Data Hiding in Binary Text Documents 1. Q. Mei, E. K. Wong, and N. Memon
|
|
- Violet Stevens
- 6 years ago
- Views:
Transcription
1 Data Hiding in Binary Text Documents 1 Q. Mei, E. K. Wong, and N. Memon Department of Computer and Information Science Polytechnic University 5 Metrotech Center, Brooklyn, NY ABSTRACT With the proliferation of digital media such as digital images, digital audio, and digital video, robust digital watermarking and data hiding techniques are needed for copyright protection, copy control, annotation, and authentication. While many techniques have been proposed for digital color and grayscale images, not all of them can be directly applied to binary text images. The difficulty lies in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. We propose a new method for data hiding in binary text documents by embedding data in the 8-connected boundary of a character. We have identified a fixed set of pairs of five-pixel long boundary patterns for embedding data. One of the patterns in a pair requires deletion of the center foreground pixel, whereas the other requires the addition of a foreground pixel. A unique property of the proposed method is that the two patterns in each pair are dual of each other -- changing the pixel value of one pattern at the center position would result in the other. This property allows easy detection of the embedded data without referring to the original document, and without using any special enforcing techniques for detecting embedded data. Keywords: data hiding, watermarking, binary text documents, authentication 1. Introduction As digital devices such as scanners and digital cameras become more and more available, and mass storage media for digital data become more affordable, the use of digital images in practical applications are becoming more widespread. Practical image applications range from those for famous works of art, bank checks, to medical images depicting an obscure disease. Reliable methods for copyright protection, copy control, annotation, and authentication are therefore needed. A variety of digital watermarking and data hiding techniques have been proposed for such purposes. However, most of the methods developed today are for grayscale and color images [1], by which the gray level or color value of a selected group of pixels is changed by a small amount without causing visually noticeable artifacts. These techniques cannot be directly applied to binary images where the pixels have either 0 or 1 value. Arbitrarily changing pixels on a binary image causes very noticeable artifacts (See Figure 1 for an example.) A different class of embedding techniques must therefore be developed for binary images. This has important applications in a wide variety of document images that are represented as binary foreground and background; e.g. text documents. There has been limited work on watermarking and data hiding in binary images. In [2], the input binary image is divided into 3 x 3 (or larger) blocks. The flipping priorities of pixels in a 3 x 3 block are then computed and those with the lowest scores are those to be changed. The flipping priority of a pixel is indicative of the estimated visual distortion that would be caused by flipping the value of a pixel from 0 to 1 or from 1 to 0. Data are embedded such that the total number of black pixels is either odd or even in a block. Shuffling was used to equalize the uneven embedding capacity. The data hiding technique is not 1 This work was supported in part by NSF REU Grant # made to Polytechnic University. Corresponding author: wong@poly.edu
2 robust to printing and scanning and hence suitable only for steganography and authentication (fragile watermarking) applications. In [3], data is embedded in text documents by shifting lines and words spacing. This approach has low embedding capacity but the embedded data is robust to photocopying, scanning, and printing processes. In [4], the difference between the average widths of character strokes extracted from two sets of partitions arranged symmetrically is used to embed data. This method can only be applied to documents containing characters. In [5], data is embedded in dithered images by changing the dithering patterns, and in fax images by changing the run-lengths. The method cannot be applied to general binary images but is claimed to be robust to printing and scanning. In this paper, we propose a new method for data hiding in binary text document images by changing pixel values along the non-smooth portions of character boundaries. The method could also be applied to other types of binary images that contain connected components. Our method uses an efficient table look up procedure for determining the boundary patterns to embed data. Like the method in [2], our technique is not robust to printing and scanning and hence is useful only in steganography and authentication applications. The rest of this paper is organized as follows: In Section 2, we describe our proposed method for embedding and extracting data. In Section 3, we present some experimental results. And, in Section 4, we give our conclusions. 2. Proposed Approach In this section, we present our proposed data hiding technique that embeds information bits along character boundaries. 