Direct Binary Search Based Algorithms for Image Hiding

Size: px
Start display at page:

Download "Direct Binary Search Based Algorithms for Image Hiding"

Transcription

1 1 Xia ZHUGE, 2 Koi NAKANO 1 School of Electron and Information Engineering, Ningbo University of Technology, No.20 Houhe Lane Haishu District, , Ningbo, Zheiang, China zhugexia2@163.com *2 Department of Information Engineering, Hiroshima University, Kagamiyama, Higashi-Hiroshima , Japan nakano@cs.hiroshima-u.ac.p Abstract Digital halftoning is an important process to convert a continuous-tone image into a binary image with pure black and white pixels. The Direct Binary Search (DBS) is one of the well-known halftoning methods that can generate high quality binary images. The main contribution of this paper is to present a DBS based halftoning method that conceals a binary image into two binary images. More specifically, three distinct gray scale images are given, such that one of them should be hidden in the other two gray scale images. Our DBS based halftoning method generates three binary images that reproduce the tone of the corresponding original three gray scale images. Quite surprisingly, the secret binary image can be seen by overlapping the other two binary images. In other words, the secret binary image is hidden in two public binary images. Also, it is very hard to guess the secret images using only one of the two public images, and both of these two public images are necessary to get the secret image. Another contribution of this paper is to extend our DBS based halftoning method to hide one image and more than one image into more than two images. The resulting images show that our DBS based halftoning method hides and recovers the original images. Hence, our DBS based halftoning technique can be used for watermarking as well as amusement purpose. Keywords: Image Processing, Printing, Halftoning, Direct Binary Search, DBS, Image Hiding, Watermarking, Amusement 1. Introduction Halftoning is an important process to convert a continuous-tone image into a binary image [6] that eye perceives as a continuous-tone image. This process is necessary when printing a monochrome or color image by a printer with limited number of ink colors. It is required to generate a binary image that reproduces the tone and the details of the original gray scale image. Many kinds of halftoning methods have been proposed: screening, error diffusion, and search-based iterative methods. In screening, the binary value of the halftone image is obtained by comparing pixels values of the continuous-tone image with the corresponding threshold values [1]. In Error Diffusion [4, 11, 15], the pixelby-pixel comparison with a threshold is also required, but after a pixel is binarized, the rounding error is propagated to its unprocessed neighboring pixels according to some fixed ratios. Search-based iterative methods [2, 6, 7, 13, 14] are to find the best values of binary pixels which can minimize a perceived [2, 13, error between the continuous-tone image and the halftone image. The Direct Binary Search (DBS) 14] is one of the search-based iterative methods, which generates good quality binary images. Digital watermarking is to embed messages into digital contents (audio, video, images, text) which can be detected or extracted later. One role of digital watermarking is to embed copyright information of the content which is supposed not to be visible, but can be retrieved by electronic devices [9][16]. Another role of digital watermarking is known as steganography, which hides messages in content without typical citizens or public authorities noticing its presence, and ust special recipients can decode the hidden messages. Many methods for digital watermarking via halftone images have been proposed. One kind of these methods is to embed an invisible watermark into a halftone image and the hidden information can be extracted with some special procedure. Goldschneider and Riskin [5] proposed an embedding method using scalar quantizers or vector quantizers to embed a low bit-depth halftone image into a higher bitdepth halftone image. Also the hidden image can be extracted from the higher bit-depth image simply International Journal of Digital Content Technology and its Applications(JDCTA) Volume6,Number23,December 2012 doi: /dcta.vol6.issue

2 by masking some bits off. Baharav and Shaked [3] used a sequence of two different dither matrices to hide watermark into images in halftoning process. And the order of the used matrices is the binary representation of the watermark. Wang and Knox [12] embedded digital watermark in halftone screen. When this screen is used to halftone an image, the watermark is embedded in the image automatically. Kacker and Allebach [8] divided images into blocks and in each block got DCT coefficients, and watermark is hidden depending on the magnitude of the DCT coefficient. After that, the watermarked image is halftoned using the Direct Binary Search. The above watermarking ways hide information in a single image and the hidden information should be extracted by corresponding decoding ways. Another kind of digital watermarking methods is to embed information in two or more than two halftone images. And when these halftone images are overlapped, the embedded visible pattern appears. Soo-Chang Pei [11] proposed such a kind of method by applying the regular error diffusion and the proposed noise-balanced error diffusion to the unwatermarked part and the watermarked part respectively of a gray scale image, and we can see the watermark when this halftone image is overlapped with another halftone image obtained from the same gray scale image using ust the regular error diffusion. But the hidden visible patterns were ust reproduced in black areas and didn t contain enough details, so they cannot take enough information. The main contribution of this paper is to present a DBS-based halftoning method for three images of the same size, say, A, B and C. Our DBS-based halftoning method generates three binary images A ', B ' and C ' that reproduce original gray scale images A, B and C respectively. Further, C ' is the overlapped image of A ' and B '. In other words, a pixel of C ' is white if and only if both of the corresponding pixels of A ' and B ' are white. Figure1 shows examples of images A ', B ' and C '. Thus, if A ' and B ' are printed in transparent sheets, then we can see C ' by superposing them together. Also, we cannot guess C ' if only one of the two images A ' and B ' is available. Both A ' and B ' are necessary to get secret image C '. Figure 1. Three binary images A ', B ' and C ' satisfying Condition 2 Our proposed halftoning method has several possible applications. For example, it can be used for watermarking as follows. Image A ' is a public image and image C ' is an image to be hidden. Image C ' can be a hidden image that indicates the copyright information of image A '. Then, image B ' can be used as a secret key to see image C '. Also, our halftoning method can be used for amusement purpose as follows. A ' and B ' can be parents pictures and C ' can be a picture of their child. We can see their child by pasting parent pictures. In other words, child picture is hidden in his/her parent pictures. Quiz is given using an image A ', and three options are given as three images B ' 1, B ' 2 and B ' 3. If B ' is a correct answer for the quiz, then we can see some special image by overlapping A 2 ' and B '

