Advertisement

A General Data Hiding Framework and Multi-level Signature for Binary Images

  • Huijuan Yang
  • Alex C. Kot
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5041)

Abstract

This paper reviews techniques for binary images data hiding and watermarking and proposes a general framework for authentication purposes. Finally, a multi-level signature scheme is presented, which is effective to detect malicious tamperings conducted to an image.

Keywords

Discrete Cosine Transform Binary Image Document Image Data Hiding Message Authentication Code 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Chen, M., Wong, E.K., Memon, N., Adams, S.: Recent Development in Document Image Watermarking and Data Hiding. In: Proc. SPIE Conf., vol. 4518, pp. 166–176Google Scholar
  2. 2.
    Brassil, J.K., Low, S., Maxemchuk, N.F., O’Gorman, L.: Electronic Marking and Identification Techniques to Discourage Document Copying. IEEE Journal on Selected Areas in Communications 13(8), 1495–1504 (1995)CrossRefGoogle Scholar
  3. 3.
    Brassil, J.K., Low, S., Maxemchuk, N.F.: Copyright Protection for the Electronic Distribution of Text Documents. Proceedings of the IEEE 87(7), 1181–1196 (1999)CrossRefGoogle Scholar
  4. 4.
    Chotikakamthorn, N.: Electronic Document Data Hiding Technique using Inter-Character Space. In: The 1998 IEEE Asia-Pacific Conf. on Circuits and Systems, November 1998, pp. 419–422 (1998)Google Scholar
  5. 5.
    Chotikakamthorn, N.: Document Image Data Hiding Technique Using Character Spacing Width Sequence Coding. In: Proc. of 1999 Int. Conf. on Image Processing, October 1999, vol. 2, pp. 250–254 (1999)Google Scholar
  6. 6.
    Huang, D., Yan, H.: Interword Distance Changes Represented by Sine Waves for Watermarking Text Images. IEEE Trans. on Circuits and Systems for Video Technology 11(12), 1237–1245 (2001)CrossRefGoogle Scholar
  7. 7.
    Kim, Y.-W., Moon, K.-A., Oh, I.-S.: A Text Watermarking Algorithm based on Word Classification and Inter-Word Space Statistics. In: Proc. of Seventh Int. Conf. on Document Analysis and Recognition, August 2003, vol. 4, pp. 775–779 (2003)Google Scholar
  8. 8.
    Yang, H., Kot, A.C.: Text Document Authentication by Integrating Inter Character and Word Spaces Watermarking. In: Proc. of the 2004 IEEE Int. Conf. on Multimedia and Expo (ICME 2004), June 27-30, 2004, vol. 2, pp. 955–958 (2004)Google Scholar
  9. 9.
    Zou, D., Shi, Y.Q.: Formatted Text Document Data Hiding Robust to Printing, Copying and Scanning. In: Proc. of IEEE Int. Symp. on Circuits and Systems (ISCAS 2005), May 23-26, 2005, vol. 5, pp. 4971–4974 (2005)Google Scholar
  10. 10.
    Amamo, T., Misaki, D.: A Feature Calibration Method for Watermarking of Document Images. In: Proc. 5th Int. Conf. on Document Analysis and Recognition, Bangalore, India, pp. 91–94 (1999)Google Scholar
  11. 11.
    Pan, H.-K., Chen, Y.-Y., Tseng, Y.-C.: A Secure Data Hiding Scheme for Two-Color Images. In: Proc. of the Fifth Symp. on Computers and Communications, July 3-6, 2000, pp. 750–755 (2000)Google Scholar
  12. 12.
    Tseng, Y.C., Pan, H.-K.: Data Hiding in 2-Color Images. IEEE Trans. on Computers 51(7), 873–878 (2002)MathSciNetCrossRefGoogle Scholar
  13. 13.
    Wu, M., Tang, E., Liu, B.: Data Hiding in Digital Binary Image. In: IEEE Int. Conf. on Multimedia and Expo., New York, July 30 - August 2, vol. 1, pp. 393–396 (2000)Google Scholar
  14. 14.
    Wu, M., Liu, B.: Data Hiding in Binary Images for Authentication and Annotation. IEEE Trans. on Multimedia 6(4), 528–538 (2004)CrossRefGoogle Scholar
