Please use this identifier to cite or link to this item:
A Data Hiding Scheme for Binary and Gray Images Using Parity Check Codes
Parity check code
|引用:|| S. S. Pradhan, K. Ramchandran, “Distributed source coding using syndromes (DISCUS): design and construction," IEEE Trans. Inform. Theory, vol. 49, pp. 626-643, March 2003.  P. Moulin, R. Koetter, “Data-Hiding Codes," Proc. IEEE, vol. 93, pp. 2083-2126, Dec. 2005.  R. G. Gallager, “Low Density Parity Check Codes," IRE Trans. Inform. Theory, January 1962.  M. J. Wainwright, “Sparse Graph Codes for Side Information and Binning," IEEE Signal Processing Mag., vol. 24, pp. 47-57, Sept. 2007.  M. J. Wainwright, E. Martinian, “Low-Density Graph Codes That Are Optimal for Binning and Coding With Side Information," IEEE Trans. Inform. Theory, vol. 55, pp. 1061-1079, March 2009.  H. W. Tseng, F. R. Wu, C. P. Hsieh, “Data Hiding for Binary Images Using Weight Mechanism," Intelligent Information Hiding and Multimedia Signal Processing 2007, vol.1, pp.307-310, Nov. 2007.  M. Venkatesan, P. MeenakshiDevi, K. Duraiswamy, and K. Thiagarajah, “A New Data Hiding Scheme with Quality Control for Binary Images Using Block Parity," Information Assurance and Security 2007, pp.468-471, Aug. 2007.  J. A. Bloom, I. J. Cox, T. Kalker, J. P. M. G. Linnartz, M. L. Miller, and C. B. S. Traw, “Copy protection for digital video," Proc. IEEE (Special Issue on Identification and Protection of Multimedia Information), vol. 87, no. 7, pp. 1267-1276, Jul. 1999.  D. Boneh, J. Shaw, “Collusion-secure fingerprinting for digital data," IEEE Trans. Inf. Theory, vol. 44, no. 5, pp. 1897-1905, 1998.  D. Kundur, D. Hatzinakos, “Digital watermarking for telltale tamper proofing and authentication," Proc. IEEE, vol. 87, no. 7, pp. 1167-1180, Jul. 1999.  E. Martinian, G. W. Wornell, “Authentication with distortion constraints," Proc. IEEE Int. Conf. Image Processing 2002, pp. II.17-II.20.  J. Chen, T. S. Chen, M. W. Cheng, “A New Data Hiding Method in Binary Image" Multimedia Software Engineering, 2003. Proceedings. Fifth International Symposium on2003, pp. 88-93,2003.  Y. Y. Meng, B. J. Gao, Y. Qiang, F. G. Yu, C. Wang, “A Novel Steganalysis of Data Hiding in Binary Text Images," Communication Systems, 2008. ICCS 2008. 11th IEEE Singapore International Conference, pp. 247-251, Nov. 2008.  V. Patrecu, “Gray Level Image Enhamement Using Piecewise Linear Functions," Signals, Circuits and Systems, 2005. ISSCS 2005. International Symposium, vol. 1, pp. 211-214, July 2005.  C. H. Huang, C. C. Lee , H. C. Wu, C. M. Wang, “Lossless Data Hiding for Color Images," Intelligent Systems Design and Applications, vol. 3, pp. 632-637, 2008.  L. Long, A. Nishihara, “Data Hiding for Digital Halftoned Color Images," IEEE Region 10 Conference, pp. 1-4, Nov. 2006.  H. Luo, F. Yu (Correspondence author), J. S. Pan, Z. M. Lu, “Robust and Progressive Color Image Visual Secret Sharing Cooperated with Data Hiding," Intelligent Systems Design and Applications, vol. 3, pp. 431-436, Nov. 2008.  C. Wang, J. Wang, M. Zhou, G. Chen, D. Li, “ATBaM: An Arnold Transform Based Method onWatermarking Relational Data," Multimedia and Ubiquitous Engineering, pp. 263-270, 2008.  