3 Our second contribution is to extend our DBS-based halftoning method to hide one image into more than two images, and to hide more than one images into more than two images. This paper is organized as follows. Section 2 reviews the Direct Binary Search (DBS) method and presents the idea behind our halftoning method. Section 3 shows our DBS-based halftoning algorithm. Section 4 gives our experiment results. Section 5 extends our halftoning method to generate more than three binary images. Section 6 offers concluding remarks. 2. Halftoning and Image Hiding Suppose that an original gray scale image A ( a i, ) of size n n is given, where a denotes the intensity level at position ( )(0 n 1) taking a real number intensity in the range [0, 1]. Although we assume that images are square for simplicity, it is easy to generalize them to non-square images. The goal of halftoning is to find a binary image A' ( a' i ) of the same size that reproduces, the original image A, where each a ' i, is either 0(black) or 1(white). Direct Binary Search (DBS) is one of the well-known halftoning methods. The idea of DBS is to find a binary image A ' whose proected image onto human eyes is very close to the original gray scale image A. The proected image is computed by applying a Gaussian filter which approximates the characteristic of the human visual system. Let V ( v kl, ) denote a Gaussian filter, i.e. a 2-dimensional symmetric matrix of size ( 2 +1)( 2 +1), where each non-negative real number vkl, ( k, l ) is determined by a 2-dimensional Gaussian distribution such that their sum is 1. In other words, kl, k 2 2 l v c e 2 2 (1) where is a parameter of the Gaussian distribution and c is a fixed real number to satisfy v, kl, 1. Let A'' ( a'' kl ) be the proected gray scale image of a binary image A' ( a' ) obtained by applying the Gaussian filter as follows: (2) a'' v a' (0 n 1) k, l i k, l kl, We can say that a binary image A ' is an approximation of original gray scale image A if the difference between A and A '' is small enough. Hence, we define the error between A and A '' as follows. The error e at each pixel location (, i ) is defined by and the total error is defined by e a a 2 ( '' ) (3) Error A A (, '') e 0 n 1 (4) The idea of DBS is to find a binary image A ' which can make the Error( A, A '') sufficiently small. For this purpose, the DBS repeats improvement of binary image A '. The value of a particular pixel a ' i, is modified by toggling ( a' 1 a' ) and swapping (exchange the value with its 8 neighboring pixels). One of these operations (toggling and swapping) which decreases the total error 459

4 mostly is chosen to modify the pixel value a ' i,. DBS repeats this process in a raster order until no more improvement is possible. Suppose that we are given three gray scale images A, B and C of size n n each. Our goal is to generate corresponding binary images A ', B ' and C ' such that Condition 1 binary images A ', B ' and C ' reproduce the tone of original gray scale images A, B and C, and Condition 2 C ' is the overlapped images of A ' and B ', that is c' min( a', b' ) for all i and (0 n 1). In other words, if either a ' i, and b ' i, is 0 (i.e. black) then c ' i, is also 0. If both a ' i, and b ' i, is 1 (i.e. white) then c ' i, is also 1. Figure 1 shows examples of three binary images A ', B ' and C ' satisfying Condition 2. Suppose that images A ' and B ' are printed in transparent sheets. Clearly, we can see the image C ' if these transparent sheets are pasted together. 3. Our DBS-based Algorithm The main purpose of this section is to show our algorithm that generates three binary images A ', B ' and C ' satisfying Conditions 1 and 2 for given original gray scale images A, B and C. Our algorithm consists of two steps as follows: Step 1 Adust the intensity levels of original gray scale images A, B and C. Step 2 Using our new DBS-based technique, generate three binary images A ', B ' and C ' from adusted gray scale images of A, B and C Adusting Intensity Levels of Original Gray Scale Images We will show how the intensity levels of original gray scale images are adusted. Let R be a small region of m pixels in an n n image, and RA ( '), RB ( ') and R( C ') be corresponding subimages of A ', B ' and C ' respectively. Clearly, if RA ( ') and RB ( ') has x and y black pixels respectively, then the number of black pixels in R( C ') must be in the range [max( x, y), min( m, x y)] to satisfy Condition 2. Let [, ]( ) be the range of the number of black pixels in R( A ') and R( B '). If both R( A ') and R( B ') have black pixels, then the number of black pixels in R( C ') is in the range [,min( m,2 )]. Similarly, if both R( A ') and R( B ') have black pixels, then R( C ') can have black pixels in the range [,min( m,2 )]. Thus, if min( m, 2 ), we can guarantee that RC ( ') can have any number black pixels in the range [,min( m,2 )]. Hence, we select m 2 and 3m 4 to maximize the range of the number of black pixels of R( A '), RB ( ') and R( C '). In this case, RA ( ') and R( B ') has [ m 2,3m 4] black pixels and R( C ') has [3m 4, m ] black pixels. Thus, it makes sense to adust the intensity levels of A and B in the range [0.25,0.5], and that of C in the range [0,0.25]. Hence we perform linear conversion of the intensity x such that function f( x) x is used for adusting intensity levels of A and B, and function g( x) x 4 is used for C. Figure 2 shows the graph of functions f and g. Clearly, the value of f is in the range [0.25,0.5] and that of g is [0,0.25]. 460

5 Figure 2. Functions f and g used to adust intensity levels 3.2. Using an Error-Diffusion-Based Algorithm for Generating Three Binary Images In this section we show our halftoning method based on Direct Binary Search (DBS). We assume that the intensity levels of three original gray scale images have been adusted using the linear conversion in the previous section. Let A ( a i, ), B ( b i, ) and C ( c i, ) be the adusted gray scale images. We will show how halftone images A' ( a' ), B' ( b' ) and C' ( c' ) are computed using our new DBS-based algorithm. Similar to the conventional DBS algorithm, pixels in binary images A ', B ' and C ' are determined in raster order. Recall that, in conventional DBS algorithm, the value of binary pixel is determined such that the error between the proected image and the original gray scale image is small enough. Our key idea is to extend this policy for three binary images such that binary values of a ' i,, b ' i and, c ' i are, selected to make the sum of the total errors of these three binary images small enough. The details are spelled out as follows. It should be clear that, to satisfy Condition 2, possible 3-tuple value ( a', b', c ' ) is one of (0,0,0), (0,1,0), (1,0,0) and (1,1,1). Let A'' ( a'' ), B'' ( b'' ) and C'' ( c'' ) be the proected images of A ', B ' and C ' respectively. The sum of the total errors of the three images can be defined as Error( A, A'') Error( B, B '') Error( C, C '') 0 n 1 ( a a'' ) ( b b'' ) ( c c'' ) (5) We selected a 3-tuple value ( a', b', c ' ) for the three pixels of images A, B and C at the same location that minimizes the sum of the total errors. This process is repeated on each 3-tuple pixel in raster order until no more improvement is possible for the whole three images. 4. Experimental results In this section we give a set of our experimental results of hiding an image in two distinct images. Figure 3 shows the resulting three binary images A ', B ' and C ' generated by our DBS-based algorithm. All of these three images have the same size of pixels. Image A ' and image B ' are obtained directly by our DBS-based halftoning method proposed in Section 3, which have the image C ' hidden in both of them in the halftoning process. Image C ' is the overlapped result of images A ' and B '. In images A ' and B ', we cannot see any hiding trace, and from image C ' we see the hidden image can be recovered clearly. 461

