DocumentCode :
49254
Title :
On Establishing Edge Adaptive Grid for Bilevel Image Data Hiding
Author :
Hong Cao ; Kot, Alex C.
Author_Institution :
Data Analytics Dept., A*STAR, Singapore, Singapore
Volume :
8
Issue :
9
fYear :
2013
fDate :
Sept. 2013
Firstpage :
1508
Lastpage :
1518
Abstract :
We propose, in this paper, a novel edge-adaptive data hiding method for authenticating binary host images. Through establishing a dense edge-adaptive grid (EAG) along the object contours, we use a simple binary image to show that EAG more efficiently selects good data carrying pixel locations (DCPL) associated with “ l-shaped” patterns than block-based methods. Our method employs a dynamic system structure with the redesigned fundamental content adaptive processes (CAP) switch to iteratively trace new contour segments and to search for new DCPLs. By maintaining and updating a location status map, a protective mechanism is proposed to preserve the context of each CAP and their corresponding outcomes. We prove that our method is robust against the interferences caused by close-by contours, image noises, and invariantly selects the same sequence of DCPLs for an arbitrary binary host image and its various marked versions. Comparison shows that our method achieves a good tradeoff between large payload and minimal visual distortion as compared with several classic prior arts for diverse types of binary host images. Moreover, our method well supports state-of-the-art hybrid authentication that integrates data hiding and modern cryptographic techniques.
Keywords :
cryptography; data encapsulation; distortion; edge detection; image denoising; image segmentation; image sequences; image watermarking; iterative methods; CAP; DCPL; EAG; arbitrary binary host image authentication; bilevel image data hiding; close-by contour; content adaptive process; cryptographic technique; data carrying pixel location; dynamic system structure; edge adaptive data hiding method; edge adaptive grid; hybrid authentication; image noise; image sequence; iteratively contour segment tracing; location status map; minimal visual distortion; object contour; payload; protective mechanism; Authentication; Clocks; Engines; Image edge detection; Image segmentation; Payloads; Authentication; binary; contour tracing; data hiding; steganography; watermarking;
fLanguage :
English
Journal_Title :
Information Forensics and Security, IEEE Transactions on
Publisher :
ieee
ISSN :
1556-6013
Type :
jour
DOI :
10.1109/TIFS.2013.2274041
Filename :
6563166
Link To Document :
بازگشت