scispace - formally typeset
Journal ArticleDOI

Data hiding in binary image for authentication and annotation

Min Wu, +1 more
- 01 Aug 2004 - 
- Vol. 6, Iss: 4, pp 528-538
TLDR
The proposed data embedding method can be used to detect unauthorized use of a digitized signature, and annotate or authenticate binary documents, and presents analysis and discussions on robustness and security issues.
Abstract
This paper proposes a new method to embed data in binary images, including scanned text, figures, and signatures. The method manipulates "flippable" pixels to enforce specific block-based relationship in order to embed a significant amount of data without causing noticeable artifacts. Shuffling is applied before embedding to equalize the uneven embedding capacity from region to region. The hidden data can be extracted without using the original image, and can also be accurately extracted after high quality printing and scanning with the help of a few registration marks. The proposed data embedding method can be used to detect unauthorized use of a digitized signature, and annotate or authenticate binary documents. The paper also presents analysis and discussions on robustness and security issues.

read more

Citations
More filters

(Journal of Systems and Software, 81(1):150-158)A high quality steganographic method with pixel-value differencing and modulus function

TL;DR: A new image steganographic technique capable of producing a secret-embedded image that is totally indistinguishable from the original image by the human eye is proposed, and the proposed scheme is secure against the RS detection attack.
Journal ArticleDOI

A high quality steganographic method with pixel-value differencing and modulus function

TL;DR: Wang et al. as mentioned in this paper proposed an image steganographic technique capable of producing a secret-embedded image that is totally indistinguishable from the original image by the human eye, which avoids the falling-off-boundary problem by using pixel-value differencing and the modulus function.
Journal ArticleDOI

Book review: Applied cryptography: Protocols, algorithms, and source code in C

TL;DR: This is Applied Cryptography Protocols Algorithms And Source Code In C Applied Cryptographic Protocols algorithms and Source Code in C By Schneier Bruce Author Nov 01 1995 the best ebook that you can get right now online.
Journal Article

Data Hiding: Current Status and Key Issues

TL;DR: This survey paper is focused on the development and current status of steganographic techniques for grayscale images, and shall separately introduce schemes with high hiding capacities and scheme with high imperceptibility.
Journal ArticleDOI

Reference Sharing Mechanism for Watermark Self-Embedding

TL;DR: The lower the tampering rate, the more levels of content data are recovered, and the better the quality of restored results.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Book

Digital Watermarking

TL;DR: Digital Watermarking covers the crucial research findings in the field and explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied.
Journal ArticleDOI

Information hiding-a survey

TL;DR: An overview of the information-hiding techniques field is given, of what the authors know, what works, what does not, and what are the interesting topics for research.
Journal ArticleDOI

Multimedia watermarking techniques

TL;DR: The basic concepts of watermarking systems are outlined and illustrated with proposed water marking methods for images, video, audio, text documents, and other media.
Book

Algorithms in C

TL;DR: Algorithms in C is a comprehensive repository of algorithms, complete with code, with extensive treatment of searching and advanced data structures, sorting, string processing, computational geometry, graph problems, and mathematical algorithms.
Related Papers (5)