6 Binary image A ' : Airplane Binary image B ': Sailboat Binary image C ': Lenna Figure 3. Three binary images Airplane, Sailboat and Lenna generated by our DBS-based halftoning algorithm 5. Our DBS-based Halftoning Method for Generating More Than Three Binary Images The main purpose of this section is to extend our halftoning method to generate more than three binary images for hiding one image into N ( N 2) images, and for hiding M( M 1) images into N( N 2, N M) images Hiding One Image in N( N 2) Images Suppose we are given a gray scale image G ( g i, ) and other NN ( 2) gray scale images H1 ( h1 ),, HN ( hn ) of the same size n n. Our goal is to get their corresponding binary images G' ( g' ), H1' ( h1' ),, HN' ( hn' ), and to make image G ' hidden in images H1',, HN'. Condition 1 and Condition 2 given in Section 2 should be modified as follows: 462

7 Condition 1 binary images G', H1',, HN ' reproduce the tone of original gray scale images GH, 1,, HN, and Condition 2 G ' is the overlapped image of H1',, HN', that is g' min( h1',, hn' ) for all i and (0 n 1). In order to satisfy Conditions 1 and 2, we need to do the following two steps: Step 1 Adust the intensity levels of these N 1 gray scale images. Similarly to the way that we have discussed in Section 3.1, we perform linear conversion of the intensity x such that function f ( x) ( N 1) x 2 N ( N 1) 2N is used for adusting intensity levels of H1,, HN, and function g() x ( N 1) x/2n is used for G. As N increases, the range of adusted intensity levels increases and the increase rate decreases. Step 2 Using the DBS-based technique, generate N 1 binary images G', H1',, HN ' from the adusted gray scale images GH, 1,, HN. Possible ( N 1)-tuple values ( g', h1',, hn' ) should be chosen to satisfy Condition 2. Let G'' ( g'' ), H1'' ( h1'' ),, HN '' ( hn '' ) be the proected images of G', H1',, HN ' respectively. The sum of the total errors of the N 1 images can be defined as: Error( G, G '') Error( H1, H1'') Error( HN, HN '') 0 n 1 ( g g '' ) ( h1 h1'' ) ( hn hn '' ) (6) We select a ( N 1 )-tuple value ( g ', h1',, hn' ) for the N 1 pixels of images GH, 1,, HN at the same location that minimizes the sum of the total errors. This process is repeated on each ( N 1)-tuple pixel in raster order until no more improvement is possible for the whole N 1 images. Here if we take N 2, the previous case is included. Here we show the experimental results for N 3. Figure 4 shows the graph of functions f and g. Figure 5 shows the four binary images G ', H 1', H 2' and H 3' generated by our DBS-based algorithm. H 1', H 2' and H 3' are generated directly by our DBS-based halftoning method, and G ' is the superposed result of H 1', H 2' and H 3'. We can see this set of images is brighter than the set given in Figure 3. As the number of public images N increases, the range of adusted intensity levels of G, H 1, H 2, H 3 increases, so the corresponding generated binary images have higher contrast. Figure 4. Functions f and g used to adust intensity levels ( N 3 ) 463

8 Binary image H 1' : Airplane Binary image H 2' : Sailboat Binary image H 3' : Pepper Binary image G ' : Zelda Figure 5. Four binary images Airplane, Sailboat, Pepper and Zelda generated by our DBS-based halftoning algorithm 5.2. Hiding M( M 1) Images in N( N 2, N M) Images Essentially, hiding MM ( 1) gray scale images, we say G1 ( g1 ),, GM ( gm ), into NN ( 2, N M) gray scale images, we say H1'' ( h1'' ),, HN'' ( hn'' ), is to hide each of these M images in two or several of those N images, and these M secret images share one or more than one of those N public images. For example, M 2, N 3, we can hide G 1 into H 1 and H 2, and hide G 2 into H 2 and H 3. We can also hide G 1 into H 1, H 2 and H 3, and hide G 2 into H 1, H 2 and H 3. The steps are the same as we discussed above. Firstly, we adust the intensity levels of the M N images into proper ranges. Then, we use the DBS-based technique to generate corresponding binary images G1'' ( g'' i ),, M '' ( M '' ), 1'' ( 1'' ),, N '' ( N '' ), G g i, H h i, H h from the adusted M N i, gray scale images. Possible ( M N )-tuple values ( g1',, gm', h1',, hn' ) should be chosen to satisfy Condition 2. Let G1'' ( g1'' ),, GM '' ( gm '' ), H1'' ( h1'' ),, HN '' ( hn '' ) be the 464

9 proected images of G1',, GM', H1',, HN' respectively. The sum of the total error of the M N images can be defined to be: Error( G1, G1'') Error( GM, GM '') Error( H1, H1'') Error( HN, HN '') 0 n 1 ( g1 g1'' ) ( gm gm '' ) ( h1 h1'' ) ( hn hn '' ) (7) The ( M N )-tuple value ( g1',, gm', h1',, hn' ) for the M N pixels of images G1,, GM, H1,, HN at the same location that minimizes the sum of the total errors. This process is repeated on each ( M N )-tuple pixel in raster order until no more improvement is possible for the whole M N images. 6. Concluding Remark In this paper, we have presented a Direct-Binary-Search-based algorithm that conceals a binary image into two binary images, and extended this algorithm to hide one or more than one binary image into more than two binary images. Our image hiding method can hide and recover images well, and as the number of public images increases, both the secret and public images have higher contrast. 7. References [1] B. E. Bayer, An optimum method for two-level rendition of continuous-tone pictures, IEEE international conference on communications-icc, vol.1, pp.11-15, June 11-13, [2] M. Analoui and J. Allebach, Model-based halftoning by direct binary search, In Proc. SPIE/IS&T Symposium on Electronic Imaging Science and Technology, vol. 1666, pp , [3] Z. Baharav and D. Shaked, Watermarking of dither halftoned images, IS&T/SPIE Conference, Security and Watermarking of Multimedia Contents, Vol.3957, pp , January, [4] R. Floyd and L. Steinberg, An adaptive algorithm for spatial gray scale, SID 75 Digest, Society for information display, pp , [5] J. Goldschneider and E. Riskin, Embedded multilevel error diffusion, IEEE Trans. on Image Processing, vol. 6, no.7, pp , July, [6] Y. Ito and K. Nakano, FM screening by the local exhaustive search, with hardware acceleration, In Proc. of Workshop on Advances in Parallel and Distributed Computational Models (CD-ROM of International Parallel and Distribution Processing Symposium), April, [7] Y. Ito and K. Nakano, FM screening by the local exhaustive search, with hardware acceleration, International Journal of Computer Science, vol.16, no.1, pp , February, [8] D. Kacker and P. Alleach, Joint halftoning and watermarking, IEEE Transactions on Signal Processing, vol.51, no.4, pp , April, [9] S. Katzenbeisser and F. Petitcolas (Editors). Information hiding techniques for steganagraphy and digital watermarking. Artech House, Eastern Europe, [10] D. Lau and G. Arce. Modern Digital Halftoning. Marcel Dekker, New York, [11] S. Pei and J. Guo, Data hiding in halftone images with noise-balanced error diffusion, IEEE Signal Processing letters, vol.10, no.12, pp , December, [12] S. Wang and K. Knox, Embedding digital watermarks in halftone screens, Proceedings of SPIE, Security and watermarking of multimedia contents II, Vol.3971, pp , [13] X. Zhuge, Y. Hirano and K. Nakano, A new hybrid multitoning based on the direct binary search, In Proc. of International Multi Conference of Engineers and Computer Scientists, vol. I, IMECS 2008, March, 2008, pp , Hong Kong. [14] Xia Zhuge, Koi Nakano, Clipping-Free Halftoning and Multitoning Using the Direct Binary Search, IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences, vol.e92-a, no.4, pp , April,

