Hybrid pixel-based data hiding and block-based watermarking for error-diffused halftone images

A low computational complexity noise-balanced error diffusion (NBEDF) technique is proposed for embedding watermarks into error-diffused images. The visual decoding pattern can be perceived when two or more similar NBEDF images are overlaid, even in a high activity region. Also, with the modified improved version of NBEDF, two halftone images can be made from two totally different gray-tone images, and still provide a clear and sharp visual decoding pattern. With self-decoding techniques, we can also decode the pattern with only one NBEDF image. However, the NBEDF method is not so robust to damage due to printing or other distortions. Thus, a kernels-alternated error diffusion (KAEDF) technique is proposed. By using them alternately in the halftone process, we find that two well-known kernels (Jarvis, J.F. et al., 1976; Stucki, P., 1981) are compatible. In the decoder, because the spectral distributions of Jarvis and Stucki kernels are different in the 2D fast Fourier transform domain, we use the cumulative squared Euclidean distance criterion to determine each cell in a watermarked halftone image belonging to either Jarvis or Stucki, and then decode the watermark. Furthermore, because the detailed textures of Jarvis and Stucki patterns are somewhat different in the spatial domain, the lookup table (LUT) technique is also used for fast decoding. From simulation results, the correct decoding rates for both techniques are high and extremely robust, even after printing and scanning processes. Finally, we extend the hybrid NBEDF and KAEDF algorithms to two color EDF halftone images, where 8 independent KAEDF watermarks and 16 NBEDF watermarks can be inserted and still achieve a high-quality result.

[1]  Shen-Ge Wang,et al.  Embedding digital watermarks in halftone screens , 2000, Electronic Imaging.

[2]  John F. Jarvis,et al.  A survey of techniques for the display of continuous tone pictures on bilevel displays , 1976 .

[3]  A. Murat Tekalp,et al.  Temporal segmentation of video objects for hierarchical object-based motion description , 2002, IEEE Trans. Image Process..

[4]  Donald E. Knuth,et al.  Digital halftones by dot diffusion , 1987, TOGS.

[5]  Oscar C. Au,et al.  Halftone image data hiding with intensity selection and connection selection , 2001, Signal Process. Image Commun..

[6]  Eve A. Riskin,et al.  Embedded multilevel error diffusion , 1997, IEEE Trans. Image Process..

[7]  E.E. Pissaloux,et al.  Image Processing , 1994, Proceedings. Second Euromicro Workshop on Parallel and Distributed Processing.

[8]  Oscar C. Au,et al.  Data hiding watermarking for halftone images , 2002, IEEE Trans. Image Process..

[9]  G. R. Blakley,et al.  Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[10]  Reiner Eschbach,et al.  Threshold modulation in error diffusion , 1993, J. Electronic Imaging.

[11]  Jan P. Allebach,et al.  Model-based halftoning using direct binary search , 1992, Electronic Imaging.

[12]  P. P. Vaidyanathan,et al.  Optimized halftoning using dot diffusion and methods for inverse halftoning , 2000, IEEE Trans. Image Process..

[13]  Albert J. Ahumada,et al.  Principled halftoning based on human vision models , 1992, Electronic Imaging.

[14]  Robert Ulichney,et al.  Digital Halftoning , 1987 .

[15]  Oscar C. Au,et al.  Data hiding by smart pair toggling for halftone images , 2000, 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.00CH37100).

[16]  Dimitris Anastassiou,et al.  Error diffusion coding for A/D conversion , 1989 .

[17]  Hagit Hel-Or Watermarking and copyright labeling of printed images , 2001, J. Electronic Imaging.

[18]  Oscar C. Au,et al.  Data hiding in halftone images by stochastic error diffusion , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[19]  Eve A. Riskin,et al.  Embedded color error diffusion , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[20]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[21]  Chai Wah Wu Multimedia Data Hiding and Authentication via Halftoning and Coordinate Projection , 2002, EURASIP J. Adv. Signal Process..

[22]  Stefanos Kollias,et al.  Digital Image Halftoning Using Neural Networks , 1988, Other Conferences.

[23]  Avideh Zakhor,et al.  A new class of B/W and color halftoning algorithms , 1991, [Proceedings] ICASSP 91: 1991 International Conference on Acoustics, Speech, and Signal Processing.