Paper
17 May 2006 Secure and robust steganographic algorithm for binary images
Author Affiliations +
Abstract
In recent years, active research has mainly concentrated on authenticating a signature; tracking a document in a digital library, and tamper detection of a scanned document or secured communication using binary images. Binary image steganographical systems provide a solution for the above discussed issues. The two color constraint of the image limits the extension of various LSB embedding techniques to the binary case. In this paper, we present a new data hiding system for binary images and scanned documents. The system initially identifies embeddable blocks and enforces specific block statistics to hide sensitive information. The distribution of the flippable pixels in these blocks is highly uneven over the image. A variable block embedding threshold is employed for capitalizing on this uneven distribution of pixels. In addition, we also present a measure to find the best the cover given a specific file of sensitive information. The simulation was performed over 50 various binary images such the scanned documents, cartoons, threshold color images. Simulation results shows that 1) The amount of data embedded is comparatively higher than the existing algorithms (such as K.H. Hwang et.al [5], J. Chen et.al [10], M.Y.Wu et.al [9]). 2) The visual distortion in cover image is minimal when compared with the existing algorithms (such as J. Chen[10], M.Y.Wu et.al [9]) will be presented.
© (2006) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Sos S. Agaian and Ravindranath Cherukuri "Secure and robust steganographic algorithm for binary images", Proc. SPIE 6235, Signal Processing, Sensor Fusion, and Target Recognition XV, 62351F (17 May 2006); https://doi.org/10.1117/12.663820
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Binary data

Data hiding

Distortion

Information security

Computer simulations

Visualization

Embedded systems

Back to Top