Senary Huffman Compression – A Reversible Data Hiding Scheme for Binary Images

  • Chung-Chuan Wang
  • Chin-Chen Chang
  • Xinpeng Zhang
  • Jinn-Ke Jan
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4577)

Abstract

Over the past few years many studies have proposed reversible data hiding schemes, but few have been applied to binary images. Some studies have utilized spread spectrum, compression and binary operations methods to achieve the data hiding goal, but most of them suffered from poor visual quality, capacity and inability to extract the hidden data during recovery. The performance of existing methods also is unsatisfactory. Therefore, this paper proposes a reversible data hiding scheme for binary images: SHC (senary Huffman compression). SHC adopts the half-white and half-black pixels of 4×1 or 2×2 blocks of six types to increase visual quality. Moreover, SHC is senary instead of binary and becomes double senary as a compression unit to increase compression rate and secret hiding capacity. Experimental results show that recovered images are well within human visual perception and have PSNR(s) greater than 33, high secret hiding capacity for 1.1 secret bits / 2 bits, and an effective compression rate of over 17% on average. All results demonstrate that the scheme has advantages in reversible data hiding for binary images.

Keywords

reversible data hiding PSNR visual perception 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for Data Hiding. IBM Systems Journal 35(3/4), 313–336 (1996)CrossRefGoogle Scholar
  2. Brisbane, G., Safavi-Naini, R., Ogunbrna, P.: High-capacity Steganography Using a Shared Colour Palette. IEE Proceedings-Vision, Image and Signal Processing 152(6), 787–792 (2005)CrossRefGoogle Scholar
  3. Chen, J., Chen, T.S., Cheng, M.W.: A New Data Hiding Method in Binary Image. In: Proceedings of the Fifth International Symposium on Multimedia Software Engineering (ISMSE’03) December 2003, Taichung, Taiwan, pp. 88–93 (2003)Google Scholar
  4. Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, 2nd edn. MIT Press, Cambridge (2001)MATHGoogle Scholar
  5. Johnson, N.F.: Information Hiding Steganography and Watermarking – Attacks Countermeasures. Kluwer Academic Publishers, Dordrecht (2001)Google Scholar
  6. Kamstra, L., Henk, J., Heijmans, A.M.: Reversible Data Embedding into Images Using Wavelet Techniques and Sorting. IEEE Transactions on Image Processing 14(12), 2082–2090 (2005)CrossRefMathSciNetGoogle Scholar
  7. Kim, H.Y.: New Public-key Authentication Watermarking for Binary Document Images Resistant to Parity Attacks. In: Proceedings of IEEE International Conference on Image Processing, September 2005, Genoa, Italy, vol. 2, pp. 1074–1077 (2005)Google Scholar
  8. Li, Z.Q., Zhang, H.B.: A New Data Hiding Method in Binary Images. In: Proceedings of the First International Conference Innovative Computing, Information and Control (ICICIC 2006), August 2006, Beijing, China, vol. 3, pp. 66–69 (2006)Google Scholar
  9. Lu, H., Wang, J., Kot, A.C., Shi, Y.Q.: An Objective Distortion Measure for Binary Document Images Based on Human. In: Proceedings of the 16th International Conference on Pattern Recognition, Quebec City, Canada, August 2002, vol. 4, pp. 239–242 (2002)Google Scholar
  10. Mielikainen, J.: LSB Matching Revisited. IEEE Signal Processing Letters 13(5), 285–287 (2006)CrossRefGoogle Scholar
  11. Moskowitz, I.S., Longdon, G.E., Chang, L.: A New Paradigm Hidden in Steganography. In: Proceedings of the 2000 Workshop on New Security Paradigms (NSPW’2000), September 2001, Cork, Ireland, pp. 41–50 (2001)Google Scholar
  12. Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible Data Hiding. IEEE Transactions on Circuits and Systems for Video Technology 16(3), 354–361 (2006)CrossRefGoogle Scholar
  13. Pamboukian, S.V.D., Kim, H.Y.: Reversible Data Hiding and Reversible Authentication Watermarking for Binary Images In: Proceedings of the Sixth Brazilian Symposium on Information and Computer System Security (SBSEG’06) August 2006, Santos, Brazil (2006) Available at http://www.lps.usp.br/~hae/sbseg2006-rdtc.pdf
  14. Potdar, V.M., Han, S., Chang, E.: Fingerprinted Secret Sharing Steganography for Robustness Against Image Cropping Attacks. In: Proceedings of the third IEEE International Conference on Industrial Informatics (INDIN’05), August 2005. Perth, Australia, pp. 10–12 (2005)Google Scholar
  15. Tsai, C.L., Chiang, H.F., Fan, K.C., Chung, C.D.: Reversible Data Hiding and Lossless Reconstruction of Binary Images Using Pair-wise Logical Computation Mechanism. Pattern Recognition 38(11), 1993–2006 (2005)CrossRefGoogle Scholar
  16. Tseng, Y.C., Chen, Y.Y., Pan, H.K.: A Secure Data Hiding Scheme for Binary Images. IEEE Transactions on Communications 50(8), 1227–1231 (2002)CrossRefGoogle Scholar
  17. Wang, C.C., Chang, C.C., Jan, J.K., Yeh, J.S.: Novel Steganographic Schemes Based on Row-Major Mapping Relation. In: Proceedings of 2006 IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2006), December 2006, Pasadena, California, USA, pp. 392–395 (2006)Google Scholar
  18. Wu, M., Liu, B.: Data Hiding in Binary Image for Authentication and Annotation. IEEE Transactions on Multimedia 6(4), 528–538 (2004)CrossRefGoogle Scholar

Copyright information

© Springer Berlin Heidelberg 2007

Authors and Affiliations

  • Chung-Chuan Wang
    • 1
  • Chin-Chen Chang
    • 2
  • Xinpeng Zhang
    • 3
  • Jinn-Ke Jan
    • 1
  1. 1.Department of Computer Science, National Chung Hsing University, Taichung 402, TaiwanR.O.C.
  2. 2.Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan, 40724R.O.C.
  3. 3.School of Communication & Information Engineering, Shanghai University, Shanghai 200072P.R.C.

Personalised recommendations