Reversible data hiding and lossless reconstruction of binary images using pair-wise logical computation mechanism

被引:61
作者
Tsai, CL
Chiang, HF
Fan, KC
Chung, CD
机构
[1] Natl Cent Univ, Inst Comp Sci & Informat, Jhongli, Taiwan
[2] Natl Cent Univ, Dept Elect Engn, Jhongli, Taiwan
[3] Natl Cent Univ, Dept Commun Engn, Jhongli, Taiwan
关键词
data hiding; pair-wise logical computation; data hiding capacity; tampering detection;
D O I
10.1016/j.patcog.2005.03.001
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The purpose of data hiding is to embed relating textural description into an image. The textural description and original host image can be extracted and reconstructed from the stego-image in the data extraction process. However, the reconstructed host image will more or less be damaged or distorted by using traditional data hiding methods. In this paper, we propose a novel data hiding mechanism by hiding data based on pair-wise logical computation (PWLC). The proposed mechanism can achieve the benefits of reversible hidden data extraction and lossless reconstruction of host image without utilizing any information from the original host image. Furthermore, the task of tampering detection can also be accomplished in the proposed mechanism. Experimental results demonstrate the feasibility and validity of our proposed mechanism in the data hiding of binary images. (c) 2005 Pattern Recognition Society. Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:1993 / 2006
页数:14
相关论文
共 20 条
  • [1] ELECTRONIC MARKING AND IDENTIFICATION TECHNIQUES TO DISCOURAGE DOCUMENT COPYING
    BRASSIL, JT
    LOW, S
    MAXEMCHUK, NF
    OGORMAN, L
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1995, 13 (08) : 1495 - 1504
  • [2] Hu YJ, 2004, 2004 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL 5, PROCEEDINGS, P584
  • [3] Data hiding approach for efficient image indexing
    Jiang, J
    Armstrong, A
    [J]. ELECTRONICS LETTERS, 2002, 38 (23) : 1424 - 1425
  • [4] LOW SH, 1995, IEEE INFOCOM SER, P853, DOI 10.1109/INFCOM.1995.515956
  • [5] Multipurpose watermarking for image authentication and protection
    Lu, CS
    Liao, HYM
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2001, 10 (10) : 1579 - 1592
  • [6] LU H, 2003, SECURE DATA HIDING B
  • [7] Lu HP, 2002, INT C PATT RECOG, P239, DOI 10.1109/ICPR.2002.1047441
  • [8] Data hiding in binary text documents
    Mei, Q
    Wong, EK
    Memon, N
    [J]. SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS III, 2001, 4314 : 369 - 375
  • [9] Developing digital libraries of cultural content for Internet access
    Mintzer, F
    [J]. IEEE COMMUNICATIONS MAGAZINE, 1999, 37 (01) : 72 - 78
  • [10] A secure data hiding scheme for two-color images
    Pan, HK
    Chen, YY
    Tseng, YC
    [J]. ISCC 2000: FIFTH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 2000, : 750 - 755