Senary Huffman Compression – A Reversible Data Hiding Scheme for Binary Images
Over the past few years many studies have proposed reversible data hiding schemes, but few have been applied to binary images. Some studies have utilized spread spectrum, compression and binary operations methods to achieve the data hiding goal, but most of them suffered from poor visual quality, capacity and inability to extract the hidden data during recovery. The performance of existing methods also is unsatisfactory. Therefore, this paper proposes a reversible data hiding scheme for binary images: SHC (senary Huffman compression). SHC adopts the half-white and half-black pixels of 4×1 or 2×2 blocks of six types to increase visual quality. Moreover, SHC is senary instead of binary and becomes double senary as a compression unit to increase compression rate and secret hiding capacity. Experimental results show that recovered images are well within human visual perception and have PSNR(s) greater than 33, high secret hiding capacity for 1.1 secret bits / 2 bits, and an effective compression rate of over 17% on average. All results demonstrate that the scheme has advantages in reversible data hiding for binary images.
Keywordsreversible data hiding PSNR visual perception
Unable to display preview. Download preview PDF.
- Chen, J., Chen, T.S., Cheng, M.W.: A New Data Hiding Method in Binary Image. In: Proceedings of the Fifth International Symposium on Multimedia Software Engineering (ISMSE’03) December 2003, Taichung, Taiwan, pp. 88–93 (2003)Google Scholar
- Johnson, N.F.: Information Hiding Steganography and Watermarking – Attacks Countermeasures. Kluwer Academic Publishers, Dordrecht (2001)Google Scholar
- Kim, H.Y.: New Public-key Authentication Watermarking for Binary Document Images Resistant to Parity Attacks. In: Proceedings of IEEE International Conference on Image Processing, September 2005, Genoa, Italy, vol. 2, pp. 1074–1077 (2005)Google Scholar
- Li, Z.Q., Zhang, H.B.: A New Data Hiding Method in Binary Images. In: Proceedings of the First International Conference Innovative Computing, Information and Control (ICICIC 2006), August 2006, Beijing, China, vol. 3, pp. 66–69 (2006)Google Scholar
- Lu, H., Wang, J., Kot, A.C., Shi, Y.Q.: An Objective Distortion Measure for Binary Document Images Based on Human. In: Proceedings of the 16th International Conference on Pattern Recognition, Quebec City, Canada, August 2002, vol. 4, pp. 239–242 (2002)Google Scholar
- Moskowitz, I.S., Longdon, G.E., Chang, L.: A New Paradigm Hidden in Steganography. In: Proceedings of the 2000 Workshop on New Security Paradigms (NSPW’2000), September 2001, Cork, Ireland, pp. 41–50 (2001)Google Scholar
- Pamboukian, S.V.D., Kim, H.Y.: Reversible Data Hiding and Reversible Authentication Watermarking for Binary Images In: Proceedings of the Sixth Brazilian Symposium on Information and Computer System Security (SBSEG’06) August 2006, Santos, Brazil (2006) Available at http://www.lps.usp.br/~hae/sbseg2006-rdtc.pdf
- Potdar, V.M., Han, S., Chang, E.: Fingerprinted Secret Sharing Steganography for Robustness Against Image Cropping Attacks. In: Proceedings of the third IEEE International Conference on Industrial Informatics (INDIN’05), August 2005. Perth, Australia, pp. 10–12 (2005)Google Scholar
- Wang, C.C., Chang, C.C., Jan, J.K., Yeh, J.S.: Novel Steganographic Schemes Based on Row-Major Mapping Relation. In: Proceedings of 2006 IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2006), December 2006, Pasadena, California, USA, pp. 392–395 (2006)Google Scholar