Data-Hiding for Halftone Images Using an Improved CPT scheme

被引:3
作者
Phan Trung Huy [1 ]
Nguyen Hai Thanh [2 ]
Kim, Cheonshik [3 ]
Yang, Ching-Nung [4 ]
机构
[1] Hanoi Univ Sci & Technol, Inst Appl Math & Informat, Hanoi, Vietnam
[2] Minist Educ & Training, Hanoi, Vietnam
[3] Sejong Univ, Dept Comp Engn, Seoul 143747, South Korea
[4] Natl Dong Hwa Univ, Dept Comp Sci & Informat Engn, Hualien, Taiwan
基金
新加坡国家研究基金会;
关键词
CPT; Data Hiding; DHSPT; Error Diffusion; Halftone Images; ICPT; WATERMARKING; AUTHENTICATION; SECURE;
D O I
10.3837/tiis.2013.02.013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In publishing applications, it is advantageous to embed data in halftone images. The CPT scheme (Chen-Pan-Tseng, 2000) is a steganographic data hiding scheme that was proposed for binary images, e. g., facsimiles. The CPT scheme uses a secret key and weight matrix to protect the hidden data and can hide as many as r = left perpendicularlog(2)(m x n + 1)right perpendicular bits of data in the image by changing at most 2 bits in the image. Our proposed scheme also uses a secret key to protect it from being compromised and a weight matrix to increase the data hiding rate. Our scheme improves the performance of the CPT scheme by using the simple principle of splitting each block into two parts. Our proposed scheme is called improved CPT (ICPT) and has a very high embedding capacity compared to previous schemes. Experimental results demonstrate that our proposed scheme generally has higher performance than previous schemes.
引用
收藏
页码:405 / 424
页数:20
相关论文
共 23 条
[1]  
[Anonymous], 2006, Digital Image Processing
[2]   Data Hiding Scheme using Covering Codes in Halftone Images Based on Error Diffusion [J].
Chao, Ruey-Ming ;
Ho, Yu-An ;
Chu, Yen-Ping .
2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, :1483-+
[3]  
FLOYD RW, 1976, P SID, V17, P75
[4]   Data hiding watermarking for halftone images [J].
Fu, MS ;
Au, OC .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (04) :477-484
[5]   Hiding data in halftone image using modified data hiding error diffusion [J].
Fu, MS ;
Au, OC .
VISUAL COMMUNICATIONS AND IMAGE PROCESSING 2000, PTS 1-3, 2000, 4067 :1671-1680
[6]   Watermarking in dithered halftone images with embeddable cells selection and inverse halftoning [J].
Guo, Jing-Ming .
SIGNAL PROCESSING, 2008, 88 (06) :1496-1510
[7]  
Kim C, 2011, LECT NOTES ARTIF INT, V6592, P372, DOI 10.1007/978-3-642-20042-7_38
[8]   A secure authentication watermarking for halftone and binary images [J].
Kim, HY ;
Afif, A .
INTERNATIONAL JOURNAL OF IMAGING SYSTEMS AND TECHNOLOGY, 2004, 14 (04) :147-152
[9]  
Li RYM, 2007, INT CONF ACOUST SPEE, P193
[10]   A secure data hiding scheme for two-color images [J].
Pan, HK ;
Chen, YY ;
Tseng, YC .
ISCC 2000: FIFTH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 2000, :750-755