2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World Of
DOI: 10.1109/icme.2000.869623
|View full text |Cite
|
Sign up to set email alerts
|

Data hiding in digital binary image

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 100 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…The number of black pixels in each block can be even or odd; therefore, another line of researches flip pixel(s) to control the odevity of the number of black pixels in each block to embed one bit of secret data. By considering the connectively and smoothness of the pixels in the block, Wu et al [13,14] define a flippability score to choose pixel to flip for embedding data. Another novel flippability criterion is proposed in [15] to find more suitable pixel to flip.…”
Section: Introductionmentioning
confidence: 99%
“…The number of black pixels in each block can be even or odd; therefore, another line of researches flip pixel(s) to control the odevity of the number of black pixels in each block to embed one bit of secret data. By considering the connectively and smoothness of the pixels in the block, Wu et al [13,14] define a flippability score to choose pixel to flip for embedding data. Another novel flippability criterion is proposed in [15] to find more suitable pixel to flip.…”
Section: Introductionmentioning
confidence: 99%
“…So far, there were only a few studies on data hiding in binary images and very few researches on authentication of binary images. Wu, Tang, and Liu [1] embedded bits in image blocks by pattern matching; the method can be used both for data hiding and image authentication. The method proposed by Pan, Chen, and Tseng [2] changed pixel values in image blocks to hide secret data by mapping block contents into the secret data.…”
Section: Introductionmentioning
confidence: 99%
“…The image is transformed into bits which represent the watermark bits. The bits are embedded in carefully chosen locations in database and if recovered correctly can be used to reconstruct the embedded image [26,28] . This class of watermarking methods can be considered as a sub-class of the bit-level watermarking class.…”
Section: Statistical-property Watermarking Algorithmsmentioning
confidence: 99%