  15. 15.
    Yang, H., Kot, A.C.: Data hiding for Bi-level Documents Using Smoothing Techniques. In: Proc. of the 2004 IEEE Int. Symp. on Cirsuits and Systems (ISCAS 2004), May 23-26, 2004, vol. 5, pp. 692–695 (2004)Google Scholar
  16. 16.
    Kim, H.Y., de Queiroz, R.L.: A Public-Key Authentication Watermarking for Binary Images. In: Proc. of the IEEE Int. Conf. on Image Processing (ICIP 2004), October 2004, vol. 5, pp. 3459–3462 (2004)Google Scholar
  17. 17.
    Pamboukian, S.V.D., Kim, H.Y., de Queiroz, R.L.: Watermarking JBIG2 Text Region for Image Authentication. In: Proc. of the IEEE Int. Conf. on Image Processing (ICIP 2005), September 11-14, 2005, vol. 2, pp. 1078–1081 (2005)Google Scholar
  18. 18.
    Kim, H.Y.: A New Public-Key Authentication Watermarking for Binary Document Images Resistant to Parity Attacks. In: Prof. IEEE Int. Conf. on Image Processing (ICIP 2005), September 11-14, 2005, vol. 2, pp. 1074–1077 (2005)Google Scholar
  19. 19.
    Mei, Q., Wong, E.K., Memon, N.: Data Hiding in Binary Text Document. In: Proceedings of SPIE, vol. 4314, pp. 369–375 (2001)Google Scholar
  20. 20.
    Yang, H., Kot, A.C., Liu, J.: Semi-fragile Watermarking for Text Document Images Authentication. In: Proc. of the IEEE Int. Symp. on Circuits and Systems (ISCAS 2005), May 2005, vol. 4, pp. 4002–4005 (2005)Google Scholar
  21. 21.
    Liu, J., Yang, H., Kot, A.C.: Relationships And Unification of Binary Images Data-Hiding Methods. In: Proc. of the IEEE Int. Conf. on Image Processing, vol. 1, pp. 981–984 (2005)Google Scholar
  22. 22.
    Zhao, J., Koch, E.: Embedding Robust Labels into Images for Copyright Protection. In: Proc. of the Int. Congress on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies, Vienna, August 1995, pp. 1–10 (1995)Google Scholar
  23. 23.
    Hu, S.: Document Image Watermarking Algorithm Based on Neighborhood Pixel Ratio. In: Proc. of the Int. Conf. of Acoustics, Speech, and Signal Processing 2005 (ICASSP 2005), March 18-23, 2005, vol. 2, pp. 841–844 (2005)Google Scholar
  24. 24.
    Yang, H., Kot, A.C.: Data Hiding For Text Document Image Authentication by Connectivity-Preserving. In: Proc. of the IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP 2005), March 18-23, 2005, vol. 2, pp. 505–508 (2005)Google Scholar
  25. 25.
    Yang, H., Kot, A.C.: Pattern-Based Data Hiding for Binary Image Authentication By Connectivity-Preserving. IEEE Transactions On Multimedia 9(3), 475–486 (2007)CrossRefGoogle Scholar
  26. 26.
    Pan, G., Wu, Z., Pan, Y.: A Data Hiding Method for Few-Color Images. In: Proc. of the IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP 2002), May 13-17, 2002, vol. 4, pp. 3469–3472 (2002)Google Scholar
  27. 27.
    Lu, H., Kot, A.C., Shi, Y.Q.: Distance-Reciprocal Distortion Measure for Binary Document Images. IEEE Signal Processing Letters 11(2), 228–231 (2004)CrossRefGoogle Scholar
  28. 28.
    Cheng, J., Kot, A.C.: Objective Distortion Measure for Binary Images. In: IEEE Region 10 Conference TENCON 2004, November 21-24, 2004, vol. 1, pp. 355–358 (2004)Google Scholar
  29. 29.
    Ho, A.T.S., Puhan, N.B., Marziliano, P., Makur, A., Guan, Y.L.: Perception Based Binary Image Watermarking. In: Proc. of the 2004 Int. Symp. on Circuits and Systems (ISCAS 2004), May 23-26, 2004, vol. 2, pp. 37–40 (2004)Google Scholar
  30. 30.
    Lu, H., Kot, A.C., Cheng, J.: Secure Data Hiding in Binary Images for Authentication. In: Proc. of the 2003 Int. Symp. on Circuits and Systems (ISCAS 2003), May 25-28, 2003, vol. 3, pp. 806–809 (2003)Google Scholar
