Reversible Data Hiding and Reversible Authentication Watermarking for Binary Images
DOI:
https://doi.org/10.14209/jcis.2008.4Abstract
Data hiding is a technique used to embed a sequence of bits in a host image with small visual deterioration and the means to extract it afterwards. Reversible data hiding allows, in addition, recovering the original cover-image exactly. Several reversible data hiding techniques have been developed but very few of them are appropriate for binary images. This paper proposes a reversible data hiding technique for binary images. This technique uses the Golomb code to compress prediction errors of low-visibility pixels, using its neighborhood as side information, to obtain the space to store the hidden data. The proposed technique is then used to reversibly authenticate binary images, including texts, drawings and halftones. All binary images we tested could be authenticated using the proposed technique, except unrealistically small or random images.Downloads
Download data is not yet available.
Downloads
Published
2015-06-18
How to Cite
Vicente Denser Pamboukian, S., & Yong Kim, H. (2015). Reversible Data Hiding and Reversible Authentication Watermarking for Binary Images. Journal of Communication and Information Systems, 23(1). https://doi.org/10.14209/jcis.2008.4
Issue
Section
Regular Papers
License
Authors who publish in this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a CC BY-NC 4.0 (Attribution-NonCommercial 4.0 International) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors can enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) before and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
___________
Received 2015-06-18
Accepted 2015-06-18
Published 2015-06-18
Accepted 2015-06-18
Published 2015-06-18