Advertisement

A Watermarking Method for Halftone Images Based on Iterative Halftoning Method

  • In-Gook Chun
  • Sangho Ha
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2738)

Abstract

This paper proposes a new watermarking method to embed invisible data in halftone images. Halftone images are binary images appearing in printed matters such as books. The embedded data in halftone images can be used for copyright protection. The data hiding is integrated into halftoning operation. Watermark bits are hidden at pseudo-random locations within a halftone image during halftoning process. In order to minimize the distortions due to the inserted watermark, the proposed method tries to find the best neighborhood pattern using iterative binary search method. In order to cope with unintentional attacks such as cropping and distortions, the watermark is inserted periodically in halftone images. Experiments show that the proposed method can hide the relatively large amount of data within a halftone image without causing noticeable artifacts and the watermark is robust to crop and geometrical distortion.

Keywords

Autocorrelation Function Watermark Image Data Hiding Geometrical Transformation Watermark Method 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ulichney, R.A.: Digital Halftoning. MIT Press, Cambridge (1987)Google Scholar
  2. 2.
    Allebach, J.P.: DBS: Retrospective and Future Direction. In: Proceedings of SPIE, vol. 4300, pp. 358–376 (2001)Google Scholar
  3. 3.
    Hel-Or, H.Z.: Copyright Labeling of Printed Images. In: Proceedings of IEEE Int. Conf. on Image Processing, pp. 702–705 (2000)Google Scholar
  4. 4.
    Wang, S.G., Knox, K.T.: Embedding digital watermarks in halftone screens. In: Proceedings of SPIE, vol. 3971, pp. 218–227 (2000)Google Scholar
  5. 5.
    Baharav, Z., Shaked, D.: Watermarking of dither halftoned images. In: Proceedings of SPIE, vol. 3657, pp. 307–316 (1999)Google Scholar
  6. 6.
    Fu, M.S., Au, O.C.: Data Hiding in Halftone Images by Stochastic Error Diffusion. In: Proceedings of IEEE Int. Conf. on Acoustics, Speech and Signal Processing, pp. 1965–1968 (2001)Google Scholar
  7. 7.
    Fu, M.S., Au, O.C.: Hiding Data in Halftone Image using Modified Data Hiding Error Diffusion. In: Proceedings of SPIE, vol. 4067, pp. 1671–1680 (2000)Google Scholar
  8. 8.
    Fu, M.S., Au, O.C.: Data Hiding for Halftone Images. In: Proceedings of SPIE, vol. 3971, pp. 228–236 (2000)Google Scholar
  9. 9.
    Fu, M.S., Au, O.C.: Halftone image data hiding with intensity selection and connection selection. In: Signal Proceeding: Image Communication, vol. 16, pp. 909–930 (2001)Google Scholar
  10. 10.
    Kacker, D., Allebach, J.P.: Joint Halftoning and Watermarking. In: Proceedings of IEEE Int. Conf. on Image Processing, pp. 69–72 (2000)Google Scholar
  11. 11.
    Mese, M., Vaidyanathan, P.P.: Look-Up Table (LUT) Method for Inverse Halftoning. IEEE Trans. on Image Processing 10, 1566–1578 (2001)CrossRefGoogle Scholar
  12. 12.
    Kutter, M.: Watermarking Resisting to Translation, Rotation, and Scaling. In: Proceedings of SPIE, vol. 3528, pp. 423–431 (1998)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • In-Gook Chun
    • 1
  • Sangho Ha
    • 1
  1. 1.School of Information Technology EngineeringSoonchunhyang UniversityAsan-si, Choongchungnam-doRepublic of Korea

Personalised recommendations