Browse > Article
http://dx.doi.org/10.3837/tiis.2013.02.013

Data-Hiding for Halftone Images Using an Improved CPT scheme  

Phan, Trung Huy (Hanoi University of Science and Technology)
Nguyen, Hai Thanh (Ministry of Education and Training)
Kim, Cheonshik (Dept. of Computer Engineering, Sejong University)
Yang, Ching-Nung (Department of Computer Science and Information Engineering, National Dong Hwa University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.7, no.2, 2013 , pp. 405-424 More about this Journal
Abstract
In publishing applications, it is advantageous to embed data in halftone images. The CPT scheme (Chen-Pan-Tseng, 2000) is a steganographic data hiding scheme that was proposed for binary images, e.g., facsimiles. The CPT scheme uses a secret key and weight matrix to protect the hidden data and can hide as many as $r={\lfloor}{\log}_2(m{\times}n+1){\rfloor}$ bits of data in the image by changing at most 2 bits in the image. Our proposed scheme also uses a secret key to protect it from being compromised and a weight matrix to increase the data hiding rate. Our scheme improves the performance of the CPT scheme by using the simple principle of splitting each block into two parts. Our proposed scheme is called improved CPT (ICPT) and has a very high embedding capacity compared to previous schemes. Experimental results demonstrate that our proposed scheme generally has higher performance than previous schemes.
Keywords
CPT; Data Hiding; DHSPT; Error Diffusion; Halftone Images; ICPT;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Z. Zhao, H. Luo, Z.M. Lu, & J.S. Pan, "Reversible Data Hiding Based on Multilevel Histogram Modification and Sequential Recovery," International Journal of Electronics and Communications, vol.65, no. 10, pp. 814-826, 2011.   DOI   ScienceOn
2 J.M. Guo, "Watermarking in dithered halftone images with embeddable cells selection and inverse halftoning," Signal Processing, vol.88, pp.1496-1510, 2008.   DOI   ScienceOn
3 C.Y. Yang, C.H. Lin, & W.C. Hu, "Reversible Data Hiding by Adaptive IWT-coefficient Adjustment," Journal of Information Hiding and Multimedia Signal Processing, vol.2, no. 1, pp. 24-32, 2011. http://bit.kuas.edu.tw/-jihmsp/2011/vol2/JIH-MSP-2011-02-002.pdf
4 P. Tsai, Y. C. Hu, & H.L. Yeh, "Reversible Image Hiding Scheme Using Predictive Coding and Histogram Shifting," Signal Processing, vol.89, no. 6, pp.1129-1143, 2009.   DOI   ScienceOn
5 M.S. Fu & O.C. Au, "Hiding data in halftone image using modified data hiding error diffusion," in Proc. SPIE Visual Communications and Image Processing, vol.4067, pp.1671-1680, 2000.
6 C.W. Wu, "Multimedia data hiding and authentication via halftoning and coordinate projection," EURASIP Journal on Advances in Signal Processing, vol.2, pp. 143-151, 2002.
7 H.Y. Kim & A. Afif, "A secure authentication watermarking for halftone and binary images," International Journal of Imaging Systems and Technology, vol.14, pp. 147-152, 2004.   DOI   ScienceOn
8 S.C. Pei, J.M. Guo, & H. Lee, "Novel robust watermarking techniques in dithering halftone images," IEEE Signal Processing Letters, vol.12, no.4, pp. 333-336, 2005.   DOI
9 S.C. Pei & J.M. Guo, "Data hiding in halftone images with noise-balanced error diffusion," IEEE Signal Processing Letters, vol.10, no.2, pp. 349-351, 2003.   DOI
10 J.S. Pan, H. Luo, & Z.H. Lu, "Look-up Table Based Reversible Data Hiding for Error Diffused Halftone Images," INFORMATICA, vol.18, pp.615-628, 2007. http://130.203.133.150/viewdoc/summary?doi=10.1.1.137.9784
11 H.W. Tseng & C.C. Chang, "Hiding data in halftone images," INFORMATICA, vol.16, pp.419-430. 2005. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.112.9075
12 R.W. Floyd & L. Steinberg, "An adaptive algorithm for spatial grey scale," Proceedings of the Society of Information Display, vol.17, pp.75-77, 1976. http://en.wikipedia.org/wiki/Floyd%E2%80%93Steinberg_dithering
13 Y.-C. Tseng & H.-K. Pan, "Secure and Invisible Data Hiding in 2-Color Images," in Proc. of Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies INFOCOM 2001., vol.3, pp. 887-896, 2001.
14 R. Ulichney, "A Review of Halftoning Techniques," in Proc. of SPIE - The International Society for Optical Engineering, vol.3963, 2000. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.41.6726
15 R.M. Chao, Y.A. Ho, & Y.P. Chu, "Data Hiding Scheme Using Covering Codes in Halftone Images Based on Error Diffusion," in Proc. of Asia-Pacific Services Computing Conference, APSCC, vol.1, pp. 1483-1488, 2008.
16 M.S. Fu & O.C. Au, "Data Hiding Watermarking for Halftone Images," IEEE Transaction on Image Processing, vol.11, pp.477-484, 2002.   DOI   ScienceOn
17 Y. Chen, H. Pan, & Y. Tseng, "A secure data hiding scheme for two-color images," in Proc. of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), vol. 1, pp. 750-755, 2000.
18 R.Y.M. Li, O.C. Au, C.K.M. Yuk, S.K. Yip, & S.Y. Lam, "Halftone Image Data Hiding with Block-Overlapping Parity Check," Acoustics, Speech and Signal Processing, 2007. ICASSP 2007, vol.2, pp.193-196, 2007.
19 S.K. Yip, O.O. Au, C.W. Ho, & H.M. Wong, "PI-preserve data hiding for halftone image," Intelligent Signal Processing and Communication Systems, 2005. ISPACS 2005., vol.1 pp.125-128, 2005.
20 C. Kim, D.K. Shin, & D.I. Shin, "Data Hiding in a Halftone Image Using Hamming Code (15, 11)," Lecture Notes in Computer Science, vol.6592, pp.372-381, 2011.
21 R. C. Gonzalez & R E. Woods, "Digital Image Processing, 2nd Edition," Prentice-Hall, Inc. 2002. http://www.amazon.com/Digital-Image-Processing-2nd-Edition/dp/0201180758
22 C. Qin, C. C. Chang & P. L. Tsou, "Perceptual Image Hashing Based on the Error Diffusion Halftone Mechanism," International Journal of Innovative Computing, Information and Control, vol.8, no. 9, pp. 6161-6172, 2012. http://www.ijicic.org/ijicic-11-05009.pdf
23 C. Qin, Z. H. Wang, C. C. Chang, & K. N. Chen, "Reversible Data Hiding Scheme Based on Image Inpainting," Fundamenta Informaticae, vol.120, no. 1, pp. 59-70, 2012.