Data Hiding Method with Quality Control for Binary Images

Abstract

Secret data hiding in binary images is more difficult than other formats since binary images require only one bit repre-sentation to indicate black and white. This study proposes a new method for data hiding in binary images using opti-mized bit position to replace a secret bit. This method manipulates blocks, which are sub-divided. The parity bit for a specified block decides whether to change or not, to embed a secret bit. By finding the best position to insert a secret bit for each divided block, the image quality of the resulting stego-image can be improved, while maintaining low computational complexity. The experimental results show that the proposed method has an improvement with respect to a previous work.

Share and Cite:

K. Jung and K. Yoo, "Data Hiding Method with Quality Control for Binary Images," Journal of Software Engineering and Applications, Vol. 2 No. 1, 2009, pp. 20-24. doi: 10.4236/jsea.2009.21003.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] H. Liang, W. Ran, and X. Nie, “A secure and high capac-ity scheme for binary images,” Proceedings of the ICWAPR, pp. 224-229, 2007.
[2] K. Matsui and K. Tanaka, “Video-steganography: How to secretly embed a signature in a picture,” Proceedings IMA Intellectual Property Project, pp. 187-206, 1994.
[3] S. H. Low, N. F. Maxemchuk, and A. M. Lapone, “Document identification for copyright protection using centroid detection,” IEEE Transactions on Communications, pp. 372-383, 1998.
[4] J. T. Brassil, S. H. Low, and N. F. Maxemchuk, “Copyright protection for the electronic distribution of text docu-ments,” Proceedings of IEEE, pp. 1181-1196, 1999.
[5] E. Koch and J. Zhao, “Embedding robust labels into im-ages for copyright protection,” Proceedings of the Inter-national Congress on Intellectual Property Rights for Spe-cialized Information, Knowledge & New Technologies, 1995.
[6] M. Wu, E. Tang, and B. Liu, “Data hiding in digital binary images,” IEEE International Conference on Multimedia & Expo, 2000.
[7] C. Liu, Y. Dai, and Z. Wang, “A novel information hiding method in binary images,” Journal of Southeast University, 2003.
[8] M. Wu and B. Liu, “Data hiding in binary image for au-thentication and annotation,” IEEE Transations on Mul-timedia, pp. 528-538, 2004.
[9] M. Venkatesan, P. Meenakshidevi, K. Duraiswamy, and K. Thiagarajah, “A new data hiding scheme with quality control for binary images using block parity,” 3rd Inter. Symposium on Information Assurance and Security, pp. 468-471, 2007.
[10] H. Yang and A. C. Kot, “Pattern-based data hiding for binary image authentication by connectivity-preserving,” IEEE Transactions on Multimedia, Vol. 9, No. 3, pp. 475-486, 2007.
[11] J. Chen and T. S. Chen, “A new data hiding method in binary images,” Proceedings of 4th International Symposium on Multimedia Software Engineering, pp. 88-93, 2003.
[12] H. B. Zhang and L. Man, “Data hiding in binary line drawing images,” Wavelet Analysis and Pattern Recognition, ICWAPR, pp. 134-140, 2008.
[13] Y. J. Chang and J. C. Lin, “Data hiding using VQ index file,” Intelligence and Security Informatics, ISI 2008, pp. 230-232, 2008.
[14] H. Gou and M. Wu, “Improving embedding payload in binary images with super-pixels,” Image Processing, ICIP 2007, pp. 277-280, 2007.
[15] S. Huang and J. K. Wu, “Optical watermarking for printed document authentication,” Information Forensics and Security, Vol. 2, pp. 164-173, 2007.
[16] K. H. Jung, K. S. Ha, and K. Y. Yoo, “Data hiding in binary images by pixel-value weighting,” Convergence and Hybrid Information Technology, ICHIT 2008. pp. 262-265, 2008.
[17] A. M. Attar, O. Taheri, S. Sadri, and A. F. Rasoul, “Data hiding in halftone images using error diffusion halftoning with adaptive thresholding,” Electrical and Computer Engineering, CCECE 2006, pp. 2029-2032, 2006.

Copyright © 2022 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.