ICIP '97 Proceedings of the 1997 International Conference on Image Processing (ICIP '97) 3-Volume Set-Volume 3 - Volume 3
Document marking and identification using both line and word shifting
INFOCOM '95 Proceedings of the Fourteenth Annual Joint Conference of the IEEE Computer and Communication Societies (Vol. 2)-Volume - Volume 2
A novel image-hiding scheme based on block difference
Pattern Recognition
Data hiding in binary image for authentication and annotation
IEEE Transactions on Multimedia
A region and data hiding based error concealment scheme for images
IEEE Transactions on Consumer Electronics
Electronic marking and identification techniques to discourage document copying
IEEE Journal on Selected Areas in Communications
Differential block coding of bilevel images
IEEE Transactions on Image Processing
IEEE Transactions on Circuits and Systems for Video Technology
An efficient pattern substitution watermarking method for binary images
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
A technique of embedding digital data in an image compression code reversibly
Proceedings of the 4th International Conference on Uniquitous Information Management and Communication
Hi-index | 0.00 |
Data hiding, as the term itself suggests, means the hiding of secret data in a cover image. The result is a so-called stego-image. Reversible data hiding is technique, where not only the secret data can be extracted from the stego-image, but the cover image can be completely rebuilt after the extraction of secret data. Therefore, reversible data hiding is the choice in cases of secret data hiding, where the recovery of the cover image is required. In this paper, we propose a high-capacity reversible data hiding scheme based on pattern substitution. Our scheme gathers statistical data concerning the occurrence frequencies of various patterns and quantifies the occurrence frequency as it differs from pattern to pattern. In this way, some pattern exchange relationships can be established, and pattern substitution can thus be used for data hiding. In the extraction stage, we reverse these patterns to their original forms and rebuild an undistorted cover image. Our experimental results demonstrate the practicability of the proposed method. In fact, our new scheme gives a better performance than pair-wise logical computation (PWLC) in terms of both hiding capacity and stego-image visual quality.