DOI QR코드

DOI QR Code

Data-Hiding for Halftone Images Using an Improved CPT scheme

  • Received : 2012.10.22
  • Accepted : 2013.01.28
  • Published : 2013.02.28

Abstract

In publishing applications, it is advantageous to embed data in halftone images. The CPT scheme (Chen-Pan-Tseng, 2000) is a steganographic data hiding scheme that was proposed for binary images, e.g., facsimiles. The CPT scheme uses a secret key and weight matrix to protect the hidden data and can hide as many as $r={\lfloor}{\log}_2(m{\times}n+1){\rfloor}$ bits of data in the image by changing at most 2 bits in the image. Our proposed scheme also uses a secret key to protect it from being compromised and a weight matrix to increase the data hiding rate. Our scheme improves the performance of the CPT scheme by using the simple principle of splitting each block into two parts. Our proposed scheme is called improved CPT (ICPT) and has a very high embedding capacity compared to previous schemes. Experimental results demonstrate that our proposed scheme generally has higher performance than previous schemes.

Keywords

References

  1. J.M. Guo, "Watermarking in dithered halftone images with embeddable cells selection and inverse halftoning," Signal Processing, vol.88, pp.1496-1510, 2008. https://doi.org/10.1016/j.sigpro.2007.12.015
  2. J.S. Pan, H. Luo, & Z.H. Lu, "Look-up Table Based Reversible Data Hiding for Error Diffused Halftone Images," INFORMATICA, vol.18, pp.615-628, 2007. http://130.203.133.150/viewdoc/summary?doi=10.1.1.137.9784
  3. H.W. Tseng & C.C. Chang, "Hiding data in halftone images," INFORMATICA, vol.16, pp.419-430. 2005. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.112.9075
  4. R.W. Floyd & L. Steinberg, "An adaptive algorithm for spatial grey scale," Proceedings of the Society of Information Display, vol.17, pp.75-77, 1976. http://en.wikipedia.org/wiki/Floyd%E2%80%93Steinberg_dithering
  5. R. Ulichney, "A Review of Halftoning Techniques," in Proc. of SPIE - The International Society for Optical Engineering, vol.3963, 2000. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.41.6726
  6. R.M. Chao, Y.A. Ho, & Y.P. Chu, "Data Hiding Scheme Using Covering Codes in Halftone Images Based on Error Diffusion," in Proc. of Asia-Pacific Services Computing Conference, APSCC, vol.1, pp. 1483-1488, 2008.
  7. M.S. Fu & O.C. Au, "Data Hiding Watermarking for Halftone Images," IEEE Transaction on Image Processing, vol.11, pp.477-484, 2002. https://doi.org/10.1109/TIP.2002.999680
  8. Y.-C. Tseng & H.-K. Pan, "Secure and Invisible Data Hiding in 2-Color Images," in Proc. of Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies INFOCOM 2001., vol.3, pp. 887-896, 2001.
  9. Y. Chen, H. Pan, & Y. Tseng, "A secure data hiding scheme for two-color images," in Proc. of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), vol. 1, pp. 750-755, 2000.
  10. R.Y.M. Li, O.C. Au, C.K.M. Yuk, S.K. Yip, & S.Y. Lam, "Halftone Image Data Hiding with Block-Overlapping Parity Check," Acoustics, Speech and Signal Processing, 2007. ICASSP 2007, vol.2, pp.193-196, 2007.
  11. S.K. Yip, O.O. Au, C.W. Ho, & H.M. Wong, "PI-preserve data hiding for halftone image," Intelligent Signal Processing and Communication Systems, 2005. ISPACS 2005., vol.1 pp.125-128, 2005.
  12. C. Kim, D.K. Shin, & D.I. Shin, "Data Hiding in a Halftone Image Using Hamming Code (15, 11)," Lecture Notes in Computer Science, vol.6592, pp.372-381, 2011.
  13. R. C. Gonzalez & R E. Woods, "Digital Image Processing, 2nd Edition," Prentice-Hall, Inc. 2002. http://www.amazon.com/Digital-Image-Processing-2nd-Edition/dp/0201180758
  14. C. Qin, C. C. Chang & P. L. Tsou, "Perceptual Image Hashing Based on the Error Diffusion Halftone Mechanism," International Journal of Innovative Computing, Information and Control, vol.8, no. 9, pp. 6161-6172, 2012. http://www.ijicic.org/ijicic-11-05009.pdf
  15. C. Qin, Z. H. Wang, C. C. Chang, & K. N. Chen, "Reversible Data Hiding Scheme Based on Image Inpainting," Fundamenta Informaticae, vol.120, no. 1, pp. 59-70, 2012.
  16. Z. Zhao, H. Luo, Z.M. Lu, & J.S. Pan, "Reversible Data Hiding Based on Multilevel Histogram Modification and Sequential Recovery," International Journal of Electronics and Communications, vol.65, no. 10, pp. 814-826, 2011. https://doi.org/10.1016/j.aeue.2011.01.014
  17. C.Y. Yang, C.H. Lin, & W.C. Hu, "Reversible Data Hiding by Adaptive IWT-coefficient Adjustment," Journal of Information Hiding and Multimedia Signal Processing, vol.2, no. 1, pp. 24-32, 2011. http://bit.kuas.edu.tw/-jihmsp/2011/vol2/JIH-MSP-2011-02-002.pdf
  18. P. Tsai, Y. C. Hu, & H.L. Yeh, "Reversible Image Hiding Scheme Using Predictive Coding and Histogram Shifting," Signal Processing, vol.89, no. 6, pp.1129-1143, 2009. https://doi.org/10.1016/j.sigpro.2008.12.017
  19. M.S. Fu & O.C. Au, "Hiding data in halftone image using modified data hiding error diffusion," in Proc. SPIE Visual Communications and Image Processing, vol.4067, pp.1671-1680, 2000.
  20. C.W. Wu, "Multimedia data hiding and authentication via halftoning and coordinate projection," EURASIP Journal on Advances in Signal Processing, vol.2, pp. 143-151, 2002.
  21. H.Y. Kim & A. Afif, "A secure authentication watermarking for halftone and binary images," International Journal of Imaging Systems and Technology, vol.14, pp. 147-152, 2004. https://doi.org/10.1002/ima.20018
  22. S.C. Pei, J.M. Guo, & H. Lee, "Novel robust watermarking techniques in dithering halftone images," IEEE Signal Processing Letters, vol.12, no.4, pp. 333-336, 2005. https://doi.org/10.1109/LSP.2004.842295
  23. S.C. Pei & J.M. Guo, "Data hiding in halftone images with noise-balanced error diffusion," IEEE Signal Processing Letters, vol.10, no.2, pp. 349-351, 2003. https://doi.org/10.1109/LSP.2003.817856

Cited by

  1. Data Hiding Based on BTC using EMD vol.14, pp.2, 2013, https://doi.org/10.7236/jiibc.2014.14.2.11
  2. Lossless data hiding for absolute moment block truncation coding using histogram modification vol.14, pp.1, 2013, https://doi.org/10.1007/s11554-016-0641-8
  3. Secure medical images based on data hiding using a hybrid scheme with the Hamming code, LSB, and OPAP vol.14, pp.1, 2013, https://doi.org/10.1007/s11554-017-0674-7