Journal ArticleDOI
Data hiding in binary image for authentication and annotation
TLDR
The proposed data embedding method can be used to detect unauthorized use of a digitized signature, and annotate or authenticate binary documents, and presents analysis and discussions on robustness and security issues.Abstract:
This paper proposes a new method to embed data in binary images, including scanned text, figures, and signatures. The method manipulates "flippable" pixels to enforce specific block-based relationship in order to embed a significant amount of data without causing noticeable artifacts. Shuffling is applied before embedding to equalize the uneven embedding capacity from region to region. The hidden data can be extracted without using the original image, and can also be accurately extracted after high quality printing and scanning with the help of a few registration marks. The proposed data embedding method can be used to detect unauthorized use of a digitized signature, and annotate or authenticate binary documents. The paper also presents analysis and discussions on robustness and security issues.read more
Citations
More filters
(Journal of Systems and Software, 81(1):150-158)A high quality steganographic method with pixel-value differencing and modulus function
TL;DR: A new image steganographic technique capable of producing a secret-embedded image that is totally indistinguishable from the original image by the human eye is proposed, and the proposed scheme is secure against the RS detection attack.
Journal ArticleDOI
A high quality steganographic method with pixel-value differencing and modulus function
TL;DR: Wang et al. as mentioned in this paper proposed an image steganographic technique capable of producing a secret-embedded image that is totally indistinguishable from the original image by the human eye, which avoids the falling-off-boundary problem by using pixel-value differencing and the modulus function.
Journal ArticleDOI
Book review: Applied cryptography: Protocols, algorithms, and source code in C
TL;DR: This is Applied Cryptography Protocols Algorithms And Source Code In C Applied Cryptographic Protocols algorithms and Source Code in C By Schneier Bruce Author Nov 01 1995 the best ebook that you can get right now online.
Journal Article
Data Hiding: Current Status and Key Issues
Nan-I Wu,Min-Shiang Hwang +1 more
TL;DR: This survey paper is focused on the development and current status of steganographic techniques for grayscale images, and shall separately introduce schemes with high hiding capacities and scheme with high imperceptibility.
Journal ArticleDOI
Reference Sharing Mechanism for Watermark Self-Embedding
TL;DR: The lower the tampering rate, the more levels of content data are recovered, and the better the quality of restored results.
References
More filters
Journal ArticleDOI
Secure spread spectrum watermarking for multimedia
TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Book
Digital Watermarking
TL;DR: Digital Watermarking covers the crucial research findings in the field and explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied.
Journal ArticleDOI
Information hiding-a survey
TL;DR: An overview of the information-hiding techniques field is given, of what the authors know, what works, what does not, and what are the interesting topics for research.
Journal ArticleDOI
Multimedia watermarking techniques
Frank Hartung,Martin Kutter +1 more
TL;DR: The basic concepts of watermarking systems are outlined and illustrated with proposed water marking methods for images, video, audio, text documents, and other media.
Book
Algorithms in C
TL;DR: Algorithms in C is a comprehensive repository of algorithms, complete with code, with extensive treatment of searching and advanced data structures, sorting, string processing, computational geometry, graph problems, and mathematical algorithms.