{"title":"隐藏在点扩散图像中的可视数据","authors":"Xiaotian Wu, Wei Sun","doi":"10.1109/ICCIT.2010.5711123","DOIUrl":null,"url":null,"abstract":"In this paper, a novel visual data hiding method is proposed to conceal a binary visual pattern into a dot diffused halftone image. The visual pattern is revealed by copying the halftone image, shifting the copy and superimposing the shifted copy and original halftone image together. The self-decrypt property of the proposed method make it more robust against geometry distortion, while other existing visual data hiding approaches are not. Experimental results illustrate the advantages and effectiveness of the proposed method as well.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Visual data hiding in dot diffusion images\",\"authors\":\"Xiaotian Wu, Wei Sun\",\"doi\":\"10.1109/ICCIT.2010.5711123\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, a novel visual data hiding method is proposed to conceal a binary visual pattern into a dot diffused halftone image. The visual pattern is revealed by copying the halftone image, shifting the copy and superimposing the shifted copy and original halftone image together. The self-decrypt property of the proposed method make it more robust against geometry distortion, while other existing visual data hiding approaches are not. Experimental results illustrate the advantages and effectiveness of the proposed method as well.\",\"PeriodicalId\":131337,\"journal\":{\"name\":\"5th International Conference on Computer Sciences and Convergence Information Technology\",\"volume\":\"38 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"5th International Conference on Computer Sciences and Convergence Information Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCIT.2010.5711123\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"5th International Conference on Computer Sciences and Convergence Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCIT.2010.5711123","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In this paper, a novel visual data hiding method is proposed to conceal a binary visual pattern into a dot diffused halftone image. The visual pattern is revealed by copying the halftone image, shifting the copy and superimposing the shifted copy and original halftone image together. The self-decrypt property of the proposed method make it more robust against geometry distortion, while other existing visual data hiding approaches are not. Experimental results illustrate the advantages and effectiveness of the proposed method as well.