scispace - formally typeset
Open AccessJournal ArticleDOI

Hybrid pixel-based data hiding and block-based watermarking for error-diffused halftone images

Reads0
Chats0
TLDR
A kernels-alternated error diffusion (KAEDF) technique is proposed for embedding watermarks into error-diffused images, and the correct decoding rates for both techniques are high and extremely robust, even after printing and scanning processes.
Abstract
A low computational complexity noise-balanced error diffusion (NBEDF) technique is proposed for embedding watermarks into error-diffused images. The visual decoding pattern can be perceived when two or more similar NBEDF images are overlaid, even in a high activity region. Also, with the modified improved version of NBEDF, two halftone images can be made from two totally different gray-tone images, and still provide a clear and sharp visual decoding pattern. With self-decoding techniques, we can also decode the pattern with only one NBEDF image. However, the NBEDF method is not so robust to damage due to printing or other distortions. Thus, a kernels-alternated error diffusion (KAEDF) technique is proposed. By using them alternately in the halftone process, we find that two well-known kernels (Jarvis, J.F. et al., 1976; Stucki, P., 1981) are compatible. In the decoder, because the spectral distributions of Jarvis and Stucki kernels are different in the 2D fast Fourier transform domain, we use the cumulative squared Euclidean distance criterion to determine each cell in a watermarked halftone image belonging to either Jarvis or Stucki, and then decode the watermark. Furthermore, because the detailed textures of Jarvis and Stucki patterns are somewhat different in the spatial domain, the lookup table (LUT) technique is also used for fast decoding. From simulation results, the correct decoding rates for both techniques are high and extremely robust, even after printing and scanning processes. Finally, we extend the hybrid NBEDF and KAEDF algorithms to two color EDF halftone images, where 8 independent KAEDF watermarks and 16 NBEDF watermarks can be inserted and still achieve a high-quality result.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings Article

Image Processing

TL;DR: The main focus in MUCKE is on cleaning large scale Web image corpora and on proposing image representations which are closer to the human interpretation of images.
Journal ArticleDOI

Survey of robust and imperceptible watermarking

TL;DR: The paper introduces elementary concepts of digital watermarking, characteristics and novel applications of watermark in detail, and various analysis and comparison of different notable water marking techniques are discussed in tabular format.
Proceedings ArticleDOI

Grey level modification steganography for secret communication

TL;DR: This paper presents a steganographic algorithm, which is an information hiding technique which allows secret communication, to cover and recover hidden information within the spatial domain of the image, which has low computational complexity and high information hiding capacity.
Journal ArticleDOI

A Robust Image Watermarking in the Ridgelet Domain Using Universally Optimum Decoder

TL;DR: Simulation shows outstanding robustness of the proposed scheme against common attacks, especially additive white noise and JPEG compression.
Journal ArticleDOI

Content-Based Image Retrieval Using Error Diffusion Block Truncation Coding Features

TL;DR: The proposed EDBTC is not only examined with good capability for image compression but also offers an effective way to index images for the content-based image retrieval system.
References
More filters
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Proceedings ArticleDOI

Safeguarding cryptographic keys

TL;DR: Certain cryptographic keys, such as a number which makes it possible to compute the secret decoding exponent in an RSA public key cryptosystem, 1 , 5 or the system master key and certain other keys in a DES cryptos system, 3 are so important that they present a dilemma.
Proceedings Article

Image Processing

TL;DR: The main focus in MUCKE is on cleaning large scale Web image corpora and on proposing image representations which are closer to the human interpretation of images.

Safeguarding cryptographic keys

TL;DR: Certain cryptographic keys, such as a number which makes it possible to compute the secret decoding exponent in an RSA public key cryptosSystem,1,5 or the system master key and certain other keys in a DES cryptosystem,3 are so important that they present a dilemma.
Book

Digital Halftoning