JSEA  Vol.2 No.1 , April 2009
Data Hiding Method with Quality Control for Binary Images
Secret data hiding in binary images is more difficult than other formats since binary images require only one bit repre-sentation to indicate black and white. This study proposes a new method for data hiding in binary images using opti-mized bit position to replace a secret bit. This method manipulates blocks, which are sub-divided. The parity bit for a specified block decides whether to change or not, to embed a secret bit. By finding the best position to insert a secret bit for each divided block, the image quality of the resulting stego-image can be improved, while maintaining low computational complexity. The experimental results show that the proposed method has an improvement with respect to a previous work.

Cite this paper
nullK. Jung and K. Yoo, "Data Hiding Method with Quality Control for Binary Images," Journal of Software Engineering and Applications, Vol. 2 No. 1, 2009, pp. 20-24. doi: 10.4236/jsea.2009.21003.
[1]   H. Liang, W. Ran, and X. Nie, “A secure and high capac-ity scheme for binary images,” Proceedings of the ICWAPR, pp. 224-229, 2007.

[2]   K. Matsui and K. Tanaka, “Video-steganography: How to secretly embed a signature in a picture,” Proceedings IMA Intellectual Property Project, pp. 187-206, 1994.

[3]   S. H. Low, N. F. Maxemchuk, and A. M. Lapone, “Document identification for copyright protection using centroid detection,” IEEE Transactions on Communications, pp. 372-383, 1998.

[4]   J. T. Brassil, S. H. Low, and N. F. Maxemchuk, “Copyright protection for the electronic distribution of text docu-ments,” Proceedings of IEEE, pp. 1181-1196, 1999.

[5]   E. Koch and J. Zhao, “Embedding robust labels into im-ages for copyright protection,” Proceedings of the Inter-national Congress on Intellectual Property Rights for Spe-cialized Information, Knowledge & New Technologies, 1995.

[6]   M. Wu, E. Tang, and B. Liu, “Data hiding in digital binary images,” IEEE International Conference on Multimedia & Expo, 2000.

[7]   C. Liu, Y. Dai, and Z. Wang, “A novel information hiding method in binary images,” Journal of Southeast University, 2003.

[8]   M. Wu and B. Liu, “Data hiding in binary image for au-thentication and annotation,” IEEE Transations on Mul-timedia, pp. 528-538, 2004.

[9]   M. Venkatesan, P. Meenakshidevi, K. Duraiswamy, and K. Thiagarajah, “A new data hiding scheme with quality control for binary images using block parity,” 3rd Inter. Symposium on Information Assurance and Security, pp. 468-471, 2007.

[10]   H. Yang and A. C. Kot, “Pattern-based data hiding for binary image authentication by connectivity-preserving,” IEEE Transactions on Multimedia, Vol. 9, No. 3, pp. 475-486, 2007.

[11]   J. Chen and T. S. Chen, “A new data hiding method in binary images,” Proceedings of 4th International Symposium on Multimedia Software Engineering, pp. 88-93, 2003.

[12]   H. B. Zhang and L. Man, “Data hiding in binary line drawing images,” Wavelet Analysis and Pattern Recognition, ICWAPR, pp. 134-140, 2008.

[13]   Y. J. Chang and J. C. Lin, “Data hiding using VQ index file,” Intelligence and Security Informatics, ISI 2008, pp. 230-232, 2008.

[14]   H. Gou and M. Wu, “Improving embedding payload in binary images with super-pixels,” Image Processing, ICIP 2007, pp. 277-280, 2007.

[15]   S. Huang and J. K. Wu, “Optical watermarking for printed document authentication,” Information Forensics and Security, Vol. 2, pp. 164-173, 2007.

[16]   K. H. Jung, K. S. Ha, and K. Y. Yoo, “Data hiding in binary images by pixel-value weighting,” Convergence and Hybrid Information Technology, ICHIT 2008. pp. 262-265, 2008.

[17]   A. M. Attar, O. Taheri, S. Sadri, and A. F. Rasoul, “Data hiding in halftone images using error diffusion halftoning with adaptive thresholding,” Electrical and Computer Engineering, CCECE 2006, pp. 2029-2032, 2006.