Browse > Article
http://dx.doi.org/10.3837/tiis.2011.02.013

Data Hiding in Halftone Images by XOR Block-Wise Operation with Difference Minimization  

Yang, Ching-Nung (Dept. of Computer Science and Information Engineering, National Dong Hwa University)
Ye, Guo-Cin (Dept. of Computer Science and Information Engineering, National Dong Hwa University)
Kim, Cheon-Shik (Department of Computer Engineering, Sejong University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.5, no.2, 2011 , pp. 457-476 More about this Journal
Abstract
This paper presents an improved XOR-based Data Hiding Scheme (XDHS) to hide a halftone image in more than two halftone stego images. The hamming weight and hamming distance is a very important parameter affecting the quality of a halftone image. For this reason, we proposed a method that involves minimizing the hamming weights and hamming distances between the stego image and cover image in $2{\times}2$-pixel grids. Moreover, our XDHS adopts a block-wise operation to improve the quality of a halftone image and stego images. Furthermore, our scheme improves security by using a block-wise operation with A-patterns and B-patterns. Our XDHS method achieves a high quality with good security compared to the prior arts. An experiment verified the superiority of our XDHS compared with previous methods.
Keywords
Data hiding; halftone image; XOR operation; visual cryptography;
Citations & Related Records

Times Cited By Web Of Science : 1  (Related Records In Web of Science)
Times Cited By SCOPUS : 1
연도 인용수 순위
1 F. Liu, C.K. Wu and X.J. Lin, "Some extensions on threshold visual cryptography schemes," The Computer Journal, vol. 53, pp. 107-119, 2010.   DOI
2 M. Naor and A. Shamir, "Visual Cryptography," Advances in Cryptology- EUROCRYPT'94, pp. 1-12, 1994.
3 G. Ateniese, C. Blundo, A. De Santis and D.R. Stinson, "Extended capabilities for visual cryptography," Theoretical Computer Science, vol. 250, pp. 143-161, 2001.   DOI
4 C.N. Yang and T.S. Chen, "Extended visual secret sharing schemes: improving the shadow image quality," International Journal of Pattern Recognition and Artificial Intelligence, vol. 21, pp. 879-898, 2007.   DOI
5 P. Tuyls, H.D.L. Hollmann, J.H. Van Lint and L. Tolhuizen, "XOR-based visual cryptography schemes," Designs, Codes and Cryptography, vol. 37, no. 1, pp. 169-186, 2005.   DOI
6 M. Nakajima and Y. Yamaguchi, "Enhancing registration tolerance of extended visual cryptography for natural images," Journal of Electronic Imaging, vol. 13, pp. 654-662, 2004.   DOI
7 H. Gou and M. Wu, "Improving embedding payload in binary images with super-pixels," in Proc. of IEEE International Conference on Image Processing, vol.3, pp.III-277-III-280, 2007.
8 D.Q. Viet and K. Kurosawa, "Almost ideal contrast visual cryptography with reversing," Cryptology- CT-RSA, pp. 353-365, 2004.
9 S. Cimato, A. De Santis, A.L. Ferrara and B. Masucci, "Ideal contrast visual cryptography schemes with reversing," Information Processing Letters, vol. 93, pp. 199-206, 2005.   DOI
10 C.N. Yang, C.C. Wang and T.S. Chen, "Visual cryptography schemes with reversing," The Computer Journal, vol. 51, pp. 710-722, 2008.   DOI
11 M.S. Fu and O.C. Au, "Steganography in halftone images: conjugate error diffusion," Signal Processing, vol. 83, pp. 2171-2178, 2003.   DOI
12 I.S. Lee and W.H. Tsai, "A dynamic-programming approach to data hiding in binary image using block pattern coding with distortion minimization," IEICE Transaction on Information and Systems, vol. E90-D, no. 8, pp. 1142-1150, 2007.   DOI
13 Y.A. Ho, Y.K. Chan, H.C. Wu and Y.P. Chu, "High-capacity reversible data hiding in binary images using pattern substitution," Computer Standards & Interfaces, vol. 31, pp. 787-794, 2009.   DOI
14 C.L. Tsai, H.F. Chiang, K.C. Fan and C.D. Chung, "Reversible data hiding and lossless reconstruction of binary images using pair-wise logical computation mechanism," Pattern Recognition, vol. 38, pp. 1993-2006, 2005.   DOI
15 M.S. Fu and O.C. Au, "Data hiding in halftone image by stochastic error diffusion," IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1965-1968, 2001.
16 M. Wu and B. Liu, "Data hiding in binary image for authentication and annotation," IEEE Trans. on Multimedia, vol. 6, pp. 528-538, 2004.   DOI
17 P. Sherry and A. Savakis, "Improved techniques for watermarking halftone images," Acoustics, Speech, and Signal Processing, vol. 5, pp. 1005-1008, 2004.
18 M. Wu, J. Fridrich, M. Goljan and H. Gou, "Handling uneven embedding capacity in binary images: a revisit," SPIE Conference on Security, Watermarking and Steganography, vol. 5681, pp. 194-205, 2005.
19 C.C. Lin and W. H. Tsai, "Secret multimedia information sharing with data hiding capacity by simple logic operations," in Proc. of 5th World Multi-conference on Systemics, Cybernetics, and Informatics, Vol. I: Information Systems Development, pp. 50-55, 2001.