10 [15] Xia Zhuge, Koi Nakano, Halftoning via Error Diffusion using Circular Dot-overlap Model, JDCTA: International Journal of Digital Content Technology and its Applications, vol.4, no.6, pp. 8-17, September, [16] Xiaoshi Zheng, Yanling Zhao, Guangqi Liu, Na l Design of Digital Video Watermarking General Model and Its Applications, JDCTA: International Journal of Digital Content Technology and its Applications, vol.6, no.1, pp ,

A New Hybrid Multitoning Based on the Direct Binary Search

A New Hybrid Multitoning Based on the Direct Binary Search IMECS 28 19-21 March 28 Hong Kong A New Hybrid Multitoning Based on the Direct Binary Search Xia Zhuge Yuki Hirano and Koji Nakano Abstract Halftoning is an important task to convert a gray scale image

More information

Low Noise Color Error Diffusion using the 8-Color Planes

Low Noise Color Error Diffusion using the 8-Color Planes Low Noise Color Error Diffusion using the 8-Color Planes Hidemasa Nakai, Koji Nakano Abstract Digital color halftoning is a process to convert a continuous-tone color image into an image with a limited

More information

Cluster-Dot Halftoning based on the Error Diffusion with no Directional Characteristic

Cluster-Dot Halftoning based on the Error Diffusion with no Directional Characteristic Cluster-Dot Halftoning based on the Error Diffusion with no Directional Characteristic Hidemasa Nakai and Koji Nakano Abstract Digital halftoning is a process to convert a continuous-tone image into a

More information

Half-Tone Watermarking. Multimedia Security

Half-Tone Watermarking. Multimedia Security Half-Tone Watermarking Multimedia Security Outline Half-tone technique Watermarking Method Measurement Robustness Conclusion 2 What is Half-tone? Term used in the publishing industry for a black-andwhite

More information

Fig 1: Error Diffusion halftoning method

Fig 1: Error Diffusion halftoning method Volume 3, Issue 6, June 013 ISSN: 77 18X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Approach to Digital

More information

Visual Cryptography Scheme for Color Images Using Half Toning Via Direct Binary Search with Adaptive Search and Swap

Visual Cryptography Scheme for Color Images Using Half Toning Via Direct Binary Search with Adaptive Search and Swap Visual Cryptography Scheme for Color Images Using Half Toning Via Direct Binary Search with Adaptive Search and Swap N Krishna Prakash, Member, IACSIT and S Govindaraju Abstract This paper proposes a method

More information

Various Visual Secret Sharing Schemes- A Review

Various Visual Secret Sharing Schemes- A Review Various Visual Secret Sharing Schemes- A Review Mrunali T. Gedam Department of Computer Science and Engineering Tulsiramji Gaikwad-Patil College of Engineering and Technology, Nagpur, India Vinay S. Kapse

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 3, Issue 2, February 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Digital Halftoning. Sasan Gooran. PhD Course May 2013

Digital Halftoning. Sasan Gooran. PhD Course May 2013 Digital Halftoning Sasan Gooran PhD Course May 2013 DIGITAL IMAGES (pixel based) Scanning Photo Digital image ppi (pixels per inch): Number of samples per inch ppi (pixels per inch) ppi (scanning resolution):

More information

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Luis Rosales-Roldan, Manuel Cedillo-Hernández, Mariko Nakano-Miyatake, Héctor Pérez-Meana Postgraduate Section,

More information

A Rumination of Error Diffusions in Color Extended Visual Cryptography P.Pardhasaradhi #1, P.Seetharamaiah *2

A Rumination of Error Diffusions in Color Extended Visual Cryptography P.Pardhasaradhi #1, P.Seetharamaiah *2 A Rumination of Error Diffusions in Color Extended Visual Cryptography P.Pardhasaradhi #1, P.Seetharamaiah *2 # Department of CSE, Bapatla Engineering College, Bapatla, AP, India *Department of CS&SE,

More information

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES Scientific Journal of Impact Factor (SJIF) : 3.134 ISSN (Print) : 2348-6406 ISSN (Online): 2348-4470 ed International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW

More information

Image Rendering for Digital Fax

Image Rendering for Digital Fax Rendering for Digital Fax Guotong Feng a, Michael G. Fuchs b and Charles A. Bouman a a Purdue University, West Lafayette, IN b Hewlett-Packard Company, Boise, ID ABSTRACT Conventional halftoning methods

More information

Evaluation of Visual Cryptography Halftoning Algorithms

Evaluation of Visual Cryptography Halftoning Algorithms Evaluation of Visual Cryptography Halftoning Algorithms Shital B Patel 1, Dr. Vinod L Desai 2 1 Research Scholar, RK University, Kasturbadham, Rajkot, India. 2 Assistant Professor, Department of Computer

More information

Journal of mathematics and computer science 11 (2014),

Journal of mathematics and computer science 11 (2014), Journal of mathematics and computer science 11 (2014), 137-146 Application of Unsharp Mask in Augmenting the Quality of Extracted Watermark in Spatial Domain Watermarking Saeed Amirgholipour 1 *,Ahmad

More information

Analysis of Secure Text Embedding using Steganography

Analysis of Secure Text Embedding using Steganography Analysis of Secure Text Embedding using Steganography Rupinder Kaur Department of Computer Science and Engineering BBSBEC, Fatehgarh Sahib, Punjab, India Deepak Aggarwal Department of Computer Science

