A General Data Hiding Framework and Multi-level Signature for Binary Images
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Steganalysis of halftone image using inverse halftoning
Signal Processing
A new data hiding scheme for binary image authentication with small image distortion
Information Sciences: an International Journal
A novel adaptive steganography based on local complexity and human vision sensitivity
Journal of Systems and Software
Data hiding in images based on tolerable error range
ICICS'09 Proceedings of the 7th international conference on Information, communications and signal processing
Lossless data embedding in electronic inks
IEEE Transactions on Information Forensics and Security
International Journal of Electronic Security and Digital Forensics
Minority codes with improved embedding efficiency for large payloads
Multimedia Tools and Applications
An ASIC implementation of a low power robust invisible watermarking processor
Journal of Systems Architecture: the EUROMICRO Journal
Protecting the content integrity of digital imagery with fidelity preservation
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Exploring pixel-value differencing and base decomposition for low distortion data embedding
Applied Soft Computing
Hi-index | 0.00 |
In this paper, a novel blind data hiding method for binary images authentication aims at preserving the connectivity of pixels in a local neighborhood is proposed. The "flippability" of a pixel is determined by imposing three transition criteria in a 3 times 3 moving window centered at the pixel. The "embeddability" of a block is invariant in the watermark embedding process, hence the watermark can be extracted without referring to the original image. The "uneven embeddability" of the host image is handled by embedding the watermark only in those "embeddable" blocks. The locations are chosen in such a way that the visual quality of the watermarked image is guaranteed. Different types of blocks are studied and their abilities to increase the capacity are compared. The problem of how to locate the "embeddable" pixels in a block for different block schemes is addressed which facilitates the incorporation of the cryptographic signature as the hard authenticator watermark to ensure integrity and authenticity of the image. Discussions on the security considerations, visual quality against capacity, counter measures against steganalysis and analysis of the computational load are provided. Comparisons with prior methods show superiority of the proposed scheme