Abstract
Numerous digital binary images are widely used today. Because modifying or forging digital images is not difficult, it is important to develop data-hiding methods to insert authentication data. In order to minimize distortion in secure data-hiding, there is an approach to reduce the number of flipped bits in the embedded image. The most recent method (Tseng-Chen-Pan’s scheme) that appeared on IEEE Trans. on Comm. 2002, flips only 2 bits for hiding n bits in the embedded image of size 2n bits. In this paper, we show that the problem of finding the lower bound on the minimum number of flipped bits in the 2n bits embedded image to hide n bits data is closely related with finding the minimum dominating sets of the binary hypercube of dimension n. To the best of our knowledge, our work is a first approach to convert the data-hiding problem to the relatively well-known graph problem.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Cox, I., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Processing 6, 1673–1687 (1997)
Cox, I.J., Miller, M.L., Boom, J.A.: Digital Watermarking. IEEE Trans. Image Processing. Morgan Kaufmann, San Mateo (2001)
Hartung, F., Kutter, M.: Multimedia watermarking techniques. IEEE 87, 1079–1107 (1999)
Koch, E., Zhao, J.: Embedding robust labels into images for copyright protection. In: Int. Congr. Intellectual Property Rights for Specialized Information, Knowledge & New Technologies (1995)
Matsui, K., Tanaka, K.: Video-steganography: how to secretly embed a signature in a picture. IMA Intellectual Propery Project 1(1) (1994)
Maxemchunk, N.F., Low, S.: Marking text documents. In: IEEE ICIP 1997 (1997)
Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information hiding–a survey. IEEE 87, 1062–1078 (1999)
Podilchuk, C., Zeng, W.: Image adaptive watermarking using visual models. IEEE J. Select. Areas Commun. 16, 525–538 (1998)
Tseng, Y.-C., Chen, Y.-Y., Pan, H.-K.: A Secure Data Hiding Scheme for Binary Images. IEEE Transactions on Communication 50(8), 1227–1231 (2002)
Wu, M., Liu, B.: Watermarking for image authentication. In: IEEE Int. COnf. Image Processing (ICIP 1998), vol. 2 (1998)
Wu, M., Yu, H., Liu, B.: Data hiding in images and videos: Part II–Designas and applications. IEEE Trans. Image Processing 12, 606–705 (2003)
Wu, M.: Multimedia Data Hiding. Ph.D. Dissertation, Princeton Univ. (2001)
Wu, M., Liu, B.: Data Hiding in Binary Image for Authentication and Annotation. IEEE Transactions on Multimedia 6(4), 528–538 (2004)
Yeung, M.M., Mintzer, F.: An invisible watermarking technique for image verification. In: IEEE ICIP 1997, vol. 2, pp. 680–683 (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Park, Y., Cho, Y. (2004). On Minimizing Distortion in Secure Data-Hiding for Binary Images. In: Aizawa, K., Nakamura, Y., Satoh, S. (eds) Advances in Multimedia Information Processing - PCM 2004. PCM 2004. Lecture Notes in Computer Science, vol 3331. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30541-5_70
Download citation
DOI: https://doi.org/10.1007/978-3-540-30541-5_70
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-23974-1
Online ISBN: 978-3-540-30541-5
eBook Packages: Computer ScienceComputer Science (R0)