J. Y. Byun, K. H. Jung, K. Y. Yoo, “Improve Data Hiding Method by Block Parity for Binary Images," Computer Science and Software Engineering, vol. 3, pp. 931-934, 2008.  H. Q. Liang, W. B. Ran, X. X. Niu, “A Secure and High Capacity Data Hiding Scheme for Binary Images," Wavelet Analysis and Pattern Recognition, vol. 1, pp. 224-229, 2007.  H. Ajetrao, P. J. Kulkarni, “A Novel Scheme of Data Hiding in Binary Images," Conference on Computational Intelligence and Multimedia Applications, vol. 4, pp. 70-77, 2007.  J. Bierbrauer, J. Fridrich, “Constructing Good Covering Codes for Application in Steganography", Springer Berlin, 2008.  Y. C. Tseng, H. K. Pan, “Data Hiding in 2-Color Images," Computers IEEE Transactions}, vol. 51, pp. 873-878, 2002.  Y. C. Tseng, H. K. Pan, “Secure and Invisible Data Hiding in 2-Color Images," Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 2, pp. 887-896, 2001.  Y. C. Tseng, Y. Y. Chen, H. K. Pan, “A Secure Data Hiding Scheme for Binary Images," Communications IEEE Transactions, vol. 50, pp. 1227-1231, 2002.  R. Y. M. Li, O. C. Au, K. K. Lai, C. K. Yuk, S. Y. Lam, “Data Hiding with Tree Based Parity Check," Multimedia and Expo 2007 IEEE International Conference, pp. 635-638, 2007.  S. F. Ming, O. C. Au, “Data Hiding Watermarking for Halftone Images," Image Processing IEEE Transactions, vol. 11, pp. 477-484, 2002.  R. Y. M. Li, O. C. Au, C. K. M. Yuk, S. K. Yip, S. Y. Lam, “Hlaftone Image Data Hiding with Block-Overlapping Parity Check," Speech and Signal Processing, vol. 2, pp. II-193-II-196, 2007.  S. F. Ming, O. C. Au, “Halftone Image Data Hiding with Intensity Selection and Connection Selection," Circuits and Systems, vol. 5, pp. 243-246, 2001.  S. F. Ming, O. C. Au, “Data Hiding in Halftone Images by Stochastic Error Diffusion," Acoustics Speech and Signal Processing, vol. 3, pp. 1965-1968, 2001.  C. C. Chang, T. D. Kieu, Y. C. Chou, “A High Payload Steganographic Scheme Based on (7,4) Hamming Code for Digital Images," Electronic Commerce and Security, pp. 16-21, 2008.  Z. X. Yin, C. C. Chang, Y. P. Zhang, “A High Embedding Efficiency Steganography Scheme for Wet Paper Codes," Information Assurance and Security, vol. 2, pp. 611-614, 2009.  W. Y. Chen, C. C. Liu, “Robust Watermarking Scheme for Binary Images Using a Slice-Based Large-Cluster Algorithm with a Hamming Code," Optical Engineering, vol. 45, pp. 1-10, 2006.  S. Lin, D. J. Costello. Jr, “Error Control Coding, 2nded", Prentice Hall, 2004.|
This paper proposed two data hiding approaches for binary images. The binary image is partitioned into many blocks and the watermark will be embedded into blocks by flipping pixels. The weight method is also proposed to find the most suitable pixel for flipping. Thus, the watermark in the image is difficult to detect. We proposed syndrome code to obtain low fidelity. Further, we proposed a method which considers the gray level image space with low human visual sensitivity to be embedding area. For lower fidelity, we also proposed syndrome code to be the embedding algorithm. The image enhanced technique controlled the available embedding space for the data hiding capacity. Eventually, we also proposed a way to decide the image quality.
|Appears in Collections:||電機工程學系所|
Show full item record
TAIR Related Article
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.