DOI QR코드

DOI QR Code

Data Hiding in Halftone Images by XOR Block-Wise Operation with Difference Minimization

  • Yang, Ching-Nung (Dept. of Computer Science and Information Engineering, National Dong Hwa University) ;
  • Ye, Guo-Cin (Dept. of Computer Science and Information Engineering, National Dong Hwa University) ;
  • Kim, Cheon-Shik (Department of Computer Engineering, Sejong University)
  • Received : 2010.09.25
  • Accepted : 2011.01.20
  • Published : 2011.02.28

Abstract

This paper presents an improved XOR-based Data Hiding Scheme (XDHS) to hide a halftone image in more than two halftone stego images. The hamming weight and hamming distance is a very important parameter affecting the quality of a halftone image. For this reason, we proposed a method that involves minimizing the hamming weights and hamming distances between the stego image and cover image in $2{\times}2$-pixel grids. Moreover, our XDHS adopts a block-wise operation to improve the quality of a halftone image and stego images. Furthermore, our scheme improves security by using a block-wise operation with A-patterns and B-patterns. Our XDHS method achieves a high quality with good security compared to the prior arts. An experiment verified the superiority of our XDHS compared with previous methods.

Keywords

References

  1. C.C. Lin and W. H. Tsai, "Secret multimedia information sharing with data hiding capacity by simple logic operations," in Proc. of 5th World Multi-conference on Systemics, Cybernetics, and Informatics, Vol. I: Information Systems Development, pp. 50-55, 2001.
  2. M.S. Fu and O.C. Au, "Data hiding in halftone image by stochastic error diffusion," IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1965-1968, 2001.
  3. M.S. Fu and O.C. Au, "Steganography in halftone images: conjugate error diffusion," Signal Processing, vol. 83, pp. 2171-2178, 2003. https://doi.org/10.1016/S0165-1684(03)00173-7
  4. M. Wu and B. Liu, "Data hiding in binary image for authentication and annotation," IEEE Trans. on Multimedia, vol. 6, pp. 528-538, 2004. https://doi.org/10.1109/TMM.2004.830814
  5. P. Sherry and A. Savakis, "Improved techniques for watermarking halftone images," Acoustics, Speech, and Signal Processing, vol. 5, pp. 1005-1008, 2004.
  6. M. Wu, J. Fridrich, M. Goljan and H. Gou, "Handling uneven embedding capacity in binary images: a revisit," SPIE Conference on Security, Watermarking and Steganography, vol. 5681, pp. 194-205, 2005.
  7. H. Gou and M. Wu, "Improving embedding payload in binary images with super-pixels," in Proc. of IEEE International Conference on Image Processing, vol.3, pp.III-277-III-280, 2007.
  8. I.S. Lee and W.H. Tsai, "A dynamic-programming approach to data hiding in binary image using block pattern coding with distortion minimization," IEICE Transaction on Information and Systems, vol. E90-D, no. 8, pp. 1142-1150, 2007. https://doi.org/10.1093/ietisy/e90-d.8.1142
  9. Y.A. Ho, Y.K. Chan, H.C. Wu and Y.P. Chu, "High-capacity reversible data hiding in binary images using pattern substitution," Computer Standards & Interfaces, vol. 31, pp. 787-794, 2009. https://doi.org/10.1016/j.csi.2008.09.014
  10. C.L. Tsai, H.F. Chiang, K.C. Fan and C.D. Chung, "Reversible data hiding and lossless reconstruction of binary images using pair-wise logical computation mechanism," Pattern Recognition, vol. 38, pp. 1993-2006, 2005. https://doi.org/10.1016/j.patcog.2005.03.001
  11. M. Nakajima and Y. Yamaguchi, "Enhancing registration tolerance of extended visual cryptography for natural images," Journal of Electronic Imaging, vol. 13, pp. 654-662, 2004. https://doi.org/10.1117/1.1758729
  12. D.Q. Viet and K. Kurosawa, "Almost ideal contrast visual cryptography with reversing," Cryptology- CT-RSA, pp. 353-365, 2004.
  13. S. Cimato, A. De Santis, A.L. Ferrara and B. Masucci, "Ideal contrast visual cryptography schemes with reversing," Information Processing Letters, vol. 93, pp. 199-206, 2005. https://doi.org/10.1016/j.ipl.2004.10.011
  14. C.N. Yang, C.C. Wang and T.S. Chen, "Visual cryptography schemes with reversing," The Computer Journal, vol. 51, pp. 710-722, 2008. https://doi.org/10.1093/comjnl/bxm118
  15. M. Naor and A. Shamir, "Visual Cryptography," Advances in Cryptology- EUROCRYPT'94, pp. 1-12, 1994.
  16. G. Ateniese, C. Blundo, A. De Santis and D.R. Stinson, "Extended capabilities for visual cryptography," Theoretical Computer Science, vol. 250, pp. 143-161, 2001. https://doi.org/10.1016/S0304-3975(99)00127-9
  17. C.N. Yang and T.S. Chen, "Extended visual secret sharing schemes: improving the shadow image quality," International Journal of Pattern Recognition and Artificial Intelligence, vol. 21, pp. 879-898, 2007. https://doi.org/10.1142/S0218001407005740
  18. P. Tuyls, H.D.L. Hollmann, J.H. Van Lint and L. Tolhuizen, "XOR-based visual cryptography schemes," Designs, Codes and Cryptography, vol. 37, no. 1, pp. 169-186, 2005. https://doi.org/10.1007/s10623-004-3816-4
  19. F. Liu, C.K. Wu and X.J. Lin, "Some extensions on threshold visual cryptography schemes," The Computer Journal, vol. 53, pp. 107-119, 2010. https://doi.org/10.1093/comjnl/bxn072

Cited by

  1. Watermark with DSA signature using predictive coding vol.74, pp.14, 2015, https://doi.org/10.1007/s11042-013-1667-6
  2. Data hiding based on overlapped pixels using hamming code vol.75, pp.23, 2011, https://doi.org/10.1007/s11042-014-2355-x
  3. Lossless data hiding for absolute moment block truncation coding using histogram modification vol.14, pp.1, 2011, https://doi.org/10.1007/s11554-016-0641-8
  4. Secure medical images based on data hiding using a hybrid scheme with the Hamming code, LSB, and OPAP vol.14, pp.1, 2011, https://doi.org/10.1007/s11554-017-0674-7
  5. An efficient histogram-preserving steganography based on block vol.2018, pp.None, 2011, https://doi.org/10.1186/s13640-018-0306-6
  6. Generalizing Hamming+k data hiding by overlapped pixels vol.78, pp.13, 2011, https://doi.org/10.1007/s11042-018-7101-3