Skip to main content

Lossless Data Hiding for Halftone Images

  • Chapter
Information Hiding and Applications

Part of the book series: Studies in Computational Intelligence ((SCI,volume 227))

Summary

With the development of image halftoning techniques and computer networks, a large quantity of digital halftone images are produced and transmitted in the Internet. Meanwhile, hiding data in images becomes a powerful approach for covert communications, copyright protection, owner announcement, content authentication, traitor tracing, etc. This chapter proposes two look-up table based methods to hide data in the cover media of halftone images. Both of them belong to lossless data hiding techniques, i.e., not only the secret data but also the original cover image can be accurately recovered in data extraction when the stego image is intact. Besides, an application example of the proposed method in lossless content authentication is illustrated. Furthermore, a data capacity enhancement strategy is introduced based on a statistical property of error diffused halftone image micro structure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Baharav, Z., Shaked, D.: Watermarking of dither halftone images, Hewlett-Packard Labs Tech. Rep., HPL-98-32 (1998)

    Google Scholar 

  2. Cheung, S.M., Chan, Y.H.: A technique for lossy compression of error-diffused halftones. In: Proc. of ICME, pp. 1083–1086 (2004)

    Google Scholar 

  3. Floyd, R., Steinberg, L.: An adaptive algorithm for spatial gray scale, Society for Information Display Symp. Tech. Papers, 36–37 (1975)

    Google Scholar 

  4. Fridrich, J., Goljan, M., Du, R.: Lossless data embedding — New paradigm in digital watermarking. EURASIP Journal on Applied Signal Processing, 185–196 (2002)

    Google Scholar 

  5. Fu, M.S., Au, O.C.: Data hiding watermarking for halftone images. IEEE Trans. Image Processing. 11, 477–484 (2002)

    Article  Google Scholar 

  6. Hel-Or, H.Z.: Watermarking and copyright labeling of printed images. Journal of Electronic Imaging 10, 794–803 (2001)

    Article  Google Scholar 

  7. Jarvis, J.F., Judice, C.N., Ninke, W.H.: A survey of techniques for the display of continuous-tone pictures on bilevel displays. Computer Graphics Image Process 5, 13–40 (1976)

    Article  Google Scholar 

  8. Kim, H.Y., Afif, A.: Secure authentication watermarking for binary images. In: Proc. Brazilian Symp. on Computer Graphics and Image Processing, pp. 199–206 (2003)

    Google Scholar 

  9. Liao, P.S., Pan, J.S., Chen, Y.H., Liao, B.Y.: A lossless watermarking technique for halftone images. In: Proc. Knowledge-Based Intelligent Information and Engineering Systems, vol. 2, pp. 593–599 (2005)

    Google Scholar 

  10. Lieberman, D., Allebach, J.: Digital halftoning using the direct binary search algorithm. In: Proc. IST Int’l Conf. on High Technology, pp. 114–124 (1996)

    Google Scholar 

  11. Lu, Z.M., Luo, H., Pan, J.S.: Reversible watermarking for error diffused halftone images using statistical features. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 71–81. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  12. Luo, H., Chu, S.C., Lu, Z.M.: Self embedding watermarking using halftoning technique. Circuits Systems and Signal Processing 27, 155–170 (2008)

    Article  MathSciNet  Google Scholar 

  13. Pappas, T.N., Neuhoff, D.L.: Least-squares model based halftoning. IEEE Trans. Image Processing 8, 1102–1116 (1999)

    Article  Google Scholar 

  14. Pan, J.S., Huang, H.C., Jain, L.C. (eds.): Intelligent Watermarking Techniques. World Scientific Publishing Company, Singapore (2004)

    MATH  Google Scholar 

  15. Pan, J.S., Luo, H., Lu, Z.M.: A lossless watermarking scheme for halftone image authentication. International Journal of Computer Science and Network Security 6, 147–151 (2006)

    Google Scholar 

  16. Pei, S.C., Guo, J.M.: Hybrid pixel-based data hiding and block-based watermarking for error-diffused halftone images. IEEE Trans. Circuits and Systems for Video Technology 13, 867–884 (2003)

    Article  Google Scholar 

  17. Rivest, R.L.: The MD5 Message digest algorithm, Technical Report of MIT Laboratory for Computer Science and RSA Data Security (1992)

    Google Scholar 

  18. Stucki, P.: MECCA — A multiple error correcting computation algorithm for bilevel image hardcopy reproduction, Research Report RZ1060, IBM Res. Lab., Zurich, Switzerland (1981)

    Google Scholar 

  19. Sun, Z.: Video halftoning. IEEE Trans. Image Processing 15, 678–686 (2006)

    Article  Google Scholar 

  20. Ulichney, R.: Digital Halftoning. MIT Press, Cambridge (1987)

    Google Scholar 

  21. Valliappan, M., Evans, B.L., Tompkins, D.A.D., Kossentini, F.: Lossy compression of stochastic halftones with JBIG2. In: Proc. Int’l Conf. on Image Processing, pp. 214–218 (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Yu, FX., Luo, H., Chu, SC. (2009). Lossless Data Hiding for Halftone Images. In: Pan, JS., Huang, HC., Jain, L.C. (eds) Information Hiding and Applications. Studies in Computational Intelligence, vol 227. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02335-4_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02335-4_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02334-7

  • Online ISBN: 978-3-642-02335-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics