To achieve blind watermark extraction, it is difficult to use the detail coefficients directly as a location map to determine the data-hiding locations. This paper proposes a data-hiding technique for binary images in morphological transform domain for authentication purpose.
This publication describes techniques and theories involved in binary image AW: We describe DH techniques for binary images and analyze which of them are adequate to be used in AWs analyze the most adequate secret and public-key cryptographic ciphers for the AWs describe how to spatially localize the alteration in the image (besides detecting it) without compromising the security present AWs for JBIG2-compressed binary images present a reversible AW for binary images and finally present our conclusions and future research. The authentication of binary images is necessary in practice, because most scanned and computer-generated document images are binary. In recent years, some AWs for binary images have been proposed in the lite-rature. Authentication watermarking (AW) techniques use DHs to insert a particular data into an image, in order to detect later any accidental or malicious alterations in the image, as well as to certify that the image came from the right source. Moreover, our method well supports state-of-the-art hybrid authentication that integrates data hiding and modern cryptographic techniques.ĭata hiding (DH) is a technique used to embed a sequence of bits in a cover image with small visual deterioration and the means to extract it afterwards. Comparison shows that our method achieves a good tradeoff between large payload and minimal visual distortion as compared with several classic prior arts for diverse types of binary host images. We prove that our method is robust against the interferences caused by close-by contours, image noises, and invariantly selects the same sequence of DCPLs for an arbitrary binary host image and its various marked versions. By maintaining and updating a location status map, a protective mechanism is proposed to preserve the context of each CAP and their corresponding outcomes. Our method employs a dynamic system structure with the redesigned fundamental content adaptive processes (CAP) switch to iteratively trace new contour segments and to search for new DCPLs. Through establishing a dense edge-adaptive grid (EAG) along the object contours, we use a simple binary image to show that EAG more efficiently selects good data carrying pixel locations (DCPL) associated with “ l-shaped” patterns than block-based methods. We propose, in this paper, a novel edge-adaptive data hiding method for authenticating binary host images. © 2016, Revista Tecnica de la Facultad de Ingeniera. Experimental results indicate that the proposed scheme is efficient and secure. When any modification of the watermarked text document's content and/or format are made, the Chinese text document will fail to pass the authentication. Watermark to be authenticated can be extracted without the help of the original watermark and Word document itself. In each block, the embedding position is chosen by Chinese character's strokes and the magic square.
In this method, the cover document is divided into two blocks by utilizing the mathematical expression of Chinese characters, and then the hashing values of the text document's content and format are embedded into the two blocks respectively by setting underlines to Chinese characters and hiding the underlines. This paper proposes a novel erasable text watermarking scheme for exact authentication, which including authentication of content and format of Chinese Word documents. The problem of authentication has been well studied. It is becoming easier and easier to tamper with digital Works in ways that are difficult to detect.