  31. 31.
    Hwang, K.-F., Chang, C.-C.: A Run-length Mechanism for Hiding Data into Binary Images. In: Proc. of Pacific Rim Workshop on Digital Steganography, Kitakyushu, Japan, July 2002, pp. 71–74 (2002)Google Scholar
  32. 32.
    Agaian, S.S., Cherukuri, R.C.: Run length Based Steganography for Binary Images. In: Pal, S.K., Bandyopadhyay, S., Biswas, S. (eds.) PReMI 2005. LNCS, vol. 3776, pp. 481–484. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  33. 33.
    Korzhik, V., M.-Luna, G., Marakov, D., Marakova, I.: Watermarking of Binary Messages in Conditions of an Additive Binary Noise Attack. IEEE Signal Processing Letters 10(9), 277–279 (2003)CrossRefGoogle Scholar
  34. 34.
    Tzeng, C.-H., Tsai, W.-H.: A New Approach to Authentication of Binary Images for Multimedia Communication with Distortion Reduction and Security Enhancement. IEEE Communications Letters 7(9), 443–445 (2003)CrossRefGoogle Scholar
  35. 35.
    Liu, T.-H., Chang, L.-W.: An Adaptive Data Hiding Technique for Binary Images. In: Proc. of the 17th Int. Conf. on Pattern Recognition (ICPR 2004), August 23-26, vol. 4, pp. 831–834 (2004)Google Scholar
  36. 36.
    Kim, H.Y., de Queiroz, R.L.: Alteration-Locating Authentication Watermarking for Binary Images. In: Proc. Int. Workshop on Digital Watermarking, pp. 125–136 (2004)Google Scholar
  37. 37.
    Yang, H., Kot, A.C.: Binary Image Authentication With Tampering Localization By Embedding Cryptographic Signature and Block Identifier. IEEE Signal Processing Letters 13(12), 741–744 (2006)CrossRefGoogle Scholar
  38. 38.
    Fridrich, J., Goljan, M., Lisonek, P., Soukal, D.: Writing on Wet Paper. IEEE Trans. on Signal Processing 53(10), 3923–3935 (2005)MathSciNetCrossRefGoogle Scholar
  39. 39.
    Wu, M., Fridrich, J., Goljan, M., Gou, H.: Handling Uneven Embedding Capacity in Binary Images: A Revisit. In: SPIE Conference on Security, Watermarking and Stegonography, San Jose, CA, Proc. of SPIE, January 2005, vol. 5681, pp. 194–205 (2005)Google Scholar
  40. 40.
    Markur, A.: Self-Embedding and Restoration Algorithms for Document Watermark. In: Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP 2005), March 2005, vol. 2, pp. 1133–1136 (2005)Google Scholar
  41. 41.
    Liu, Y., Mant, J., Wong, E., Low, S.H.: Marking and Detection of Text Documents Using Transform-domain Techniques. In: Proc. of SPIE, Electronic Imaging (EI 1999) Conference on Security and Watermarking of Multimedia Contents, San Jose, CA, vol. 3657, pp. 317–328 (1999)Google Scholar
  42. 42.
    Lu, H., Shi, X., Shi, Y.Q., Kot, A.C., Chen, L.: Watermark Embedding in DC Components of DCT for Binary Images. In: 2002 IEEE Workshop on Multimedia Signal Processing, December 9-11, 2002, pp. 300–303 (2002)Google Scholar
  43. 43.
    Yang, H., Kot, A.C., Rahardja, S., Jiang, X.: High Capacity Data Hiding for Binary Images in Morphological Wavelet Transform Domain. In: Proc. of the IEEE Int. Conf. on Multimedia & Expo (ICME 2007), July 2-5, 2007, pp. 1239–1242 (2007)Google Scholar
  44. 44.
    Heijmans, H.J.A.M., Goutsias, J.: Nonlinear Multiresolution Signal Decomposition Schemes-Part II: Morphological Wavelets. IEEE Trans. on Image Processing 9(11), 1897–1913 (2000)MathSciNetCrossRefzbMATHGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Huijuan Yang
    • 1
  • Alex C. Kot
    • 1
  1. 1.School of Electrical & Electronic EngineeringNanyang Technological UniversitySingapore

Personalised recommendations