A Palette Based Approach for Invisible Digital Watermarking Using the Concept of Run-Length
26 Nov 2010-pp 83-87
TL;DR: A technique for hiding the data of images using palette based approach with the concept of run length has been proposed and both the image is initially quantized using the palette.
Abstract: In this paper, a technique for hiding the data of images using palette based approach with the concept of run length has been proposed. At the source, the image which is to be hidden (target image) is encoded within another image (cover image). Firstly, the cover image and the target image can be of any size which will be adjusted by our resize function thereby removing the size constraint. The final encrypted image (cover and target) image is sent over the network. This image is decoded at the receiver end. This approach is a palette based approach since both the image is initially quantized using the palette. The encoding of the target image at the sender end is done using the concept of run-length.
References
More filters
TL;DR: The proposed data embedding method can be used to detect unauthorized use of a digitized signature, and annotate or authenticate binary documents, and presents analysis and discussions on robustness and security issues.
Abstract: This paper proposes a new method to embed data in binary images, including scanned text, figures, and signatures. The method manipulates "flippable" pixels to enforce specific block-based relationship in order to embed a significant amount of data without causing noticeable artifacts. Shuffling is applied before embedding to equalize the uneven embedding capacity from region to region. The hidden data can be extracted without using the original image, and can also be accurately extracted after high quality printing and scanning with the help of a few registration marks. The proposed data embedding method can be used to detect unauthorized use of a digitized signature, and annotate or authenticate binary documents. The paper also presents analysis and discussions on robustness and security issues.
395 citations
"A Palette Based Approach for Invisi..." refers background in this paper
...Send only the final Image over the network to reach the intended destination....
[...]
TL;DR: The algorithm can embed efficiently a large amount of data that has been reached to 75% of the image size with high quality of the output and make comparison with the previous Steganography algorithms like S-Tools.
Abstract: This study deals with constructing and implementing new algorithm based on hiding a large amount of data (image, audio, text) file into color BMP image. We have been used adaptive image filtering and adaptive image segmentation with bits replacement on the appropriate pixels. These pixels are selected randomly rather than sequentially by using new concept defined by main cases with their sub cases for each byte in one pixel. This concept based on both visual and statistical. According to the steps of design, we have been concluded 16 main cases with their sub cases that cover all aspects of the input data into color bitmap image. High security layers have been proposed through three layers to make it difficult to break through the encryption of the input data and confuse steganalysis too. Our results against statistical and visual attacks are discussed and make comparison with the previous Steganography algorithms like S-Tools. We show that our algorithm can embed efficiently a large amount of data that has been reached to 75% of the image size with high quality of the output.
172 citations
"A Palette Based Approach for Invisi..." refers background in this paper
...Send only the final Image over the network to reach the intended destination....
[...]
01 May 2001
TL;DR: A web based image authentication method based in digital watermarking can provide more controls to image owners and conveniences to clients who want to get authenticity of image by integrating benefits of using Internet to the watermark system.
Abstract: The demand of security is getting higher in these days due to easy reproduction of digitally created multimedia data. Digital watermark is the emerging technique to embed secret information into content for copyright protection and authentication. Watermark is embedded within an image that alteration and modification to the watermarked image can be detected in a fragile watermark system. Watermark detection is blind that does not require an original image and it is invisible to avoid revealing secret information to malicious attackers. A web based image authentication method based in digital watermarking is described in this paper. It can provide more controls to image owners and conveniences to clients who want to get authenticity of image by integrating benefits of using Internet to the watermark system.
55 citations
"A Palette Based Approach for Invisi..." refers background in this paper
...Send only the final Image over the network to reach the intended destination....
[...]
01 Jan 2008
TL;DR: This paper has discussed a new steganographic technique based on the file hybridization that works on more than one image, and it has been shown that a multi-level of security of data can be achieved.
Abstract: Summary The growing possibilities of modern communication need the special means of security especially on computer network. Data security in the last few years has gained a wider audience. In this paper we have discussed a new steganographic technique based on the file hybridization. In contrast to other methods of steganography where data embedding in image work on the principle of only one image file, the proposed method works on more than one image. The effectiveness of the proposed method is described pictorially and also has been shown that a multi-level of security of data can be achieved.
43 citations
"A Palette Based Approach for Invisi..." refers background in this paper
...Send only the final Image over the network to reach the intended destination....
[...]
Journal Article•
28 Aug 2008-World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering
TL;DR: A novel approach of image embedding is introduced that embeds three images in one image and includes, as a special case of data embedding, information hiding, identifying and authenticating text embedded within the digital images.
Abstract: In this study, a novel approach of image embedding is introduced. The proposed method consists of three main steps. First, the edge of the image is detected using Sobel mask filters. Second, the least significant bit LSB of each pixel is used. Finally, a gray level connectivity is applied using a fuzzy approach and the ASCII code is used for information hiding. The prior bit of the LSB represents the edged image after gray level connectivity, and the remaining six bits represent the original image with very little difference in contrast. The proposed method embeds three images in one image and includes, as a special case of data embedding, information hiding, identifying and authenticating text embedded within the digital images. Image embedding method is considered to be one of the good compression methods, in terms of reserving memory space. Moreover, information hiding within digital image can be used for security information transfer. The creation and extraction of three embedded images, and hiding text information is discussed and illustrated, in the following sections. Keywords—Image embedding, Edge detection, gray level connectivity, information hiding, digital image compression.
43 citations
"A Palette Based Approach for Invisi..." refers background in this paper
...Send only the final Image over the network to reach the intended destination....
[...]