Advertisement

Joint Screening Halftoning and Visual Cryptography for Image Protection

  • Chao-Yung Hsu
  • Chun-Shien Lu
  • Soo-Chang Pei
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4283)

Abstract

Since digital right management of digital media data has received considerable attention recently, protection of halftone image documents becomes another important topic. Image-based visual cryptography is found to provide an alternative for applications of copyright protection by overlapping more than one secret embedded image to show the hidden information. In this paper, we propose a novel screening halftoning-based visual cryptography method for halftone image protection. Compared with the existing methods, the major contributions of our method contain (i) improved quality of the halftone images and extracted secrets; (ii) unlimited database size of protected halftone images; (iii) more than two halftone images can be overlapped to show the hidden secret; (iv) only one conjugate screen pair in our method is able to achieve the maximum clarity of extracted secrets in random screening. Experimental results and comparisons with a state of the art method demonstrate the effectiveness of our method.

Keywords

Cover Image Secret Message Secret Image Hide Information Stego Image 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Barten, P.J.: Physical model for the contrast sensitivity of the human eye. In: Proc. IS&T/SPIE Int. Symp. on Electronic Imaging Science and Technology, San Jose, CA, February 9-14, vol. 1666, pp. 57–74 (1992)Google Scholar
  2. 2.
    Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann, San Francisco (2002)MATHGoogle Scholar
  3. 3.
    Fu, M.S., Au, O.C.: Hiding data in halftone image using modified data hiding error diffusion. In: Proc. SPIE Conf. Visual Communication and Image Processing, vol. 4067, pp. 1671–1680 (2000)Google Scholar
  4. 4.
    Fu, M.S., Au, O.C.: Data hiding in halftone images by stochastic error diffusion. In: Proc. ICASSP, vol. 3, pp. 1965–1968 (2001)Google Scholar
  5. 5.
    Fu, M.S., Au, O.C.: Data hiding watermarking for halftone images. IEEE Trans. on Image Processing 11, 477–484 (2002)CrossRefGoogle Scholar
  6. 6.
    Fu, M.S., Au, O.C.: A novel self-conjugate halftone image watermarking technique. In: Proc. of IEEE Int. Symposium on Circuits and Systems, vol. 3, pp. 790–793 (2003)Google Scholar
  7. 7.
    Knox, K.T.: Digital watermarking using stochastic screen patterns, U.S. Patent 5 734 752 (September 1996)Google Scholar
  8. 8.
    Knuth, D.E.: Digital halftones by dot diffusion. ACM Trans. On Graphics 6(4), 245–273 (1987)MATHCrossRefGoogle Scholar
  9. 9.
    Lau, D.L., Arce, G.R.: Modern digital halftoning. Marcel Dekker, New York (2001)Google Scholar
  10. 10.
    Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  11. 11.
    Pei, S.C., Guo, J.M.: Hybrid pixel-based data hiding and block-based watermarking for error-diffused halftone images. IEEE Trans. on Circuits and Systems for Video Technology 13, 867–884 (2003)CrossRefGoogle Scholar
  12. 12.
    Wong, P.W., Memon, N.D.: Image processing for halftones. IEEE Signal Processing Magazine 20, 59–70 (2003)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Chao-Yung Hsu
    • 1
    • 2
  • Chun-Shien Lu
    • 2
  • Soo-Chang Pei
    • 1
  1. 1.Graduate Institute of Communication Eng.National Taiwan UniversityTaipeiTaiwan, ROC
  2. 2.Institute of Information ScienceAcademia SinicaTaipeiTaiwan, ROC

Personalised recommendations