More information

Show-through Watermarking of Duplex Printed Documents

Show-through Watermarking of Duplex Printed Documents Show-through Watermarking of Duplex Printed Documents Gaurav Sharma a and Shen-ge Wang b a ECE Dept, Univ. of Rochester, Rochester, NY 14627-0126, USA; b Xerox Corporation, 800 Phillips Road, Webster,

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK VISUAL CRYPTOGRAPHY FOR IMAGES MS. SHRADDHA SUBHASH GUPTA 1, DR. H. R. DESHMUKH

More information

Analysis and Design of Vector Error Diffusion Systems for Image Halftoning

Analysis and Design of Vector Error Diffusion Systems for Image Halftoning Ph.D. Defense Analysis and Design of Vector Error Diffusion Systems for Image Halftoning Niranjan Damera-Venkata Embedded Signal Processing Laboratory The University of Texas at Austin Austin TX 78712-1084

More information

Reinstating Floyd-Steinberg: Improved Metrics for Quality Assessment of Error Diffusion Algorithms

Reinstating Floyd-Steinberg: Improved Metrics for Quality Assessment of Error Diffusion Algorithms Reinstating Floyd-Steinberg: Improved Metrics for Quality Assessment of Error Diffusion Algorithms Sam Hocevar 1 and Gary Niger 2 1 Laboratoire d Imagerie Bureautique et de Conception Artistique 14 rue

More information

AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES. N. Askari, H.M. Heys, and C.R. Moloney

AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES. N. Askari, H.M. Heys, and C.R. Moloney 26TH ANNUAL IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING YEAR 2013 AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES N. Askari, H.M. Heys, and C.R. Moloney

More information

Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2

Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2 Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2 Computer science Department 1, Computer science department 2 Research scholar 1, professor 2 Mewar University, India

More information

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning Advances in Engineering Research (AER), volume 116 International Conference on Communication and Electronic Information Engineering (CEIE 016) Reversible data hiding based on histogram modification using

More information

Hybrid Halftoning A Novel Algorithm for Using Multiple Halftoning Techniques

Hybrid Halftoning A Novel Algorithm for Using Multiple Halftoning Techniques Hybrid Halftoning A ovel Algorithm for Using Multiple Halftoning Techniques Sasan Gooran, Mats Österberg and Björn Kruse Department of Electrical Engineering, Linköping University, Linköping, Sweden Abstract

More information

Digital Image Sharing and Removing the Transmission Risk Problem by Using the Diverse Image Media

Digital Image Sharing and Removing the Transmission Risk Problem by Using the Diverse Image Media 1 1 Digital Image Sharing and Removing the Transmission Risk Problem by Using the Diverse Image Media 1 Shradha S. Rathod, 2 Dr. D. V. Jadhav, 1 PG Student, 2 Principal, 1,2 TSSM s Bhivrabai Sawant College

More information

Error Diffusion without Contouring Effect

Error Diffusion without Contouring Effect Error Diffusion without Contouring Effect Wei-Yu Han and Ja-Chen Lin National Chiao Tung University, Department of Computer and Information Science Hsinchu, Taiwan 3000 Abstract A modified error-diffusion

More information

Digital Halftoning Using Two-Dimensional Carriers with a Noninteger Period

Digital Halftoning Using Two-Dimensional Carriers with a Noninteger Period Digital Halftoning Using Two-Dimensional Carriers with a Noninteger Period Thomas Scheermesser, Frank Wyrowski*, Olof Bryngdahl University of Essen, Physics Department, 45117 Essen, Germany Abstract Among

More information

Stochastic Screens Robust to Mis- Registration in Multi-Pass Printing

Stochastic Screens Robust to Mis- Registration in Multi-Pass Printing Published as: G. Sharma, S. Wang, and Z. Fan, "Stochastic Screens robust to misregistration in multi-pass printing," Proc. SPIE: Color Imaging: Processing, Hard Copy, and Applications IX, vol. 5293, San

More information

Steganography using LSB bit Substitution for data hiding

Steganography using LSB bit Substitution for data hiding ISSN: 2277 943 Volume 2, Issue 1, October 213 Steganography using LSB bit Substitution for data hiding Himanshu Gupta, Asst.Prof. Ritesh Kumar, Dr.Soni Changlani Department of Electronics and Communication

More information

Copyright protection scheme for digital images using visual cryptography and sampling methods

Copyright protection scheme for digital images using visual cryptography and sampling methods 44 7, 077003 July 2005 Copyright protection scheme for digital images using visual cryptography and sampling methods Ching-Sheng Hsu National Central University Department of Information Management P.O.

More information

Prof. Feng Liu. Fall /04/2018

Prof. Feng Liu. Fall /04/2018 Prof. Feng Liu Fall 2018 http://www.cs.pdx.edu/~fliu/courses/cs447/ 10/04/2018 1 Last Time Image file formats Color quantization 2 Today Dithering Signal Processing Homework 1 due today in class Homework

More information

Fast Inverse Halftoning

Fast Inverse Halftoning Fast Inverse Halftoning Zachi Karni, Daniel Freedman, Doron Shaked HP Laboratories HPL-2-52 Keyword(s): inverse halftoning Abstract: Printers use halftoning to render printed pages. This process is useful

More information

Performance Evaluation of Floyd Steinberg Halftoning and Jarvis Haltonong Algorithms in Visual Cryptography

Performance Evaluation of Floyd Steinberg Halftoning and Jarvis Haltonong Algorithms in Visual Cryptography Performance Evaluation of Floyd Steinberg Halftoning and Jarvis Haltonong Algorithms in Visual Cryptography Pratima M. Nikate Department of Electronics & Telecommunication Engineering, P.G.Student,NKOCET,

More information

Algorithm-Independent Color Calibration for Digital Halftoning

Algorithm-Independent Color Calibration for Digital Halftoning Algorithm-Independent Color Calibration for Digital Halftoning Shen-ge Wang Xerox Corporation, Webster, New York Abstract A novel method based on measuring 2 2 pixel patterns provides halftone-algorithm

More information

VISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION AND PIXEL SYNCHRONIZATION

VISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION AND PIXEL SYNCHRONIZATION VISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION AND PIXEL SYNCHRONIZATION Pankaja Patil Department of Computer Science and Engineering Gogte Institute of Technology, Belgaum, Karnataka Bharati

More information

A New Steganographic Method for Palette-Based Images

A New Steganographic Method for Palette-Based Images A New Steganographic Method for Palette-Based Images Jiri Fridrich Center for Intelligent Systems, SUNY Binghamton, Binghamton, NY 13902-6000 Abstract In this paper, we present a new steganographic technique

More information

Image Steganography using Sudoku Puzzle for Secured Data Transmission

Image Steganography using Sudoku Puzzle for Secured Data Transmission Image Steganography using Sudoku Puzzle for Secured Data Transmission Sanmitra Ijeri, Shivananda Pujeri, Shrikant B, Usha B A, Asst.Prof.Departemen t of CSE R.V College Of ABSTRACT Image Steganography