2.1 Boundary Patterns Selection In our proposed approach, data are embedded in the 8-connected boundary of a character. We assume that the input text document is in binary image form, or has been converted into a binary image from a grayscale or color document. We have identified 100 pairs of five-pixel long boundary patterns for embedding data. One of the patterns in a pair requires addition of a foreground pixel adjacent to the center pixel, whereas the other requires the deletion of the center foreground pixel. For convenience, we will refer to these operations as the Add and Delete operations, and call these two types of patterns as the A (Add)- and D (Delete)-patterns respectively. A unique property of the chosen patterns is that the A- and D- patterns in each pair are dual of each other; that is, changing the center pixel of one pattern would result in the other pattern. We refer to this operation as flipping the pattern; that is, flipping an A-pattern would result in a D-pattern, and vice versa. Figure 2 shows 28 example dual pairs from the 100 pairs. In the figure, the black pixels are boundary pixels, and the gray pixels are foreground object pixels. The A- patterns are for encoding information bit 1, and the D-patterns are for encoding information bit 0. The duality property allows easy detection of the embedded data without referring to the original document, and without using any special enforcing techniques in the detection process. In obtaining the 100 boundary pattern pairs, the goal is to preserve the overall shape of a character, and to minimize noticeable artifacts and distortions around the boundary after embedding data. First we assume that each of the five consecutive boundary pixels do not touch (as 8-connected neighbors) any pixels in the boundary segment other than the one immediately preceding or following it. This is a reasonable assumption for the boundary of a character or connected component of reasonable size (in terms of pixel count.) We start out with a set of all possible five-pixel-long boundary patterns satisfying this requirement. The following types of boundary patterns are then eliminated from the initial set: (a) Boundary segments that do not preserve length after Add or Delete operations (b) Straight line segments (c) Boundary segments with a 90 degree corner
3 Elimination of boundary segments in category (a) above ensures that the length of boundary segments remains as five pixels long after an Add or Delete operations. This allows the extraction of embedded data from the same 5-pixel long fixed partitioning of the boundary, without using a special enforcing procedure. Straight-line segments are eliminated since they no longer look straight after adding or deleting pixels at the center position, and may become noticeable. Here, we eliminated five-pixel long horizontal, vertical, and diagonal straight-line segments. Finally, boundary segments that form a 90-degree corner at the center pixel are eliminated, since they no longer look like a sharp 90-degree corner after adding or deleting pixel at the center position. 2.2 Embedding and Extracting Data The 100 pairs of boundary patterns are stored in a lookup table called the pattern table. In the embedding process, the input image is scanned in a left-to-right, and top-to-bottom manner to extract all connected components, which correspond to characters or other symbols in a text document. For each connected component, the first upper-left foreground pixel encountered in the scanning process is used as the starting pixel. An 8-connected boundary following algorithm is then used to obtain the closed outer boundary of a connected component. Certain characters, such as the characters o and b, contain one or more inner boundaries and they are not used in our current implementation. The outer boundary of a character is then traversed in a clockwise manner and divided into a set of consecutive non-overlapping five-pixel-long segments. If the last boundary segment is less than five pixels long, it is discarded. The set of consecutive boundary segments is then matched with patterns in the pattern table. If a boundary segment matches a pattern in the pattern table, it is called a valid boundary segment. Valid boundary segments are used to embed data and other segments on the boundary are simply ignored in the process. If the data bit to be embedded is a 0 and the current boundary segment is an Add pattern, the pattern is flipped to become a Delete pattern; otherwise no changes are necessary. Similarly, if the data bit to be embedded is a 1 and the current boundary segment is a Delete pattern, the pattern is flipped to become an Add pattern; otherwise, no changes are necessary. Data bits are embedded in the characters (or connected components) of a document in a left-to-right, and top-to-bottom manner. Figure 3 shows a block diagram of the embedding process. In the extraction process, the same procedure as used in the embedding process is used to extract fivepixel long boundary segments from connected components. Valid boundary segments are, again, identified using a table look up procedure and converted to a binary data bits. Figure 4 shows a block diagram of the extraction process. The data hiding capacity c for each connected component is bounded by [0, int{n/5}] where N is the number of boundary points in the connected component, and int{ } is the integer operation. The total data hiding capacity C for a text document is c_ave*m where c_ave is the average capacity per character, and M is the total number of characters in the document. 3. Experimental Results A set of experiments was performed on a SUN Ultra Spark 60 workstation to prove the validity of the proposed method. Figure 5(a) shows a signature image 2 of size 287 x 61 pixels. It has seven connected components. Figure 5(b) shows the marked image with 91 bits of embedded data, which contain 14 bits of header information and the ASCII representation of the 11 letters POLYTECHNIC (77 bits). Figure 5(c) shows the difference image. The same image was used in [2] in their experiment and it was reported that 7 letters were embedded using their method. Figure 6(a) shows a text paragraph of 72 dpi resolution. The image was generated using the Paint program on a Windows 98 PC. It has 334 connected components. Figure 6(b) shows the marked image with 648 embedded bits. It can be seen that the marked images of both Figures 5(b) and Figure 6(b) are almost visually identical to the original. We also applied our method to a test document with a full page of text of font size 11 characters. Table I shows the test results for the document scanned in at 100, 200, and 300 dpi. The total number of connected components at 300 dpi is 2 The signature was obtained from the U.S. White House website during the summer of 2000.
