A high capacity data hiding scheme for binary images based on block patterns |
| |
Affiliation: | 1. Department of Computer Science, National Chung Hsing University, Taichung 402, Taiwan, ROC;2. Department of Computer Science and Information Management, Providence University, Taichung 43301, Taiwan, ROC;3. Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan, ROC;4. Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung, Taiwan, ROC;5. Department of Multimedia and Game Science, Chung Chou University of Science and Technology, Changhua, Taiwan, ROC;1. Electronics Research Institute, Sharif University of Technology, P.O. Box 11155-8639, Tehran, Iran;2. EE Department of Sharif University of Technology, P.O. Box 11155-8639, Tehran, Iran;1. Faculty of Information Science and Engineering, Ningbo University, Ningbo, 315211, China;2. College of Science and Technology, Ningbo University, Ningbo, 315000, China;1. School of Computer Information, Yeungjin College, 35 Bokhyun-Ro, Buk-Gu, Daegu 702-721, Republic of Korea;2. School of Computer Science and Engineering, Kyungpook National University, 80 Daehak-Ro, Buk-Gu, Daegu 702-701, Republic of Korea |
| |
Abstract: | This paper proposes a high capacity data hiding scheme for binary images based on block patterns, which can facilitate the authentication and annotation of scanned images. The scheme proposes block patterns for a 2 × 2 block to enforce specific block-based relationship in order to embed a significant amount of data without causing noticeable artifacts. In addition, two kinds of matching pair (MP) methods, internal adjustment MP and external adjustment MP, are designed to decrease the embedding changes. Shuffling is applied before embedding to reduce the distortion and improve the security. Experimental results show that the proposed scheme gives a significantly improved embedding capacity than previous approaches in the same level of embedding distortion. We also analyze the perceptual impact and discuss the robustness and security issues. |
| |
Keywords: | Data hiding Binary image Watermarking Authentication |
本文献已被 ScienceDirect 等数据库收录! |
|