More information

Multilevel Rendering of Document Images

Multilevel Rendering of Document Images Multilevel Rendering of Document Images ANDREAS SAVAKIS Department of Computer Engineering Rochester Institute of Technology Rochester, New York, 14623 USA http://www.rit.edu/~axseec Abstract: Rendering

More information

Implementation of Colored Visual Cryptography for Generating Digital and Physical Shares

Implementation of Colored Visual Cryptography for Generating Digital and Physical Shares Implementation of Colored Visual Cryptography for Generating Digital and Physical Shares Ahmad Zaky 13512076 1 Program Studi Teknik Informatika Sekolah Teknik Elektro dan Informatika Institut Teknologi

More information

Lossless Image Watermarking for HDR Images Using Tone Mapping

Lossless Image Watermarking for HDR Images Using Tone Mapping IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.5, May 2013 113 Lossless Image Watermarking for HDR Images Using Tone Mapping A.Nagurammal 1, T.Meyyappan 2 1 M. Phil Scholar

More information

Digital Watermarking Using Homogeneity in Image

Digital Watermarking Using Homogeneity in Image Digital Watermarking Using Homogeneity in Image S. K. Mitra, M. K. Kundu, C. A. Murthy, B. B. Bhattacharya and T. Acharya Dhirubhai Ambani Institute of Information and Communication Technology Gandhinagar

More information

Fast Inverse Halftoning Algorithm for Ordered Dithered Images

Fast Inverse Halftoning Algorithm for Ordered Dithered Images Fast Inverse Halftoning Algorithm for Ordered Dithered Images Pedro Garcia Freitas, Mylène C.Q. Farias, and Aletéia P. F. de Araújo Department of Computer Science, University of Brasília (UnB), Brasília,

More information

Reinstating Floyd-Steinberg: Improved Metrics for Quality Assessment of Error Diffusion Algorithms

Reinstating Floyd-Steinberg: Improved Metrics for Quality Assessment of Error Diffusion Algorithms Reinstating Floyd-Steinberg: Improved Metrics for Quality Assessment of Error Diffusion Algorithms Sam Hocevar 1 and Gary Niger 2 1 Laboratoire d Imagerie Bureautique et de Conception Artistique 14 rue

More information

VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES

VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES Ayman M. Abdalla, PhD Dept. of Multimedia Systems, Al-Zaytoonah University, Amman, Jordan Abstract A new algorithm is presented for hiding information

More information

On Filter Techniques for Generating Blue Noise Mask

On Filter Techniques for Generating Blue Noise Mask On Filter Techniques for Generating Blue Noise Mask Kevin J. Parker and Qing Yu Dept. of Electrical Engineering, University of Rochester, Rochester, New York Meng Yao, Color Print and Image Division Tektronix

More information

An Integrated Image Steganography System. with Improved Image Quality

An Integrated Image Steganography System. with Improved Image Quality Applied Mathematical Sciences, Vol. 7, 2013, no. 71, 3545-3553 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.34236 An Integrated Image Steganography System with Improved Image Quality

More information

C. A. Bouman: Digital Image Processing - January 9, Digital Halftoning

C. A. Bouman: Digital Image Processing - January 9, Digital Halftoning C. A. Bouman: Digital Image Processing - January 9, 2017 1 Digital Halftoning Many image rendering technologies only have binary output. For example, printers can either fire a dot or not. Halftoning is

More information

Printed Document Watermarking Using Phase Modulation

Printed Document Watermarking Using Phase Modulation 1 Printed Document Watermarking Using Phase Modulation Chabukswar Hrishikesh Department Of Computer Engineering, SBPCOE, Indapur, Maharastra, India, Pise Anil Audumbar Department Of Computer Engineering,

More information

Digital Image Sharing using Encryption Processes

Digital Image Sharing using Encryption Processes Digital Image Sharing using Encryption Processes Taniya Rohmetra 1, KshitijAnil Naik 2, Sayali Saste 3, Tejan Irla 4 Graduation Student, Department of Computer Engineering, AISSMS-IOIT, Pune University

More information

Error Diffusion and Delta-Sigma Modulation for Digital Image Halftoning

Error Diffusion and Delta-Sigma Modulation for Digital Image Halftoning Error Diffusion and Delta-Sigma Modulation for Digital Image Halftoning Thomas D. Kite, Brian L. Evans, and Alan C. Bovik Department of Electrical and Computer Engineering The University of Texas at Austin

More information

Halftoning via Direct Binary Search using a Hard Circular Dot Overlap Model

Halftoning via Direct Binary Search using a Hard Circular Dot Overlap Model Halftoning via Direct Binary Search using a Hard Circular Dot Overlap Model Farhan A. Baqai, Christopher C. Taylor and Jan P. Allebach Electronic Imaging Systems Lab., School of Electrical and Computer

More information

DIGITAL halftoning is a technique used by binary display

DIGITAL halftoning is a technique used by binary display IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL 9, NO 5, MAY 2000 923 Digital Color Halftoning with Generalized Error Diffusion and Multichannel Green-Noise Masks Daniel L Lau, Gonzalo R Arce, Senior Member,

More information

Modified Jointly Blue Noise Mask Approach Using S-CIELAB Color Difference

Modified Jointly Blue Noise Mask Approach Using S-CIELAB Color Difference JOURNAL OF IMAGING SCIENCE AND TECHNOLOGY Volume 46, Number 6, November/December 2002 Modified Jointly Blue Noise Mask Approach Using S-CIELAB Color Difference Yong-Sung Kwon, Yun-Tae Kim and Yeong-Ho

More information

Enhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing

Enhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing Enhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing M.Desiha Department of Computer Science and Engineering, Jansons Institute of Technology

More information

A Steganography Algorithm for Hiding Secret Message inside Image using Random Key

A Steganography Algorithm for Hiding Secret Message inside Image using Random Key A Steganography Algorithm for Hiding Secret Message inside Image using Random Key Balvinder Singh Sahil Kataria Tarun Kumar Narpat Singh Shekhawat Abstract "Steganography is a Greek origin word which means

More information

Basic concepts of Digital Watermarking. Prof. Mehul S Raval

Basic concepts of Digital Watermarking. Prof. Mehul S Raval Basic concepts of Digital Watermarking Prof. Mehul S Raval Mutual dependencies Perceptual Transparency Payload Robustness Security Oblivious Versus non oblivious Cryptography Vs Steganography Cryptography

More information

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise Kamaldeep Joshi, Rajkumar Yadav, Sachin Allwadhi Abstract Image steganography is the best aspect

