Information Sciences 179 (2009) 38663884 3867embeds codewords into the blocks. ![]() In Tzeng et al.s scheme, a cover image is divided into a number of blocks. The proposed scheme requires less image distortion than the previous schemes. Pixels in binary images have only either 0 (black color) or 1(white color) value, so even a small number of ipping pixels can cause a large amount of visual distortion. Is more difcult than that for color images or gray-scale images. Younho Lee a, Heeyoul Kim b,*, Yongsu Park cĪDepartment of Information and Communication Engineering, Yeungnam University, Republic of Koreab All rights reserved.a r t i c l e i n f o a b s t r a c tA new data hiding scheme for binary image authenticationwith small image distortion ![]() Experimental results demonstrate that the proposed scheme is more resil-ient against recent steganalysis attacks than the previous schemes.Ģ009 Elsevier Inc. The analysis reveals that the proposed scheme requires lessimage distortion than the previous schemes whilst achieving the same level of the missdetection rate. Using these metrics, we analyze the proposed schemeand the previous schemes. We employ two mea-surement metrics: miss detection rates for the degree of security and PSNR (Peak Signal-to-Noise Ratio) and ELSSM for the degree of the image distortion to demonstrate the fea-sibility of the proposed scheme. Randomly shufing thebit-order of the authentication information to be embedded, the information can only beextracted by the designated receiver who has the symmetric key. This new algo-rithm is based on ELSSM (Edge Line Segment Similarity Measure). A special type of the pixelsare selected and ipped by a new algorithm to minimize visual distortion. Using the data-embedding algorithm that isbased on Hamming codes, the proposed scheme embeds authentication information intothe cover image with ipping only a small number of pixels. Digital watermarking can be further classied into two methods: robust water-marking insures the existence of embedded copyright information in spite of various content-distortion attacks whereasKeywords:SecurityInformation hidingImage authenticationDigital watermarkingAuthentication codesA new data hiding scheme for binary image authentication that has a small distortion ofthe cover image is proposed in this paper. This canbe useful in military applications. Whilst the main objective of steganography is to make it dif-cult for anyone except the designated receiver to detect the existence of a secret message hidden in stego-content. Digitalwatermarking aims to embed copyright information or authentication information into cover content for digital rights man-agement or content authentication. Data hiding can be classied as digital watermarking and steganography. Generally, data hiding techniques are used to embed specied/secret data into digital cover content to produce stego-con-tent with the least amount of distortion. ![]() Park).Ĭontents lists available at ScienceDirect * Corresponding author.E-mail addresses: (Y. Designing a secure data hiding scheme for binary imagesĠ020-0255/$ - see front matter 2009 Elsevier Inc. However, data hiding for binary images has only recently become a focus in spite of its wide rangeof applications, such as fax images and hand-written signatures. Many methods have been suggested for color images or gray-scale images in data hiding for image contents. content authentication) is designed to detect modication in spite of slight change of the ste-go-content. Department of Computer Science, Kyonggi University, Republic of KoreacCollege of Information and Communications, Hanyang University, Republic of KoreaĪrticle history:Received 19 June 2008Received in revised form 30 June 2009Accepted 19 July 2009įragile watermarking (a.k.a.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |