Back
 JSEA  Vol.2 No.1 , April 2009
Data Hiding Method with Quality Control for Binary Images
Abstract: Secret data hiding in binary images is more difficult than other formats since binary images require only one bit repre-sentation to indicate black and white. This study proposes a new method for data hiding in binary images using opti-mized bit position to replace a secret bit. This method manipulates blocks, which are sub-divided. The parity bit for a specified block decides whether to change or not, to embed a secret bit. By finding the best position to insert a secret bit for each divided block, the image quality of the resulting stego-image can be improved, while maintaining low computational complexity. The experimental results show that the proposed method has an improvement with respect to a previous work.
Cite this paper: nullK. Jung and K. Yoo, "Data Hiding Method with Quality Control for Binary Images," Journal of Software Engineering and Applications, Vol. 2 No. 1, 2009, pp. 20-24. doi: 10.4236/jsea.2009.21003.
References

[1]   H. Liang, W. Ran, and X. Nie, “A secure and high capac-ity scheme for binary images,” Proceedings of the ICWAPR, pp. 224-229, 2007.

[2]   K. Matsui and K. Tanaka, “Video-steganography: How to secretly embed a signature in a picture,” Proceedings IMA Intellectual Property Project, pp. 187-206, 1994.

[3]   S. H. Low, N. F. Maxemchuk, and A. M. Lapone, “Document identification for copyright protection using centroid detection,” IEEE Transactions on Communications, pp. 372-383, 1998.

[4]   J. T. Brassil, S. H. Low, and N. F. Maxemchuk, “Copyright protection for the electronic distribution of text docu-ments,” Proceedings of IEEE, pp. 1181-1196, 1999.

[5]   E. Koch and J. Zhao, “Embedding robust labels into im-ages for copyright protection,” Proceedings of the Inter-national Congress on Intellectual Property Rights for Spe-cialized Information, Knowledge & New Technologies, 1995.

[6]   M. Wu, E. Tang, and B. Liu, “Data hiding in digital binary images,” IEEE International Conference on Multimedia & Expo, 2000.

[7]   C. Liu, Y. Dai, and Z. Wang, “A novel information hiding method in binary images,” Journal of Southeast University, 2003.

[8]   M. Wu and B. Liu, “Data hiding in binary image for au-thentication and annotation,” IEEE Transations on Mul-timedia, pp. 528-538, 2004.

[9]   M. Venkatesan, P. Meenakshidevi, K. Duraiswamy, and K. Thiagarajah, “A new data hiding scheme with quality control for binary images using block parity,” 3rd Inter. Symposium on Information Assurance and Security, pp. 468-471, 2007.

[10]   H. Yang and A. C. Kot, “Pattern-based data hiding for binary image authentication by connectivity-preserving,” IEEE Transactions on Multimedia, Vol. 9, No. 3, pp. 475-486, 2007.

[11]   J. Chen and T. S. Chen, “A new data hiding method in binary images,” Proceedings of 4th International Symposium on Multimedia Software Engineering, pp. 88-93, 2003.

[12]   H. B. Zhang and L. Man, “Data hiding in binary line drawing images,” Wavelet Analysis and Pattern Recognition, ICWAPR, pp. 134-140, 2008.

[13]   Y. J. Chang and J. C. Lin, “Data hiding using VQ index file,” Intelligence and Security Informatics, ISI 2008, pp. 230-232, 2008.

[14]   H. Gou and M. Wu, “Improving embedding payload in binary images with super-pixels,” Image Processing, ICIP 2007, pp. 277-280, 2007.

[15]   S. Huang and J. K. Wu, “Optical watermarking for printed document authentication,” Information Forensics and Security, Vol. 2, pp. 164-173, 2007.

[16]   K. H. Jung, K. S. Ha, and K. Y. Yoo, “Data hiding in binary images by pixel-value weighting,” Convergence and Hybrid Information Technology, ICHIT 2008. pp. 262-265, 2008.

[17]   A. M. Attar, O. Taheri, S. Sadri, and A. F. Rasoul, “Data hiding in halftone images using error diffusion halftoning with adaptive thresholding,” Electrical and Computer Engineering, CCECE 2006, pp. 2029-2032, 2006.

 
 
Top