More information

A New Representation of Image Through Numbering Pixel Combinations

A New Representation of Image Through Numbering Pixel Combinations A New Representation of Image Through Numbering Pixel Combinations J. Said 1, R. Souissi, H. Hamam 1 1 Faculty of Engineering Moncton, NB Canada ISET-Sfax Tunisia Habib.Hamam@umoncton.ca ABSTRACT: A new

More information

Dynamic Collage Steganography on Images

Dynamic Collage Steganography on Images ISSN 2278 0211 (Online) Dynamic Collage Steganography on Images Aswathi P. S. Sreedhi Deleepkumar Maya Mohanan Swathy M. Abstract: Collage steganography, a type of steganographic method, introduced to

More information

Color Image Quantization and Dithering Method Based on Human Visual System Characteristics*

Color Image Quantization and Dithering Method Based on Human Visual System Characteristics* Color Image Quantization and Dithering Method Based on Human Visual System Characteristics* yeong Man im, Chae Soo Lee, Eung Joo Lee, and Yeong Ho Ha Department of Electronic Engineering, yungpook National

More information

The Perceived Image Quality of Reduced Color Depth Images

The Perceived Image Quality of Reduced Color Depth Images The Perceived Image Quality of Reduced Color Depth Images Cathleen M. Daniels and Douglas W. Christoffel Imaging Research and Advanced Development Eastman Kodak Company, Rochester, New York Abstract A

More information

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers P. Mohan Kumar 1, Dr. M. Sailaja 2 M. Tech scholar, Dept. of E.C.E, Jawaharlal Nehru Technological University Kakinada,

More information

Plane-dependent Error Diffusion on a GPU

Plane-dependent Error Diffusion on a GPU Plane-dependent Error Diffusion on a GPU Yao Zhang a, John Ludd Recker b, Robert Ulichney c, Ingeborg Tastl b, John D. Owens a a University of California, Davis, One Shields Avenue, Davis, CA, USA; b Hewlett-Packard

More information

Data Embedding Using Phase Dispersion. Chris Honsinger and Majid Rabbani Imaging Science Division Eastman Kodak Company Rochester, NY USA

Data Embedding Using Phase Dispersion. Chris Honsinger and Majid Rabbani Imaging Science Division Eastman Kodak Company Rochester, NY USA Data Embedding Using Phase Dispersion Chris Honsinger and Majid Rabbani Imaging Science Division Eastman Kodak Company Rochester, NY USA Abstract A method of data embedding based on the convolution of

More information

International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 48 Page

International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 48 Page Analysis of Visual Cryptography Schemes Using Adaptive Space Filling Curve Ordered Dithering V.Chinnapudevi 1, Dr.M.Narsing Yadav 2 1.Associate Professor, Dept of ECE, Brindavan Institute of Technology

More information

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON K.Thamizhazhakan #1, S.Maheswari *2 # PG Scholar,Department of Electrical and Electronics Engineering, Kongu Engineering College,Erode-638052,India.

More information

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11,

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11, FPGA IMPLEMENTATION OF LSB REPLACEMENT STEGANOGRAPHY USING DWT M.Sathya 1, S.Chitra 2 Assistant Professor, Prince Dr. K.Vasudevan College of Engineering and Technology ABSTRACT An enhancement of data protection

More information

A Visual Cryptography Based Watermark Technology for Individual and Group Images

A Visual Cryptography Based Watermark Technology for Individual and Group Images A Visual Cryptography Based Watermark Technology for Individual and Group Images Azzam SLEIT (Previously, Azzam IBRAHIM) King Abdullah II School for Information Technology, University of Jordan, Amman,

More information

Colored Digital Image Watermarking using the Wavelet Technique

Colored Digital Image Watermarking using the Wavelet Technique American Journal of Applied Sciences 4 (9): 658-662, 2007 ISSN 1546-9239 2007 Science Publications Corresponding Author: Colored Digital Image Watermarking using the Wavelet Technique 1 Mohammed F. Al-Hunaity,

More information

WITH THE ADVANCE of digital technologies, digital

WITH THE ADVANCE of digital technologies, digital 678 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 15, NO. 3, MARCH 2006 Video Halftoning Zhaohui Sun, Member, IEEE Abstract This paper studies video halftoning that renders a digital video sequence onto

More information

An Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images

An Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images An Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images Ishwarya.M 1, Mary shamala.l 2 M.E, Dept of CSE, IFET College of Engineering, Villupuram, TamilNadu, India 1 Associate Professor,

More information

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS 44 Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS 45 CHAPTER 3 Chapter 3: LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING

More information

Sterilization of Stego-images through Histogram Normalization

Sterilization of Stego-images through Histogram Normalization Sterilization of Stego-images through Histogram Normalization Goutam Paul 1 and Imon Mukherjee 2 1 Dept. of Computer Science & Engineering, Jadavpur University, Kolkata 700 032, India. Email: goutam.paul@ieee.org

More information

Implementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design

Implementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design 2009 nternational Symposium on Computing, Communication, and Control (SCCC 2009) Proc.of CST vol.1 (2011) (2011) ACST Press, Singapore mplementation of a Visible Watermarking in a Secure Still Digital

More information

An Enhanced Least Significant Bit Steganography Technique

An Enhanced Least Significant Bit Steganography Technique An Enhanced Least Significant Bit Steganography Technique Mohit Abstract - Message transmission through internet as medium, is becoming increasingly popular. Hence issues like information security are

More information

An Implementation of LSB Steganography Using DWT Technique

An Implementation of LSB Steganography Using DWT Technique An Implementation of LSB Steganography Using DWT Technique G. Raj Kumar, M. Maruthi Prasada Reddy, T. Lalith Kumar Electronics & Communication Engineering #,JNTU A University Electronics & Communication

More information

Webpage: Volume 4, Issue VI, June 2016 ISSN

Webpage:   Volume 4, Issue VI, June 2016 ISSN 4-P Secret Sharing Scheme Deepa Bajaj 1, Navneet Verma 2 1 Master s in Technology (Dept. of CSE), 2 Assistant Professr (Dept. of CSE) 1 er.deepabajaj@gmail.com, 2 navneetcse@geeta.edu.in Geeta Engineering

More information

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction Pauline Puteaux and William Puech; LIRMM Laboratory UMR 5506 CNRS, University of Montpellier; Montpellier, France Abstract

More information

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications Modified Skin Tone Image Hiding Algorithm for Steganographic Applications Geetha C.R., and Dr.Puttamadappa C. Abstract Steganography is the practice of concealing messages or information in other non-secret

