20
Views
4
CrossRef citations to date
0
Altmetric
Original Article

Data hiding of digital images based on bit position and parity bit

Pages 329-337 | Accepted 24 Mar 2010, Published online: 12 Nov 2013

REFERENCES

  • Wu, M. N., Lin, C. C. and Chang, C. C. An embedding technique based upon block prediction. J. Syst. Software, 2008, 81, 1505–1516.
  • Suthaharan, S. Fragile image watermarking using a gradient image for improved localization and security. Patt. Recogn. Lett., 2004, 25, 1893–1903.
  • Tadiparthi, G. R. and Sueyoshi, T. A novel steganographic algorithm using animations as cover. Decis. Support Syst., 2008, 45, 937–948.
  • Boato, G., Natale, F. G. B. D., Fontanari, C. and Melgani, F. Hierarchical ownership and deterministic watermarking of digital images via polynomial interpolation. Signal Process.: Image Commun., 2006, 21, 573–585.
  • Luo, X. Y., Wang, D. S., Wang, P. and Liu, F. L. A review on blind detection for image steganography. Signal Process., 2008, 88, 2138–2157.
  • Tseng, H. W. and Chang, C. C. An extended difference expansion algorithm for reversible watermarking. Image Vision Comput., 2008, 26, 1148–1153.
  • Mielikainen, J. LSB matching revisited. IEEE Signal Process. Lett., 2006, 13, 285–287.
  • Wu, D. C. and Tsai, W. H. A steganographic method for images by pixel-value differencing. Patt. Recogn. Lett., 2003, 24, 1613–1626.
  • Chang, C. C. and Lin, P. Y. Adaptive watermark mechanism for rightful ownership protection. J. Syst. Software, 2008, 81, 1118–1129.
  • Wang, C. M., Wu, N. I., Tsai, C. S. and Hwang, M. S. A high quality steganographic method with pixel-value differencing and modulus function. J. Syst. Software, 2008, 81, 150–158.
  • Pan, G., Wu, Y. J. and Wu, Z. H. A novel data hiding method for two-color images. Lect. Notes Comput. Sci., 2001, 2229, 261–270.
  • Tseng, H. W., Wu, F. R. and Hsieh, C. P. Data hiding for binary images using weight mechanism. IIH-MSP, 2007, 1, 307–310.
  • Yang, H. and Kot, A. C. Pattern-based data hiding for binary image authentication by connectivity-preserving. IEEE Trans. Multimedia, 2007, 9, 475–486.
  • Tseng, Y. C. and Pan, H. K. Data hiding in 2-color images. IEEE Trans. Comput., 2002, 51, 873–878.
  • Chen, Y. Y., Pan, H. C. and Tseng, Y. C. A secure data hiding sheme for binary images. IEEE Trans. Commun., 2002, 50, 750–755.
  • Tsai, C. L, Chiang, H. F., Fan, K. C. and Chung, C. D. Reversible data hiding and lossless reconstruction of binary images using pair-wise logical computation mechanism. Patt. Recogn., 2005, 38, 1993–2006.
  • Chen, J. and Chen, T. S. A new data hiding method in binary images, Proc. 4th International Symposium on Multimedia software engineering: MSE 2002, Newport Beach, CA, USA, June 2002, IEEE, pp. 88–93.
  • Zhang, H. B. and Man, L. Data hiding in binary line drawing images, Proc. Int. Conf. on Wavelet analysis and pattern recognition: ICWAPR 2008, Hong Kong, China, August 2008, IEEE, pp. 134–140.
  • Gou, H. and Wu, W. Improving embedding payload in binary images with super-pixels, Proc. Int. Conf. on Image Processing: ICIP 2007, San Antonio, TX, USA, September 2007, IEEE Signal Processing Society, pp. 277–280.
  • Chang, C. C. and Tseng, H. W. A steganographic method for digital images using side-match. Patt. Recogn. Lett., 2004, 25, 1431–1437.
  • Liang, H., Ran, W and Nie, X. A secure and high capacity scheme for binary images, Proc. Int. Conf. on Wavelet analysis and pattern recognition: ICWAPR 2007, Bejing, China, November 2007, IEEE, Vol. 1, pp. 224–229.
  • Matsui, K. and Tanaka, K. In Proceedings of IMA Intellectual Property Project, 1994, pp. 187–206 (IMA, Annapolis, MD).
  • Low, S. H., Maxemchuk, N. F. and Lapone, A. M. Document identification for copyright protection using centroid detection. IEEE Trans. Commun., 1998, 46, 372–383.
  • Brassil, J. T., Low, S. H. and Maxemchuk, N. F. Copyright protection for the electronic distribution of text documents. Proc. IEEE, 1999, 87, 1181–1196.
  • Koch, E. and Zhao, J. Embedding robust labels into images for copyright protection, Proc. 1st Int. Cong. on Intellectual property rights for specialized information, knowledge and new technologies: KnowRight'95, Vienna, Austria, August 1995.
  • Wu, M., Tang, E. and Liu, B. Data hiding in digital binary images, Proc. IEEE Int. Conf. on Multimedia and Expo, New York, USA, July–August 2000, IEEE, pp. 393–396.
  • Liu, C., Dai, Y. and Wang, Z. A novel information hiding method in binary images. J. Southeast Univ., 2003, 33.
  • Wu, M. and Liu, B. Data hiding in binary image for authentication and annotation. IEEE Trans. Multimedia, 2004, 6, 528–538.
  • Venkatesan, M., Meenakshidevi, P., Duraiswamy, K. and Thiagarajah, K. A new data hiding scheme with quality control for binary images using block parity, Proc. 3rd Int. Symp. on Information assurance and security: IAS 2007, Manchester, UK, August 2007, IEEE Computer Society, pp. 468–471.
  • Cheng, J. and Kot, A. C. Objective distortion measure for binary text image based on edge line segment similarity. IEEE Trans. Image Process., 2007, 16, (6), 1691–1695.
  • Lu, H., Kot, A. C. and Shi, Y. Q. Distance-reciprocal distortion measure of binary document images. IEEE Signal Process. Lett., 2004, 11, (2), 228–231.
  • Chang, Y. J. and Lin, J. C. Data hiding using VQ index file, Proc. IEEE Int. Conf. on Intelligence and security informatics: ISI 2008, Taipei, Taiwan, June 2008, IEEE, pp. 230–232.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.