On Establishing Edge Adaptive Grid for Bilevel Image Data Hiding

被引:31
作者
Cao, Hong [1 ]
Kot, Alex C. [2 ]
机构
[1] ASTAR, Data Analyt Dept, Inst Infocomm Res, Singapore 138632, Singapore
[2] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
关键词
Authentication; binary; contour tracing; data hiding; steganography; watermarking; BINARY IMAGE; DISTORTION MEASURE; TRANSFORM DOMAIN; AUTHENTICATION; WATERMARKING; STEGANALYSIS; PROTECTION;
D O I
10.1109/TIFS.2013.2274041
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose, in this paper, a novel edge-adaptive data hiding method for authenticating binary host images. Through establishing a dense edge-adaptive grid (EAG) along the object contours, we use a simple binary image to show that EAG more efficiently selects good data carrying pixel locations (DCPL) associated with "l-shaped" patterns than block-based methods. Our method employs a dynamic system structure with the redesigned fundamental content adaptive processes (CAP) switch to iteratively trace new contour segments and to search for new DCPLs. By maintaining and updating a location status map, a protective mechanism is proposed to preserve the context of each CAP and their corresponding outcomes. We prove that our method is robust against the interferences caused by close-by contours, image noises, and invariantly selects the same sequence of DCPLs for an arbitrary binary host image and its various marked versions. Comparison shows that our method achieves a good tradeoff between large payload and minimal visual distortion as compared with several classic prior arts for diverse types of binary host images. Moreover, our method well supports state-of-the-art hybrid authentication that integrates data hiding and modern cryptographic techniques.
引用
收藏
页码:1508 / 1518
页数:11
相关论文
共 35 条
[1]   NUCLEAR SPECTRAL-ANALYSIS VIA ARTIFICIAL NEURAL NETWORKS FOR WASTE HANDLING [J].
KELLER, PE ;
KANGAS, LJ ;
TROYER, GL ;
HASHEM, S ;
KOUZES, RT .
IEEE TRANSACTIONS ON NUCLEAR SCIENCE, 1995, 42 (04) :709-715
[2]   A holographic transform domain image watermarking method [J].
Bruckstein, AM ;
Richardson, TJ .
CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 1998, 17 (03) :361-389
[3]   AUTOMATIC REPRESENTATION OF BINARY IMAGES [J].
CABRELLI, CA ;
MOLTER, UM .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1990, 12 (12) :1190-1196
[4]  
Cao H., 2012, SIGN INF PROC ASS AN, P1
[5]   Lossless Data Embedding in Electronic Inks [J].
Cao, Hong ;
Kot, Alex C. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (02) :314-323
[6]   LOSSLESS DATA HIDING FOR ELECTRONIC INK [J].
Cao, Hong ;
Kot, Alex C. .
2009 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1- 8, PROCEEDINGS, 2009, :1381-1384
[7]  
Cheng J, 2005, IEEE INT SYMP CIRC S, P4405
[8]  
Cheng J, 2005, INT CONF ACOUST SPEE, P689
[9]   Objective distortion measure for binary text image based on edge line segment similarity [J].
Cheng, Jun ;
Kot, Alex C. .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2007, 16 (06) :1691-1695
[10]  
Cox I., 2001, Digital Watermarking