4 2,284, which corresponds to the 2,060 characters on the document, plus other symbols such as period, commas, etc. At 200 dpi, the number of connected components increases slightly to 2,326. A visual inspection shows that at 200 dpi, some of the connected components got broken into two or more pieces. We suspect this has to do with either the scanning process or the software that converts the original scanned image from grayscale to binary. At 300 dpi, the total number of embedded bits is 13,000 with an average of 5.69 bits/connected component (CC). This decreases to 6,560 bits and 2.82 bits/cc at 200 dpi. The decrease in data hiding capacity as resolution decreases is expected because the characters or connected components have fewer pixels, and consequently have shorter boundaries in terms of pixels. An interesting observation is that although the boundary length (in terms of pixels) increases 1.5 times from 200 dpi to 300 dpi, the data hiding capacity increases about 2 times. A possible explanation could be that more valid boundary patterns are matched at 300 dpi. A more thorough investigation needs to be done. At 100 dpi, visual inspection shows that an unacceptable number of connected components got broken into two or more pieces. The data hiding capacity drops to only 721 total bits, or 0.17 bits/cc. We expect that with better scanning and grayscale to binary conversion process, broken connected components would be reduced and the number of connected components should come out to be about the same as that of 200 or 300 dpi images. The data hiding capacity would then be improved as the size of the connected components get bigger. 4. Conclusions A novel data hiding technique for binary text documents was developed. Experimental results demonstrated good data hiding capacity of the technique. In the current implementation, we only used the outer boundary of a character to embed data. If we include inner boundary, the data hiding capacity can be further increased. Since the method hides data in non-smooth portions of text character boundaries, alterations are hardly noticeable. The duality property of the Add-Delete patterns allows easy extraction of hidden data without complicated enforcing techniques, and without referring to the original document. The proposed method is useful for annotating messages in a text document, and for detecting alterations. This method could also be applied to other binary images with connected components. In future work, we will explore the use of boundary segments other than five pixels long for embedding data, and study their data hiding capacity. References [1] M. Swanson, M. Kobayashi, and A. Tewfik, Multimedia Data Embedding and Watermarking Technologies, IEEE Proceedings, vol. 86, No. 6, pp , June [2] M. Wu, E. Tang, and B. Liu, Data Hiding in Digital Binary Images, Proc. Int l Conf. on Multimedia and Expo, Jul 31-Aug 2, 2000, New York, NY. [3] S. H. Low, N. F. Maxemchuk, A. M. Lapone, Document Identification for Copyright Protection Using Centroid Detection, IEEE Trans. on Comm., vol. 46, no. 3, Mar 1998, pp [4] T. Amamo and D. Misaki, Feature Calibration Method for Watermarking of Document Images, Proc. 5 th Int l Conf on Document Analysis and Recognition, 1999, pp , Bangalore, India. [5] K. Matsui and K. Tanaka, Video-steganography: How to Secretly Embed a Signature in a Picture, Proc. of IMA Intellectual Property Project, v.1, no. 1, Figure 1. Effect of Arbitrarily Changing Pixel Values on a Binary Image
5 Figure 2. Twenty-eight of the 100 Dual A- and D-Patterns. Pattern Table Original Text Document Extract Character Boundary Divide into Segments Match Segment Pattern Embed Data Marked Text Document Figure 3. Data Embedding Process
6 Pattern Table Marked Text Document Extract Character Boundary Divide into Segments Match Segment Pattern Extract Data Figure 4. Data Extraction Process (a) Original Signature Image (287 x 61 pixels) (b) Image with Letters POLYTECHNIC Embedded (c) Difference Image Figure 5. Experiment Result from the Signature Image (a) Original Text Image at 72 dpi
7 (b) Marked Text Image with 648 bits embedded Figure 6. Experimental Result for a Paragraph of Text Table I. Results from a Full Text Document Resolution in dpi # Connected Components (CC) 4,254 2,326 2,284 # bits embedded 721 6,560 13,000 Ave # bits/cc
DATA EMBEDDING IN TEXT FOR A COPIER SYSTEM
DATA EMBEDDING IN TEXT FOR A COPIER SYSTEM Anoop K. Bhattacharjya and Hakan Ancin Epson Palo Alto Laboratory 3145 Porter Drive, Suite 104 Palo Alto, CA 94304 e-mail: {anoop, ancin}@erd.epson.com Abstract
More informationVARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS
VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS Anita Pradhan Department of CSE, Sri Sivani College of Engineering, Srikakulam, Andhra Pradesh, India anita.pradhan15@gmail.com
More informationA reversible data hiding based on adaptive prediction technique and histogram shifting
A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn
More information(Refer Slide Time: 00:02:00)
Computer Graphics Prof. Sukhendu Das Dept. of Computer Science and Engineering Indian Institute of Technology, Madras Lecture - 18 Polyfill - Scan Conversion of a Polygon Today we will discuss the concepts
