A fast pseudo random permutation generator with applications to cryptology
Proceedings of CRYPTO 84 on Advances in cryptology
How to construct pseudorandom permutations from pseudorandom functions
SIAM Journal on Computing - Special issue on cryptography
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
An information-theoretic model for steganography
Information and Computation
Multiuser-based shadow watermark extraction system
Information Sciences: an International Journal
A steganographic method based upon JPEG and particle swarm optimization algorithm
Information Sciences: an International Journal
A survey of watermarking algorithms for image authentication
EURASIP Journal on Applied Signal Processing
Joint coding and embedding techniques for multimedia images
Information Sciences: an International Journal
Message authentication on 64-bit architectures
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Alteration-locating authentication watermarking for binary images
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
Matrix embedding for large payloads
IEEE Transactions on Information Forensics and Security
Data hiding in binary image for authentication and annotation
IEEE Transactions on Multimedia
Pattern-Based Data Hiding for Binary Image Authentication by Connectivity-Preserving
IEEE Transactions on Multimedia
Objective Distortion Measure for Binary Text Image Based on Edge Line Segment Similarity
IEEE Transactions on Image Processing
Information Sciences: an International Journal
Reversible data hiding based on block median preservation
Information Sciences: an International Journal
Perceptually adaptive spread transform image watermarking scheme using Hadamard transform
Information Sciences: an International Journal
Meaningful secret sharing technique with authentication and remedy abilities
Information Sciences: an International Journal
Hiding data in parity check bit
Proceedings of the 4th International Conference on Uniquitous Information Management and Communication
Personalized information encryption using ECG signals with chaotic functions
Information Sciences: an International Journal
Adjustable prediction-based reversible data hiding
Digital Signal Processing
Information Sciences: an International Journal
Hi-index | 0.07 |
A new data hiding scheme for binary image authentication that has a small distortion of the cover image is proposed in this paper. Using the data-embedding algorithm that is based on Hamming codes, the proposed scheme embeds authentication information into the cover image with flipping only a small number of pixels. A special type of the pixels are selected and flipped by a new algorithm to minimize visual distortion. This new algorithm is based on ELSSM (Edge Line Segment Similarity Measure). Randomly shuffling the bit-order of the authentication information to be embedded, the information can only be extracted by the designated receiver who has the symmetric key. We employ two measurement metrics: miss detection rates for the degree of security and PSNR (Peak Signal-to-Noise Ratio) and ELSSM for the degree of the image distortion to demonstrate the feasibility of the proposed scheme. Using these metrics, we analyze the proposed scheme and the previous schemes. The analysis reveals that the proposed scheme requires less image distortion than the previous schemes whilst achieving the same level of the miss detection rate. Experimental results demonstrate that the proposed scheme is more resilient against recent steganalysis attacks than the previous schemes.