More information

DWT based high capacity audio watermarking

DWT based high capacity audio watermarking LETTER DWT based high capacity audio watermarking M. Fallahpour, student member and D. Megias Summary This letter suggests a novel high capacity robust audio watermarking algorithm by using the high frequency

More information

Laser Printer Source Forensics for Arbitrary Chinese Characters

Laser Printer Source Forensics for Arbitrary Chinese Characters Laser Printer Source Forensics for Arbitrary Chinese Characters Xiangwei Kong, Xin gang You,, Bo Wang, Shize Shang and Linjie Shen Information Security Research Center, Dalian University of Technology,

More information

Watermarking patient data in encrypted medical images

Watermarking patient data in encrypted medical images Sādhanā Vol. 37, Part 6, December 2012, pp. 723 729. c Indian Academy of Sciences Watermarking patient data in encrypted medical images 1. Introduction A LAVANYA and V NATARAJAN Department of Instrumentation

More information

Local prediction based reversible watermarking framework for digital videos

Local prediction based reversible watermarking framework for digital videos Local prediction based reversible watermarking framework for digital videos J.Priyanka (M.tech.) 1 K.Chaintanya (Asst.proff,M.tech(Ph.D)) 2 M.Tech, Computer science and engineering, Acharya Nagarjuna University,

More information

Fundamentals of Multimedia

Fundamentals of Multimedia Fundamentals of Multimedia Lecture 2 Graphics & Image Data Representation Mahmoud El-Gayyar elgayyar@ci.suez.edu.eg Outline Black & white imags 1 bit images 8-bit gray-level images Image histogram Dithering

More information

A Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor

A Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor A Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor Umesh 1,Mr. Suraj Rana 2 1 M.Tech Student, 2 Associate Professor (ECE) Department of Electronic and Communication Engineering

More information

TWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS

TWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS TWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS Sos S. Agaian 1, David Akopian 1 and Sunil A. D Souza 1 1Non-linear Signal Processing

More information

A Recursive Threshold Visual Cryptography Scheme

A Recursive Threshold Visual Cryptography Scheme A Recursive Threshold Visual Cryptography cheme Abhishek Parakh and ubhash Kak Department of Computer cience Oklahoma tate University tillwater, OK 74078 Abstract: This paper presents a recursive hiding

More information

Ranked Dither for Robust Color Printing

Ranked Dither for Robust Color Printing Ranked Dither for Robust Color Printing Maya R. Gupta and Jayson Bowen Dept. of Electrical Engineering, University of Washington, Seattle, USA; ABSTRACT A spatially-adaptive method for color printing is

More information

FPGA implementation of DWT for Audio Watermarking Application

FPGA implementation of DWT for Audio Watermarking Application FPGA implementation of DWT for Audio Watermarking Application Naveen.S.Hampannavar 1, Sajeevan Joseph 2, C.B.Bidhul 3, Arunachalam V 4 1, 2, 3 M.Tech VLSI Students, 4 Assistant Professor Selection Grade

More information

Digital halftoning by means of green-noise masks

Digital halftoning by means of green-noise masks Lau et al. Vol. 16, No. 7/July 1999/J. Opt. Soc. Am. A 1575 Digital halftoning by means of green-noise masks Daniel L. Lau, Gonzalo R. Arce, and Neal C. Gallagher Department of Electrical and Computer

More information

A COMPARATIVE STUDY ON IMAGE COMPRESSION USING HALFTONING BASED BLOCK TRUNCATION CODING FOR COLOR IMAGE

A COMPARATIVE STUDY ON IMAGE COMPRESSION USING HALFTONING BASED BLOCK TRUNCATION CODING FOR COLOR IMAGE A COMPARATIVE STUDY ON IMAGE COMPRESSION USING HALFTONING BASED BLOCK TRUNCATION CODING FOR COLOR IMAGE Meharban M.S 1 and Priya S 2 1 M.Tech Student, Dept. of Computer Science, Model Engineering College

More information

REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING

REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING S.Mounika 1, M.L. Mittal 2 1 Department of ECE, MRCET, Hyderabad, India 2 Professor Department of ECE, MRCET, Hyderabad, India ABSTRACT

More information

Watermarking Still Images Using Parametrized Wavelet Systems

Watermarking Still Images Using Parametrized Wavelet Systems Watermarking Still Images Using Parametrized Wavelet Systems Zhuan Qing Huang and Zhuhan Jiang School of Computing and IT, University of Western Sydney, NSW 2150, Australia zhuang@cit.uws.edu.au, z.jiang@uws.edu.au

More information

High capacity robust audio watermarking scheme based on DWT transform

High capacity robust audio watermarking scheme based on DWT transform High capacity robust audio watermarking scheme based on DWT transform Davod Zangene * (Sama technical and vocational training college, Islamic Azad University, Mahshahr Branch, Mahshahr, Iran) davodzangene@mail.com

More information

On Filter Techniques for Generating Blue Noise Mask

On Filter Techniques for Generating Blue Noise Mask On Filter Techniques for Generating Blue Noise Mask Kevin J. Parker and Qing Yu Dept. of Electrical Engineering, University of Rochester, New York Meng Yao, Color Print and Image Division Tektronix Inc.,

More information

Information Hiding: Steganography & Steganalysis

Information Hiding: Steganography & Steganalysis Information Hiding: Steganography & Steganalysis 1 Steganography ( covered writing ) From Herodotus to Thatcher. Messages should be undetectable. Messages concealed in media files. Perceptually insignificant

More information

A Novel (2,n) Secret Image Sharing Scheme

A Novel (2,n) Secret Image Sharing Scheme Available online at www.sciencedirect.com Procedia Technology 4 (2012 ) 619 623 C3IT-2012 A Novel (2,n) Secret Image Sharing Scheme Tapasi Bhattacharjee a, Jyoti Prakash Singh b, Amitava Nag c a Departmet

More information

Hiding Image in Image by Five Modulus Method for Image Steganography

Hiding Image in Image by Five Modulus Method for Image Steganography Hiding Image in Image by Five Modulus Method for Image Steganography Firas A. Jassim Abstract This paper is to create a practical steganographic implementation to hide color image (stego) inside another

More information

Halftone postprocessing for improved rendition of highlights and shadows

Halftone postprocessing for improved rendition of highlights and shadows Journal of Electronic Imaging 9(2), 151 158 (April 2000). Halftone postprocessing for improved rendition of highlights and shadows Clayton Brian Atkins a Hewlett-Packard Company Hewlett-Packard Laboratories

More information

Image Encryption Algorithm based on Chaos Mapping and the Sequence Transformation

Image Encryption Algorithm based on Chaos Mapping and the Sequence Transformation Research Journal of Applied Sciences, Engineering and Technology 5(22): 5308-5313, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: November 08, 2012 Accepted: December

More information