PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Novel Watermarking Authentication Schemes for Binary Images Based on Dual-Pair Block Pixel Patterns

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
In this paper, watermarking authentication schemes for binary images are investigated. Dual-Pair Blocks (DPBs), 2×2 blocks with two black and two white pixels, are employed as the basic units of information embedding. With 6 distinctive patterns obtained by pixel patterns, a DPB can be represented by a senary value as the embedding information. Variable length coding is adopted to enhance the information embedding capacity of the DPB. The secret key of the watermarking is a pseudo random function with a seed value, which selects DPBs for information embedding. Based on the aforementioned framework, two novel watermarking schemes are presented. The first one, named dual-pair block authentication (DPBA), is an irreversible one featuring high information embedding capacity, and well visual quality. The second scheme, named senary Huffman compression authentication (SHCA) scheme, supports reversible watermarking unique in the literature. Matching-pair technique is further employed both schemes to reduce the number of altered bits after watermarking for better visual quality. Experimental results show that, the DPBA scheme has the highest information embedding capacity on all comparing schemes. The average compression ratio of the reversible SHCA scheme is up to 38.96%. The average distortion rates per accessed DPB for the proposed DPBA and SHCA schemes are 0.485 and 0.46, respectively.
Wydawca
Rocznik
Strony
125--155
Opis fizyczny
bibliogr. 20 poz., tab., wykr.
Twórcy
autor
autor
autor
  • Department of Information Engineering and Computer Science Feng Chia University, Taichung 407, Taiwan, ROC, ccc@cs.ccu.edu.tw
Bibliografia
  • [1] Alattar, A. M.: Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform, IEEE Transactions on Image Processing, 13, Aug. 2004, 1147-1156.
  • [2] Bao, F., Deng, R. H., Ooi, B. C., Yang, Y.: Tailored Reversible Watermarking Schemes for Authentication of Electronic Clinical Atlas, IEEE Transactions on Information Technology in Biomedicine, 9, Dec. 2005, 554-563.
  • [3] Brisbane, G., Safavi-Naini, R., Ogunbrna, P.: High-capacity Steganography Using a Shared Colour Palette, IEE Proceedings-Vision, Image and Signal Processing, 152, Dec. 2005, 787-792.
  • [4] Chang, C., Lin, C., Tseng, C., Tai, W.: Reversible hiding in DCT-based compressed images, Information Sciences, 177, Jul. 2007, 2768-2786.
  • [5] Chang, C., Lin, P.: Adaptive watermarkmechanism for rightful ownership protection, The Journal of Systems and Software, 81, Aug. 2008, 1118-1129.
  • [6] Chen, J., Chen, T., Cheng, M.: A New Data Hiding Method in Binary Image, 2003.
  • [7] Guo, J.: Watermarking in DitheredHalftone Imageswith EmbeddableCells Selection and InverseHalftoning, Signal Processing, 88, Jun. 2008, 1496-1510.
  • [8] Huang, C., Wu, J.: Attacking Visible Watermarking Schemes, IEEE Transactions on Multimedia, 6, Feb. 2004, 16-30.
  • [9] Kamstra, L., Henk, J., Heijmans, A. M.: Reversible Data Embedding into Images Using Wavelet Techniques and Sorting, IEEE Transactions on Image Processing, 14, Dec. 2005, 2082-2090.
  • [10] Li, S., Leung, K., Cheng, L. M., Chan, C.: A Novel Image-Hiding Based on Block Difference, Pattern Recognition, 39, Jun. 2006, 1168-1176.
  • [11] Lu, H.,Wang, J., Kot, A., Shi, Y. Q.: An Objective DistortionMeasure for Binary Document Images Based on Human, Proceedings of the 16th International Conference on Pattern Recognition, 4, Quebec City, Canada, Aug. 2002.
  • [12] Pamboukian, D., S. V., Kim, H. Y.: Reversible Data Hiding and Reversible AuthenticationWatermarking for Binary Images, Proceedings of the Sixth Brazilian Symposium on Information and Computer System Security (SBSEG-06), Santos, Brazil, Aug. 2006.
  • [13] Shen, J., Hsu, P.: A Robust Associative watermarking Technique Based on Similarity Diagrams, Pattern Recognition, 40, Apr. 2007, 1355-1367.
  • [14] Tsai, C. L., Chiang, H. F., Fan, K. C., Chung, C. D.: Reversible Data Hiding and Lossless Reconstruction of Binary Images Using Pair-wise Logical Computation Mechanism, Pattern Recognition, 38, Nov. 2005, 1993-2006.
  • [15] Tseng, Y. C., P. H.: Data Hiding in 2-Color Images, IEEE Transactions on Computers, 51, Jul. 2002, 873-878.
  • [16] Wang, C. M., Wu, N. I., Tsai, C. S., Hwang, M. S.: A high quality steganographic method with pixel-value differencing and modulus function, The Journal of Systems and Software, 81, Feb. 2008, 150-158.
  • [17] Wong, P. W., Memon, N.: Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification, IEEE Transactions on Image Processing, 10, Oct. 2001, 593-1601.
  • [18] Wu, M., Liu, B.: Data Hiding in Binary Image for Authentication and Annotation, IEEE Transactions on Multimedia, 6, Aug. 2004, 528-538.
  • [19] Wu, X., Guan, Z.: A Novel Digital Watermark Algorithm Based on Chaotic Maps, Physics Letters A, 365, Jun. 2007, 403-406.
  • [20] Yang, H., Kot, A. C.: Pattern-Based Data Hiding for Binary Image Authentication by Connectivity-Preserving, IEEE Transactions on Multimedia, 9, Apr. 2007, 475-486.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BUS8-0004-0010
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.