More informationMultilayer Data Embedding Using Reduced Difference Expansion
Multilayer Data Embedding Using Reduced Difference Expansion DINESH SATRE 1, DEVYANI BONDE 2, SUBHASH RATHOD 3 Department Of Computer Engineering Marathwada Mitra Mandal s Institute of Technology Savitribai
More informationPicture Maze Generation by Repeated Contour Connection and Graph Structure of Maze
Computer Science and Engineering 2013, 3(3): 76-83 DOI: 10.5923/j.computer.20130303.04 Picture Maze Generation by Repeated Contour Connection and Graph Structure of Maze Tomio Kurokawa Department of Information
More informationHighly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 8 August, 2014 Page No. 7932-7937 Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting
More informationInformation Cloaking Technique with Tree Based Similarity
Information Cloaking Technique with Tree Based Similarity C.Bharathipriya [1], K.Lakshminarayanan [2] 1 Final Year, Computer Science and Engineering, Mailam Engineering College, 2 Assistant Professor,
More informationAn Efficient Character Segmentation Based on VNP Algorithm
Research Journal of Applied Sciences, Engineering and Technology 4(24): 5438-5442, 2012 ISSN: 2040-7467 Maxwell Scientific organization, 2012 Submitted: March 18, 2012 Accepted: April 14, 2012 Published:
More informationFingerprint Watermark Embedding by Discrete Cosine Transform for Copyright Ownership Authentication
Fingerprint Watermark Embedding by Discrete Cosine Transform for Copyright Ownership Authentication Chi-Man Pun and Ioi-Tun Lam Abstract In respect to the issues on protecting intellectual property, particular
More informationWatermark based Recovery of Tampered Documents
Watermark based Recovery of Tampered Documents Anamitra Makur Electrical & Electronic Engineering Nanyang Technological University, Singapore Govindarajan Sridharan Electrical & Electronic Engineering
More informationA Document Image Analysis System on Parallel Processors
A Document Image Analysis System on Parallel Processors Shamik Sural, CMC Ltd. 28 Camac Street, Calcutta 700 016, India. P.K.Das, Dept. of CSE. Jadavpur University, Calcutta 700 032, India. Abstract This
More informationMultipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning
Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning C. SANTIAGO-AVILA, M. GONZALEZ LEE, M. NAKANO-MIYATAKE, H. PEREZ-MEANA Sección de Posgrado e Investigación, Esime Culhuacan Instituto
More informationRobust Lossless Data Hiding. Outline
Robust Lossless Data Hiding Yun Q. Shi, Zhicheng Ni, Nirwan Ansari Electrical and Computer Engineering New Jersey Institute of Technology October 2010 1 Outline What is lossless data hiding Existing robust
More informationScene Text Detection Using Machine Learning Classifiers
601 Scene Text Detection Using Machine Learning Classifiers Nafla C.N. 1, Sneha K. 2, Divya K.P. 3 1 (Department of CSE, RCET, Akkikkvu, Thrissur) 2 (Department of CSE, RCET, Akkikkvu, Thrissur) 3 (Department
More informationsignal-to-noise ratio (PSNR), 2
u m " The Integration in Optics, Mechanics, and Electronics of Digital Versatile Disc Systems (1/3) ---(IV) Digital Video and Audio Signal Processing ƒf NSC87-2218-E-009-036 86 8 1 --- 87 7 31 p m o This
More informationScanner Parameter Estimation Using Bilevel Scans of Star Charts
ICDAR, Seattle WA September Scanner Parameter Estimation Using Bilevel Scans of Star Charts Elisa H. Barney Smith Electrical and Computer Engineering Department Boise State University, Boise, Idaho 8375
More informationOCR For Handwritten Marathi Script
International Journal of Scientific & Engineering Research Volume 3, Issue 8, August-2012 1 OCR For Handwritten Marathi Script Mrs.Vinaya. S. Tapkir 1, Mrs.Sushma.D.Shelke 2 1 Maharashtra Academy Of Engineering,
More informationLecture 3: Art Gallery Problems and Polygon Triangulation
EECS 396/496: Computational Geometry Fall 2017 Lecture 3: Art Gallery Problems and Polygon Triangulation Lecturer: Huck Bennett In this lecture, we study the problem of guarding an art gallery (specified
More informationEAG: Edge Adaptive Grid Data Hiding for Binary Image Authentication
EAG: Edge Adaptive Grid Data Hiding for Binary Image Authentication Hong Cao and Alex C. Kot * Institute for Infocomm Research, A*STAR, Singapore E-mail: hcao@i2r.a-star.edu.sg Tel: +65-64082157 * Nanyang
More informationDigital image steganography using LSB substitution, PVD, and EMD
Digital image steganography using LSB substitution, PVD, and EMD Anita Pradhan, K. Raja Sekhar, Gandharba Swain* Department of Computer Science and Engineering, K L University, Vaddeswaram-522502, Andhra
More informationLayout Segmentation of Scanned Newspaper Documents
, pp-05-10 Layout Segmentation of Scanned Newspaper Documents A.Bandyopadhyay, A. Ganguly and U.Pal CVPR Unit, Indian Statistical Institute 203 B T Road, Kolkata, India. Abstract: Layout segmentation algorithms
More informationRobust Steganography Using Texture Synthesis
