{"title":"Lossless Data Hiding in the Spatial Domain for Image Tamper Detection","authors":"Seungwu Han, H. Jin, M. Fujiyoshi, H. Kiya","doi":"10.1109/ISPACS.2006.364761","DOIUrl":null,"url":null,"abstract":"This paper proposes lossless data hiding method for image tamper detection. The proposed method embeds data in images and extracts data from images in the spatial domain. This method restores the original image as well as extracts hidden data from an image conveying hidden data. The proposed method uses one and only one parameter for each image to control embed and extract data. An image is divided into several blocks, and the image feature description for the block is hidden into the corresponding block itself. Hidden descriptions extracted from an image and generated from the recovered image are compared to detect tampering. The image quality of an image with hidden data is high so that nobody is aware that data are hidden. Experimental results show the effectiveness of the proposed method","PeriodicalId":178644,"journal":{"name":"2006 International Symposium on Intelligent Signal Processing and Communications","volume":"75 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 International Symposium on Intelligent Signal Processing and Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISPACS.2006.364761","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9
Abstract
This paper proposes lossless data hiding method for image tamper detection. The proposed method embeds data in images and extracts data from images in the spatial domain. This method restores the original image as well as extracts hidden data from an image conveying hidden data. The proposed method uses one and only one parameter for each image to control embed and extract data. An image is divided into several blocks, and the image feature description for the block is hidden into the corresponding block itself. Hidden descriptions extracted from an image and generated from the recovered image are compared to detect tampering. The image quality of an image with hidden data is high so that nobody is aware that data are hidden. Experimental results show the effectiveness of the proposed method