Yun Q.
    Ansari, Nirwan
    Su, Wei
    Sun, Qibin
    Lin, Xiao
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2008, 18 (04) : 497 - 509
  • [44] A duality in two connectivity-preserving parallel shrinking algorithms for binary images
    Umeo, H
    Mauri, G
    THEORETICAL AND PRACTICAL ISSUES ON CELLULAR AUTOMATA, 2001, : 144 - 151
  • [45] Decentralized, connectivity-preserving, and cost-effective structured overlay maintenance
    Chen, Yu
    Chen, Wei
    STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS, PROCEEDINGS, 2007, 4838 : 97 - 113
  • [46] Protocols for data-hiding based text document security and automatic processing
    Deguillaume, F
    Rytsar, Y
    Voloshynovskiy, S
    Pun, T
    2005 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME), VOLS 1 AND 2, 2005, : 25 - 28
  • [47] Decentralized Connectivity-Preserving Deployment of Large-Scale Robot Swarms
    Majcherczyk, Nathalie
    Jayabalan, Adhavan
    Beltrame, Giovanni
    Pinciroli, Carlo
    2018 IEEE/RSJ INTERNATIONAL CONFERENCE ON INTELLIGENT ROBOTS AND SYSTEMS (IROS), 2018, : 4295 - 4302
  • [48] Print-scan invariant text image watermarking for hardcopy document authentication
    Tan, Lina
    Hu, Kai
    Zhou, Xinmin
    Chen, Rongyuan
    Jiang, Weijin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (10) : 13189 - 13211
  • [49] Print-scan invariant text image watermarking for hardcopy document authentication
    Lina Tan
    Kai Hu
    Xinmin Zhou
    Rongyuan Chen
    Weijin Jiang
    Multimedia Tools and Applications, 2019, 78 : 13189 - 13211
  • [50] Reversible data hiding with enhancing contrast and preserving brightness in medical image
    Shi, Ming
    Yang, Yang
    Meng, Jian
    Zhang, Weiming
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 70