High Capacity Data Hiding in Binary Document Images

  • N. B. Puhan
  • A. T. S. Ho
  • F. Sattar
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5703)


In this paper, we propose a high capacity data hiding method in binary document images towards semi-fragile authentication. Achieving high capacity in binary images with strict imperceptibility criterion is found to be a difficult task. In this method, noise type pixels are selected for pixel-wise data embedding using a secret key. The data hiding process through pixel flipping introduces some background noise in watermarked images and could preserve relevant information. The reversible nature of noise pixel patterns used in flipping process enables blind detection and provides high watermark capacity illustrated in different test images. After extraction process, the background noise is removed to generate the noise-free version of the watermarked image.


Binary Image Document Image Center Pixel Data Hiding Noise Pixel 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann Publishers Inc., San Francisco (2001)Google Scholar
  2. 2.
    Low, S.H., Maxemchuk, N.F., Lapone, A.M.: Document Identification for Copyright Protection Using Centroid Detection. IEEE Trans. on Communication 46(3), 372–383 (1998)CrossRefGoogle Scholar
  3. 3.
    Low, S.H., Maxemchuk, N.F.: Performance Comparison of Two Text Marking Methods. IEEE Journal on Selected Areas in Communications 16(4), 561–572 (1998)CrossRefGoogle Scholar
  4. 4.
    Brassil, J.T., Low, S., Maxemchuk, N.F.: Copyright Protection for the Electronic Distribution of Text Documents. Proc. of the IEEE 87(7), 1181–1196 (1999)CrossRefGoogle Scholar
  5. 5.
    Brassil, J., O’Gorman, L.: Watermarking Document Images with Bounding Box Expansion. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 227–235. Springer, Heidelberg (1996)CrossRefGoogle Scholar
  6. 6.
    Wu, M., Liu, B.: Data hiding in binary image for authentication and annotation. IEEE Transactions on Multimedia 6(4), 528–538 (2004)CrossRefGoogle Scholar
  7. 7.
    Koch, E., Zhao, J.: Embedding Robust Labels into Images for Copyright Protection. In: Proc. International Congress on Intellectual Property Rights for Specialized Information, Knowledge & New Technologies, Vienna (1995)Google Scholar
  8. 8.
    Mei, Q., Wong, E.K., Memon, N.: Data Hiding in Binary Text Documents. In: Proc. SPIE Security and Watermarking of Multimedia Contents III, San Jose (2001)Google Scholar
  9. 9.
    Amamo, T., Misaki, D.: Feature Calibration Method for Watermarking of Document Images. In: Proc. 5th Int’l Conf on Document Analysis and Recognition, Bangalore, India, pp. 91–94 (1999)Google Scholar
  10. 10.
    Ho, A.T.S., Puhan, N.B., Marziliano, P., Makur, A., Guan, Y.L.: Perception Based Binary Image Watermarking. In: Proc. IEEE International Symposium on Circuits and Systems (ISCAS), Vancouver, Canada, May 2004, vol. 2, pp. 37–40 (2004)Google Scholar
  11. 11.
    Puhan, N.B., Ho, A.T.S.: Secure Exact Authentication in Binary Document Images. In: Proc. IET Intl. Conference on Visual Information Engineering (VIE), Bangalore, India, September 2006, pp. 29–34 (2006)Google Scholar
  12. 12.
    Kim, H.Y., de Queiroz, R.L.: Alteration-Locating Authentication Watermarking for Binary Images. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939. Springer, Heidelberg (2004)Google Scholar
  13. 13.
    Yang, H., Alex, C.K.: Binary Image Authentication with Tampering Localization By Embedding Cryptographic Signature and Block Identifier. IEEE Signal Processing Letters 13(12), 741–744 (2006)CrossRefGoogle Scholar
  14. 14.
    Makur, A.: Self-embedding and Restoration Algorithms for Document Watermark. In: Proc. IEEE International Conference on Acoustics Speech and Signal Processing, vol. 2, pp. 1133–1136 (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • N. B. Puhan
    • 1
  • A. T. S. Ho
    • 2
  • F. Sattar
    • 1
  1. 1.School of Electrical and Electronic EngineeringNanyang Technological UniversitySingapore
  2. 2.Department of Computing Faculty of Engineering and Physical SciencesUniversity of SurreyGuildfordUK

Personalised recommendations