Part II Algorithm and System Designs

ثبت نشده
چکیده

An increasingly large number of digital binary images have been used in everyday life. Handwritten signatures captured by electronic signing pads are digitally stored and are being used as the records for credit card payment by many department stores in the U.S. and for parcel delivery by major courier services such as the United Parcel Service (UPS). Word processing software like Microsoft Word allows a user to store his/her signature in a binary image file for inclusion at specified locations of a document. The documents signed in such a way can be sent directly to a fax machine or be distributed across a network. The unauthorized use of a signature, such as copying it onto an unauthorized payment, is becoming a big concern. In addition, a variety of important documents, such as social security records, insurance information, and financial documents, have also been digitized and stored. Because it is easy to copy and edit digital images via software tools, the annotation and authentication of binary images as well as the detection of tampering are very important. This chapter discusses data hiding techniques for these purposes as an alternative to or in conjunction with the cryptographic authentication approach. While we expect the 83 CHAPTER 5. DATA HIDING IN BINARY IMAGES 84 embedded data to have some robustness against minor distortion and preferably to withstand printing and scanning, the robustness of embedded data against intentional removal or other obliteration is not a primary concern because there is little incentive to do so in the targeted applications of annotation and authentication. Most prior works on image data hiding are for color or grayscale images in which the pixels may take on a wide range of values. For those images, changing pixel values by a small amount is generally unnoticeable under normal viewing conditions. This property of human visual system plays a key role in watermarking of perceptual media data [44, 46]. For images in which the pixels take on only a limited number of values, hiding data without causing visible artifacts becomes more difficult. In particular, flipping white or black pixels that are not on the boundary is likely to introduce visible artifacts in binary images. Before we present our solutions to the challenging issues of hiding data in binary images, we shall give a brief review of the prior art. Several methods for hiding data in specific types of binary images have …

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Bi-objective Model for Cellular Manufacturing System Considering Worker Skills, Part Priorities,and Equipment Levels

Here, a new mathematical model for cellular manufacturing systems considering three important features of part priority, levels of machine’s technology, and the operator’s skill is developed. Simultaneous consideration of these features provides a more realistic analysis of the problems in cellular manufacturing systems. A model with multiple design features including cell formation, human reso...

متن کامل

Low Complexity Converter for the Moduli Set {2^n+1,2^n-1,2^n} in Two-Part Residue Number System

Residue Number System is a kind of numerical systems that uses the remainder of division in several different moduli. Conversion of a number to smaller ones and carrying out parallel calculations on these numbers will increase the speed of the arithmetic operations in this system. However, the main factor that affects performance of system is hardware complexity of reverse converter. Reverse co...

متن کامل

Optimal Placement of Phasor Measurement Units to Maintain CompleteObservability Considering Maximum Reliability by Non-dominated Sorting Genetic Algorithm-II (NSGA-II)

Ever-increasing energy demand has led to geographic expansion of transmission lines and their complexity. In addition, higher reliability is expected in the transmission systemsdue to their vital role in power systems. It is very difficult to realize this goal by conventional monitoring and control methods. Thus, phasor measurement units (PMUs) are used to measure system parameters. Although in...

متن کامل

Contour Crafting Process Plan Optimization Part I: Single-Nozzle Case

Contour Crafting is an emerging technology that uses robotics to construct free form building structures by repeatedly laying down layers of material such as concrete. The Contour Crafting technology scales up automated additive fabrication from building small industrial parts to constructing buildings. Tool path planning and optimization for Contour Crafting benefit the technology by increasin...

متن کامل

Solving a bi-objective mathematical model for location-routing problem with time windows in multi-echelon reverse logistics using metaheuristic procedure

During the last decade, the stringent pressures from environmental and social requirements have spurred an interest in designing a reverse logistics (RL) network. The success of a logistics system may depend on the decisions of the facilities locations and vehicle routings. The location-routing problem (LRP) simultaneously locates the facilities and designs the travel routes for vehicles among ...

متن کامل

Application of adaptive sampling in fishery part 2: Truncated adaptive cluster sampling designs

There are some experiences that researcher come across quite number of time for very large networks in the initial samples such that they cannot finish the sampling procedure. Two solutions have been proposed and used by marine biologists which we discuss in this article: i) Adaptive cluster sampling based on order statistics with a stopping rule, ii) Restricted adaptive cluster sampling. Until...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001