Robust Steganography Using Texture Synthesis Zhenxing Qian 1, Hang Zhou 2, Weiming Zhang 2, Xinpeng Zhang 1 1. School of Communication and Information Engineering, Shanghai University, Shanghai, 200444,
More informationDigital Image Steganography Using Bit Flipping
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 1 Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2018-0006 Digital Image Steganography Using
More informationA Robust Wipe Detection Algorithm
A Robust Wipe Detection Algorithm C. W. Ngo, T. C. Pong & R. T. Chin Department of Computer Science The Hong Kong University of Science & Technology Clear Water Bay, Kowloon, Hong Kong Email: fcwngo, tcpong,
More informationAN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION
AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION Shaik Shaheena 1, B. L. Sirisha 2 VR Siddhartha Engineering College, Vijayawada, Krishna, Andhra Pradesh(520007),
More informationData Hiding on Text Using Big-5 Code
Data Hiding on Text Using Big-5 Code Jun-Chou Chuang 1 and Yu-Chen Hu 2 1 Department of Computer Science and Communication Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung 43301, Republic
More informationMorphological Image Processing
Morphological Image Processing Morphology Identification, analysis, and description of the structure of the smallest unit of words Theory and technique for the analysis and processing of geometric structures
More informationA System for Joining and Recognition of Broken Bangla Numerals for Indian Postal Automation
A System for Joining and Recognition of Broken Bangla Numerals for Indian Postal Automation K. Roy, U. Pal and B. B. Chaudhuri CVPR Unit; Indian Statistical Institute, Kolkata-108; India umapada@isical.ac.in
More informationData Hiding in Video
Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract
More informationAdaptive Pixel Pair Matching Technique for Data Embedding
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationCOMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES
COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES H. I. Saleh 1, M. E. Elhadedy 2, M. A. Ashour 1, M. A. Aboelsaud 3 1 Radiation Engineering Dept., NCRRT, AEA, Egypt. 2 Reactor Dept., NRC,
More informationDATA HIDING IN PDF FILES AND APPLICATIONS BY IMPERCEIVABLE MODIFICATIONS OF PDF OBJECT PARAMETERS
DATA HIDING IN PDF FILES AND APPLICATIONS BY IMPERCEIVABLE MODIFICATIONS OF PDF OBJECT PARAMETERS 1 Jiun-Tsung Wang ( 王竣聰 ) and 2 Wen-Hsiang Tsai ( 蔡文祥 ) 1 Institute of Multimedia Eng., National Chiao
More informationImage Compression for Mobile Devices using Prediction and Direct Coding Approach
Image Compression for Mobile Devices using Prediction and Direct Coding Approach Joshua Rajah Devadason M.E. scholar, CIT Coimbatore, India Mr. T. Ramraj Assistant Professor, CIT Coimbatore, India Abstract
More informationHybrid Stegnography using ImagesVaried PVD+ LSB Detection Program
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12086-12090 Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program Shruti
More informationReversible Blind Watermarking for Medical Images Based on Wavelet Histogram Shifting
Reversible Blind Watermarking for Medical Images Based on Wavelet Histogram Shifting Hêmin Golpîra 1, Habibollah Danyali 1, 2 1- Department of Electrical Engineering, University of Kurdistan, Sanandaj,
More informationFinger Print Enhancement Using Minutiae Based Algorithm
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,
More informationAN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS
AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan
More informationA Revisit to LSB Substitution Based Data Hiding for Embedding More Information
A Revisit to LSB Substitution Based Data Hiding for Embedding More Information Yanjun Liu 1,, Chin-Chen Chang 1, and Tzu-Yi Chien 2 1 Department of Information Engineering and Computer Science, Feng Chia
More informationSkeletonization Algorithm for Numeral Patterns
International Journal of Signal Processing, Image Processing and Pattern Recognition 63 Skeletonization Algorithm for Numeral Patterns Gupta Rakesh and Kaur Rajpreet Department. of CSE, SDDIET Barwala,
More informationI. INTRODUCTION. Figure-1 Basic block of text analysis
ISSN: 2349-7637 (Online) (RHIMRJ) Research Paper Available online at: www.rhimrj.com Detection and Localization of Texts from Natural Scene Images: A Hybrid Approach Priyanka Muchhadiya Post Graduate Fellow,
More informationRandom Traversing Based Reversible Data Hiding Technique Using PE and LSB
Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Rhythm Katira #1, Prof. V. Thanikaiselvan *2 # ECE Department, VIT University Vellore, Tamil-Nadu, India 1 rhythm.katira2009@vit.ac.in
More informationComputer Graphics. Chapter 4 Attributes of Graphics Primitives. Somsak Walairacht, Computer Engineering, KMITL 1
Computer Graphics Chapter 4 Attributes of Graphics Primitives Somsak Walairacht, Computer Engineering, KMITL 1 Outline OpenGL State Variables Point Attributes Line Attributes Fill-Area Attributes Scan-Line
More informationReversible Data Hiding VIA Optimal Code for Image
Vol. 3, Issue. 3, May - June 2013 pp-1661-1665 ISSN: 2249-6645 Reversible Data Hiding VIA Optimal Code for Image Senthil Rani D. #, Gnana Kumari R. * # PG-Scholar, M.E-CSE, Coimbatore Institute of Engineering
More informationAn Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility
An Information Hiding Scheme Based on Pixel- Value-Ordering Prediction-Error Expansion with Reversibility Ching-Chiuan Lin Department of Information Management Overseas Chinese University Taichung, Taiwan
More informationLocating 1-D Bar Codes in DCT-Domain
Edith Cowan University Research Online ECU Publications Pre. 2011 2006 Locating 1-D Bar Codes in DCT-Domain Alexander Tropf Edith Cowan University Douglas Chai Edith Cowan University 10.1109/ICASSP.2006.1660449
More information2D rendering takes a photo of the 2D scene with a virtual camera that selects an axis aligned rectangle from the scene. The photograph is placed into
2D rendering takes a photo of the 2D scene with a virtual camera that selects an axis aligned rectangle from the scene. The photograph is placed into the viewport of the current application window. A pixel
More informationMorphological Image Processing
Morphological Image Processing Binary image processing In binary images, we conventionally take background as black (0) and foreground objects as white (1 or 255) Morphology Figure 4.1 objects on a conveyor
More informationA Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation
A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation * A. H. M. Al-Helali, * W. A. Mahmmoud, and * H. A. Ali * Al- Isra Private University Email: adnan_hadi@yahoo.com Abstract:
More informationOptical Character Recognition (OCR) for Printed Devnagari Script Using Artificial Neural Network
International Journal of Computer Science & Communication Vol. 1, No. 1, January-June 2010, pp. 91-95 Optical Character Recognition (OCR) for Printed Devnagari Script Using Artificial Neural Network Raghuraj
More informationSkew Detection for Complex Document Images Using Fuzzy Runlength
Skew Detection for Complex Document Images Using Fuzzy Runlength Zhixin Shi and Venu Govindaraju Center of Excellence for Document Analysis and Recognition(CEDAR) State University of New York at Buffalo,
More informationLSB Based Audio Steganography Using Pattern Matching
ISSN: 359-0040 Vol 2 Issue, November - 205 LSB Based Audio Steganography Using Pattern Matching Mr Ratul Choudhury Student, Dept of Computer Sc & Engg Dept University of Calcutta Kolkata, India ratulchowdhury@iemcalcom
More informationCHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM
74 CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM Many data embedding methods use procedures that in which the original image is distorted by quite a small
More informationImage Authentication and Recovery Scheme Based on Watermarking Technique
Image Authentication and Recovery Scheme Based on Watermarking Technique KENJI SUMITOMO 1, MARIKO NAKANO 2, HECTOR PEREZ 2 1 Faculty of Information and Computer Engineering The University of Electro-Communications
More informationAUTOMATIC LOGO EXTRACTION FROM DOCUMENT IMAGES
AUTOMATIC LOGO EXTRACTION FROM DOCUMENT IMAGES Umesh D. Dixit 1 and M. S. Shirdhonkar 2 1 Department of Electronics & Communication Engineering, B.L.D.E.A s CET, Bijapur. 2 Department of Computer Science
More informationA Model-based Line Detection Algorithm in Documents
A Model-based Line Detection Algorithm in Documents Yefeng Zheng, Huiping Li, David Doermann Laboratory for Language and Media Processing Institute for Advanced Computer Studies University of Maryland,
More informationIntroduction to Visible Watermarking. IPR Course: TA Lecture 2002/12/18 NTU CSIE R105
Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105 Outline Introduction State-of of-the-art Characteristics of Visible Watermarking Schemes Attacking Visible Watermarking
More informationUse of Shape Deformation to Seamlessly Stitch Historical Document Images
Use of Shape Deformation to Seamlessly Stitch Historical Document Images Wei Liu Wei Fan Li Chen Jun Sun Satoshi Naoi In China, efforts are being made to preserve historical documents in the form of digital
More informationObject Shape Recognition in Image for Machine Vision Application
Object Shape Recognition in Image for Machine Vision Application Mohd Firdaus Zakaria, Hoo Seng Choon, and Shahrel Azmin Suandi Abstract Vision is the most advanced of our senses, so it is not surprising
More informationIMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY
IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY Shreelekshmi R, Wilscy M 2 and C E Veni Madhavan 3 Department of Computer Science & Engineering, College of Engineering, Trivandrum,
More informationA New Approach to Compressed Image Steganography Using Wavelet Transform
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 53-59 www.iosrjournals.org A New Approach to Compressed Image Steganography
More informationBit-Plane Decomposition Steganography Using Wavelet Compressed Video
Bit-Plane Decomposition Steganography Using Wavelet Compressed Video Tomonori Furuta, Hideki Noda, Michiharu Niimi, Eiji Kawaguchi Kyushu Institute of Technology, Dept. of Electrical, Electronic and Computer
More informationError-free Authentication Watermarking Based on Prediction-Error-Expansion Reversible Technique
ISSC 2013, LYIT Letterkenny, June 20 21 Error-free Authentication Watermarking Based on Prediction-Error-Expansion Reversible Technique Rongrong Ni,H.D.Cheng, Yao Zhao andyuhou Institute of Information
More informationDIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS
DICTA22: Digital Image Computing Techniques and Applications, 2 22 January 22, Melbourne, Australia. DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS *Yuk Ying CHUNG, Man To WONG *Basser Department of Computer
More informationRecognition of Unconstrained Malayalam Handwritten Numeral
Recognition of Unconstrained Malayalam Handwritten Numeral U. Pal, S. Kundu, Y. Ali, H. Islam and N. Tripathy C VPR Unit, Indian Statistical Institute, Kolkata-108, India Email: umapada@isical.ac.in Abstract
More informationScanner Parameter Estimation Using Bilevel Scans of Star Charts
Boise State University ScholarWorks Electrical and Computer Engineering Faculty Publications and Presentations Department of Electrical and Computer Engineering 1-1-2001 Scanner Parameter Estimation Using
More informationA new approach to reference point location in fingerprint recognition
A new approach to reference point location in fingerprint recognition Piotr Porwik a) and Lukasz Wieclaw b) Institute of Informatics, Silesian University 41 200 Sosnowiec ul. Bedzinska 39, Poland a) porwik@us.edu.pl
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1
Minutiae Points Extraction using Biometric Fingerprint- Enhancement Vishal Wagh 1, Shefali Sonavane 2 1 Computer Science and Engineering Department, Walchand College of Engineering, Sangli, Maharashtra-416415,
More informationFootprint Recognition using Modified Sequential Haar Energy Transform (MSHET)
47 Footprint Recognition using Modified Sequential Haar Energy Transform (MSHET) V. D. Ambeth Kumar 1 M. Ramakrishnan 2 1 Research scholar in sathyabamauniversity, Chennai, Tamil Nadu- 600 119, India.
More informationA New Approach To Fingerprint Recognition
A New Approach To Fingerprint Recognition Ipsha Panda IIIT Bhubaneswar, India ipsha23@gmail.com Saumya Ranjan Giri IL&FS Technologies Ltd. Bhubaneswar, India saumya.giri07@gmail.com Prakash Kumar IL&FS
More informationA Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach
www.ijcsi.org 402 A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach Gunjan Nehru 1, Puja Dhar 2 1 Department of Information Technology, IEC-Group of Institutions
More informationKeyword Spotting in Document Images through Word Shape Coding
2009 10th International Conference on Document Analysis and Recognition Keyword Spotting in Document Images through Word Shape Coding Shuyong Bai, Linlin Li and Chew Lim Tan School of Computing, National
More informationRestoring Chinese Documents Images Based on Text Boundary Lines
Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009 Restoring Chinese Documents Images Based on Text Boundary Lines Hong Liu Key Laboratory
More informationA Reversible Data Hiding Scheme for BTC- Compressed Images
IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game
More informationSPREAD SPECTRUM AUDIO WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL
SPREAD SPECTRUM WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL 1 Yüksel Tokur 2 Ergun Erçelebi e-mail: tokur@gantep.edu.tr e-mail: ercelebi@gantep.edu.tr 1 Gaziantep University, MYO, 27310, Gaziantep,
More informationCS443: Digital Imaging and Multimedia Binary Image Analysis. Spring 2008 Ahmed Elgammal Dept. of Computer Science Rutgers University
CS443: Digital Imaging and Multimedia Binary Image Analysis Spring 2008 Ahmed Elgammal Dept. of Computer Science Rutgers University Outlines A Simple Machine Vision System Image segmentation by thresholding
More information2013, IJARCSSE All Rights Reserved Page 1637
Volume 3, Issue 6, June 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Reversible Data
More informationHierarchical Representation of 2-D Shapes using Convex Polygons: a Contour-Based Approach
Hierarchical Representation of 2-D Shapes using Convex Polygons: a Contour-Based Approach O. El Badawy, M. S. Kamel Pattern Analysis and Machine Intelligence Laboratory, Department of Systems Design Engineering,
More informationA Compressed Representation of Mid-Crack Code with Huffman Code
I.J. Image, Graphics and Signal Processing, 2015, 10, 11-18 Published Online September 2015 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijigsp.2015.10.02 A Compressed Representation of Mid-Crack
More informationBi-level Image Watermarking and Distortion Measure
Bi-level Image Watermarking and Distortion Measure Lu Haiping School of Electrical & Electronic Engineering A thesis submitted to the Nanyang Technological University in fulfillment of the requirement
More informationDynamic Stroke Information Analysis for Video-Based Handwritten Chinese Character Recognition
Dynamic Stroke Information Analysis for Video-Based Handwritten Chinese Character Recognition Feng Lin and Xiaoou Tang Department of Information Engineering The Chinese University of Hong Kong Shatin,
More informationLight Field Occlusion Removal
Light Field Occlusion Removal Shannon Kao Stanford University kaos@stanford.edu Figure 1: Occlusion removal pipeline. The input image (left) is part of a focal stack representing a light field. Each image
More informationData hiding technique in JPEG compressed domain
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/253537666 Data hiding technique in JPEG compressed domain Article in Proceedings of SPIE -
More informationCAPTCHAs and Information Hiding
CAPTCHAs and Information Hiding Neal R. Wagner The University of Texas at San Antonio Department of Computer Science San Antonio, Texas 78249 USA wagner@cs.utsa.edu Abstract. The goal of steganography
More informationRobust biometric image watermarking for fingerprint and face template protection
Robust biometric image watermarking for fingerprint and face template protection Mayank Vatsa 1, Richa Singh 1, Afzel Noore 1a),MaxM.Houck 2, and Keith Morris 2 1 West Virginia University, Morgantown,
More informationTexture Segmentation by Windowed Projection
Texture Segmentation by Windowed Projection 1, 2 Fan-Chen Tseng, 2 Ching-Chi Hsu, 2 Chiou-Shann Fuh 1 Department of Electronic Engineering National I-Lan Institute of Technology e-mail : fctseng@ccmail.ilantech.edu.tw
More informationImage Error Concealment Based on Watermarking
Image Error Concealment Based on Watermarking Shinfeng D. Lin, Shih-Chieh Shie and Jie-Wei Chen Department of Computer Science and Information Engineering,National Dong Hwa Universuty, Hualien, Taiwan,
More informationGenetic Algorithm For Fingerprint Matching
Genetic Algorithm For Fingerprint Matching B. POORNA Department Of Computer Applications, Dr.M.G.R.Educational And Research Institute, Maduravoyal, Chennai 600095,TamilNadu INDIA. Abstract:- An efficient
More informationTEXT DETECTION AND RECOGNITION IN CAMERA BASED IMAGES
TEXT DETECTION AND RECOGNITION IN CAMERA BASED IMAGES Mr. Vishal A Kanjariya*, Mrs. Bhavika N Patel Lecturer, Computer Engineering Department, B & B Institute of Technology, Anand, Gujarat, India. ABSTRACT:
More informationIMPROVED RHOMBUS INTERPOLATION FOR REVERSIBLE WATERMARKING BY DIFFERENCE EXPANSION. Catalin Dragoi, Dinu Coltuc
0th European Signal Processing Conference (EUSIPCO 01) Bucharest, Romania, August 7-31, 01 IMPROVED RHOMBUS INTERPOLATION FOR REVERSIBLE WATERMARKING BY DIFFERENCE EXPANSION Catalin Dragoi, Dinu Coltuc
More informationComputer Graphics. Attributes of Graphics Primitives. Somsak Walairacht, Computer Engineering, KMITL 1
Computer Graphics Chapter 4 Attributes of Graphics Primitives Somsak Walairacht, Computer Engineering, KMITL 1 Outline OpenGL State Variables Point Attributes t Line Attributes Fill-Area Attributes Scan-Line
More informationA NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME
VOL 13, NO 13, JULY 2018 ISSN 1819-6608 2006-2018 Asian Research Publishing Network (ARPN) All rights reserved wwwarpnjournalscom A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME Javvaji V K Ratnam
More informationImage Steganography Technique By Using Braille Method of Blind People (LSBraille)
Image Steganography Technique By Using Braille Method of Blind People (LSBraille) Abdelmgeid Amin Ali Associate Professor, Dept. of Computer Science Faculty of Science, Al Minia University Al Minia, Egypt
More informationA New Algorithm for Detecting Text Line in Handwritten Documents
A New Algorithm for Detecting Text Line in Handwritten Documents Yi Li 1, Yefeng Zheng 2, David Doermann 1, and Stefan Jaeger 1 1 Laboratory for Language and Media Processing Institute for Advanced Computer
More informationCountermeasure for the Protection of Face Recognition Systems Against Mask Attacks
Countermeasure for the Protection of Face Recognition Systems Against Mask Attacks Neslihan Kose, Jean-Luc Dugelay Multimedia Department EURECOM Sophia-Antipolis, France {neslihan.kose, jean-luc.dugelay}@eurecom.fr
More informationA Flexible Scheme of Self Recovery for Digital Image Protection
www.ijcsi.org 460 A Flexible Scheme of Self Recoery for Digital Image Protection Zhenxing Qian, Lili Zhao 2 School of Communication and Information Engineering, Shanghai Uniersity, Shanghai 200072, China
More informationHistorical Handwritten Document Image Segmentation Using Background Light Intensity Normalization
Historical Handwritten Document Image Segmentation Using Background Light Intensity Normalization Zhixin Shi and Venu Govindaraju Center of Excellence for Document Analysis and Recognition (CEDAR), State
More informationTowards a Telltale Watermarking Technique for Tamper-Proofing
Towards a Telltale Watermarking Technique for Tamper-Proofing Deepa Kundur and Dimitrios Hatzinakos 10 King s College Road Department of Electrical and Computer Engineering University of Toronto Toronto,
More informationKhmer OCR for Limon R1 Size 22 Report
PAN Localization Project Project No: Ref. No: PANL10n/KH/Report/phase2/002 Khmer OCR for Limon R1 Size 22 Report 09 July, 2009 Prepared by: Mr. ING LENG IENG Cambodia Country Component PAN Localization
More informationDigital Image Steganography Techniques: Case Study. Karnataka, India.
ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College
More information