Skip to main content

Lossless Data Hiding for Binary Document Images Using \(n\)-Pairs Pattern

  • Conference paper
  • First Online:
Information Security and Cryptology - ICISC 2014 (ICISC 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8949))

Included in the following conference series:

Abstract

Lossless data embedding theory has entered a new era for data hiding and information security. In a lossless scheme, the original data and the embedded data should be completely recoverable. Our \(n\)-pairs pattern method is a significant advance in lossless data hiding schemes. This paper shows that the proposed \(n\)-pairs pattern method can achieve greater embedding capacity while keeping distortion at the same level as the PS-K method (Pattern Substitution by pseudo random number generator to produce a key K). The performance of the \(n\)-pairs pattern method is thus shown to be better than the performance of PS-K.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kim, H.J., Kim, C., Choi, Y., Wang, S., Zhang, X.: Improved modification direction methods. Comput. Math. Appl. 60(2), 319–325 (2010)

    Article  MATH  MathSciNet  Google Scholar 

  2. Kim, C., Shin, D., Shin, D., Zhang, X.: Improved steganographic embedding exploiting modification direction in multimedia communications. Commun. Comput. Inf. Sci. 186, 130–138 (2011)

    Article  Google Scholar 

  3. Kim, C.: Data hiding by an improved exploiting modification direction. Multimedia Tools Appl. 69(3), 569–584 (2014)

    Article  Google Scholar 

  4. Kim, C., Yang, C.N.: Improving data hiding capacity based on hamming code. In: Park, J.J., Zomaya, A., Jeong, H.-Y., Obaidat, M. (eds.) Frontier and Innovation in Future Computing and Communications. LNEE, pp. 697–706. Springer, The Netherlands (2014)

    Chapter  Google Scholar 

  5. Baek, J., Kim, C., Fisher, P., Chao, H.: (N, 1) Steganography approach for secret sharing with digital images. In: Proceedings of 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, pp. 325–329 (2010)

    Google Scholar 

  6. Ho, Y.A., Chan, Y.K., Wu, H.C., Chu, Y.P.: High-capacity reversible data hiding in binary images using pattern substitution. Comput. Stand. Interfaces 31, 787–794 (2009)

    Article  Google Scholar 

  7. Tsai, C.L., Chiang, H.F., Fan, K.C., Chung, C.D.: Reversible data hiding and lossless reconstruction of binary images using pair-wise logical computation mechanism. Pattern Recogn. 38(11), 1993–2006 (2005)

    Article  Google Scholar 

  8. Tseng, Y.C., Chen, Y.Y., Pan, H.K.: A secure data hiding scheme for binary images. IEEE Trans. Commun. 50(8), 1227–1231 (2002)

    Article  Google Scholar 

  9. Ni, Z., Shi, Y.Q., Asari, N., Su, W.: Reversible data diding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354–362 (2006)

    Article  Google Scholar 

  10. Chen, M., Wong, E.K., Memon, N., Adams, S.: Recent developments in document image watermarking and data hiding. In: Proceedings of the SPIE Conference 4518: Multimedia Systems and Applications IV, pp. 166–176 (2001)

    Google Scholar 

  11. Lee, S.-K., Suh, Y.-H., Ho, Y.-S.: Lossless data hiding based on histogram modification of difference images. In: Aizawa, K., Nakamura, Y., Satoh, S. (eds.) PCM 2004. LNCS, vol. 3333, pp. 340–347. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  12. Lin, C.C., Tai, W.L., Chang, C.C.: Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recogn. 41, 3582–3591 (2008)

    Article  MATH  Google Scholar 

  13. Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890–896 (2003)

    Article  Google Scholar 

  14. Tsai, P., Hu, Y.C., Yeh, H.L.: Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process. 89, 1129–1143 (2009)

    Article  MATH  Google Scholar 

  15. Xuan, G., Shi, Y.Q., Ni, Z., Chai, P., Cui, X., Tong, X.: Reversible data hiding for JPEG images based on histogram pairs. In: Kamel, M.S., Campilho, A. (eds.) ICIAR 2007. LNCS, vol. 4633, pp. 715–727. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

Download references

Acknowledgements

This research was supported by the Basic Science Research Program Through the National Research Foundation of Korea (NRF) by the Ministry of Education, Science and Technology (20120192).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cheonshik Kim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Kim, C., Baek, J., Fisher, P.S. (2015). Lossless Data Hiding for Binary Document Images Using \(n\)-Pairs Pattern. In: Lee, J., Kim, J. (eds) Information Security and Cryptology - ICISC 2014. ICISC 2014. Lecture Notes in Computer Science(), vol 8949. Springer, Cham. https://doi.org/10.1007/978-3-319-15943-0_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-15943-0_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-15942-3

  • Online ISBN: 978-3-319-15943-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics