By Topic

Reversible and lossless data hiding with application in digital library

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Chang-Lung Tsai ; Inst. of Comput. Sci. & Inf. Eng., Nat. Central Univ., Taiwan ; Kuo-Chin Fan ; Char-Dir Chung ; Chiang Chuang, T.

Recently, the development of data hiding techniques to hide annotations, confidential data, or side information into multimedia attracts the attention of researchers in various fields, especially in digital library. One of the essential tasks in digital library is the digitization of arts together with the corresponding textural descriptions. The purpose of data hiding is to embed relating textural description into the image to form an embedded image instead of two separate files (text file and image file). The hidden textural description and the original host image can be extracted and reconstructed from the embedded image in the reverse data extraction process. However, the reconstructed host image will more or less be distorted by utilizing traditional data hiding methods. In this paper, we propose a novel lossless data hiding method based on pixel decomposition and pair-wise logical computation. In addition to the lossless reconstruction of original host images, the results generated by the proposed method can also obtain high data hiding capacity and good visual quality. Furthermore, the task of tampering detection can also be achieved in the proposed method to ensure content authentication. Experimental results demonstrate the feasibility and validity of our proposed method.

Published in:

Security Technology, 2004. 38th Annual 2004 International Carnahan Conference on

Date of Conference:

11-14 Oct. 2004