Abstract
Lossless data embedding theory has entered a new era for data hiding and information security. In a lossless scheme, the original data and the embedded data should be completely recoverable. Our \(n\)-pairs pattern method is a significant advance in lossless data hiding schemes. This paper shows that the proposed \(n\)-pairs pattern method can achieve greater embedding capacity while keeping distortion at the same level as the PS-K method (Pattern Substitution by pseudo random number generator to produce a key K). The performance of the \(n\)-pairs pattern method is thus shown to be better than the performance of PS-K.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kim, H.J., Kim, C., Choi, Y., Wang, S., Zhang, X.: Improved modification direction methods. Comput. Math. Appl. 60(2), 319–325 (2010)
Kim, C., Shin, D., Shin, D., Zhang, X.: Improved steganographic embedding exploiting modification direction in multimedia communications. Commun. Comput. Inf. Sci. 186, 130–138 (2011)
Kim, C.: Data hiding by an improved exploiting modification direction. Multimedia Tools Appl. 69(3), 569–584 (2014)
Kim, C., Yang, C.N.: Improving data hiding capacity based on hamming code. In: Park, J.J., Zomaya, A., Jeong, H.-Y., Obaidat, M. (eds.) Frontier and Innovation in Future Computing and Communications. LNEE, pp. 697–706. Springer, The Netherlands (2014)
Baek, J., Kim, C., Fisher, P., Chao, H.: (N, 1) Steganography approach for secret sharing with digital images. In: Proceedings of 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, pp. 325–329 (2010)
Ho, Y.A., Chan, Y.K., Wu, H.C., Chu, Y.P.: High-capacity reversible data hiding in binary images using pattern substitution. Comput. Stand. Interfaces 31, 787–794 (2009)
Tsai, C.L., Chiang, H.F., Fan, K.C., Chung, C.D.: Reversible data hiding and lossless reconstruction of binary images using pair-wise logical computation mechanism. Pattern Recogn. 38(11), 1993–2006 (2005)
Tseng, Y.C., Chen, Y.Y., Pan, H.K.: A secure data hiding scheme for binary images. IEEE Trans. Commun. 50(8), 1227–1231 (2002)
Ni, Z., Shi, Y.Q., Asari, N., Su, W.: Reversible data diding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354–362 (2006)
Chen, M., Wong, E.K., Memon, N., Adams, S.: Recent developments in document image watermarking and data hiding. In: Proceedings of the SPIE Conference 4518: Multimedia Systems and Applications IV, pp. 166–176 (2001)
Lee, S.-K., Suh, Y.-H., Ho, Y.-S.: Lossless data hiding based on histogram modification of difference images. In: Aizawa, K., Nakamura, Y., Satoh, S. (eds.) PCM 2004. LNCS, vol. 3333, pp. 340–347. Springer, Heidelberg (2004)
Lin, C.C., Tai, W.L., Chang, C.C.: Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recogn. 41, 3582–3591 (2008)
Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890–896 (2003)
Tsai, P., Hu, Y.C., Yeh, H.L.: Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process. 89, 1129–1143 (2009)
Xuan, G., Shi, Y.Q., Ni, Z., Chai, P., Cui, X., Tong, X.: Reversible data hiding for JPEG images based on histogram pairs. In: Kamel, M.S., Campilho, A. (eds.) ICIAR 2007. LNCS, vol. 4633, pp. 715–727. Springer, Heidelberg (2007)
Acknowledgements
This research was supported by the Basic Science Research Program Through the National Research Foundation of Korea (NRF) by the Ministry of Education, Science and Technology (20120192).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Kim, C., Baek, J., Fisher, P.S. (2015). Lossless Data Hiding for Binary Document Images Using \(n\)-Pairs Pattern. In: Lee, J., Kim, J. (eds) Information Security and Cryptology - ICISC 2014. ICISC 2014. Lecture Notes in Computer Science(), vol 8949. Springer, Cham. https://doi.org/10.1007/978-3-319-15943-0_19
Download citation
DOI: https://doi.org/10.1007/978-3-319-15943-0_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-15942-3
Online ISBN: 978-3-319-15943-0
eBook Packages: Computer ScienceComputer Science (R0)