Skip to main content
Log in

Hiding a halftone secret image in two camouflaged halftone images

  • Application Problems
  • Published:
Pattern Recognition and Image Analysis Aims and scope Submit manuscript

Abstract

In this paper, we shall propose a method to hide a halftone secret image into two other camouflaged halftone images. In our method, we adjust the gray-level image pixel value to fit the pixel values of the secret image and two camouflaged images. Then, we use the halftone technique to transform the secret image into a secret halftone image. After that, we make two camouflaged halftone images at the same time out of the two camouflaged images and the secret halftone image. After overlaying the two camouflaged halftone images, the secret halftone image can be revealed by using our eyes. The experimental results included in this paper show that our method is very practicable.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. T. S. Chen, C. C. Chang, and M. S. Hwang, “A Visual Image Cryptosystem Based on Vector Quantization,” IEEE Transactions on Image Processing 7(10), 1485–1488 (1997).

    Article  MathSciNet  Google Scholar 

  2. C. C. Chang, J. Y. Hsiao, and C. S. Chan, “Finding Optimal LSB Substitution in Image Hiding by Dynamic Programming Strategy,” Pattern Recognition 36(7), 1583–1595 (2003).

    Article  Google Scholar 

  3. P. C. Chang, C. S. Yu, and T. H. Lee, “Hybrid LMS-MMSE Inverse Halftoning Technique,” IEEE Transactions on Image Processing 10(1), 95–103 (2001).

    Article  MATH  Google Scholar 

  4. M. S. Fu and O. C. Au, “Halftone Image Data Hiding with Intensity Selection and Connection Selection,” Signal Processing: Image Communication 16(10), 909–930 (2001).

    Article  Google Scholar 

  5. M. S. Fu and O. C. Au, “Data Hiding Watermarking for Halftone Images,” IEEE Transactions on Image Processing 11(4), 477–484 (2002).

    Article  Google Scholar 

  6. M. S. Fu and O. C. Au, “Steganography in Halftone Images: Conjugate Error Diffusion,” Signal Processing 83 2171–2178 (2003).

    Article  Google Scholar 

  7. Y. C. Hou, “Visual Cryptography for Color Images,” Pattern Recognition 36(7), 1619–1629 (2003).

    Article  Google Scholar 

  8. R. J. Hwang and C. C. Chang, “Hiding a Picture in Two Pictures,” Optical Engineering 40(3), 342–351 (2001).

    Article  Google Scholar 

  9. M. Mese and P.P. Vaidyanathan, “Look-up Table (LUT) Method for Inverse Halftoning,” IEEE Transactions on Image Processing 10(1), 1566–1578 (2001).

    Article  Google Scholar 

  10. M. Mese and P. P. Vaidyanathan, “Tree-Structured Method for LUT Inverse Halftoning and for Image Halftoning,” IEEE Transactions on Image Processing 11(6), 644–655 (2002).

    Article  Google Scholar 

  11. S. C. Pei, and J. M. Guo, “Data Hiding in Halftone Images With Noise-Balanced Error Diffusion,” IEEE Signal Processing Letters 10(12), 345–351 (2003).

    Google Scholar 

  12. J. C. Stoffel and J. F. Moreland, “A Survey of Electronic Techniques for Pictorial Image Reproduction,” IEEE Transactions on Communications 29, 1898–1925 (1981).

    Article  Google Scholar 

  13. R. A. Ulichney, Digital Halftoning (MIT Press, Cambridge, MA, 1987).

    Google Scholar 

  14. M. Naor and A. Shamir, “Visual Cryptography,” Eurocrypt’94, Lecture Notes in Computer Science (Springer-Verlag, Perugia, Italy, 1994), pp. 1–12.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Additional information

The text was submitted by the authors in English.

Wei-Liang Tai received his BS degree in Computer Science in 2002 from Tamkang University, Tamsui, Taiwan, and his MS degree in Computer Science and Information Engineering in 2004 from National Chung Cheng University, Chiayi, Taiwan. He is currently a PhD student of Computer Science and Information Engineering at National Chung Cheng University. His research fields are image hiding, digital watermarking, and image compression.

Chi-Shiang Chan received his BS degree in Computer Science in 1999 from National Cheng Chi University, Taipei, Taiwan, and his MS degree in Computer Science and Information Engineering in 2001 from National Chung Cheng University, Chiayi, Taiwan. He is currently a PhD student of Computer Science and Information Engineering at National Chung Cheng University. His research fields are image hiding and image compression.

Chin-Chen Chang received his BS degree in Applied Mathematics in 1977 and his MS degree in Computer and Decision Sciences in 1979, both from National Tsing Hua University, Hsinchu, Taiwan. He received his PhD in Computer Engineering in 1982 from National Chiao Tung University, Hsinchu, Taiwan. During the academic years of 1980–1983, he was on the faculty of the Department of Computer Engineering at National Chiao Tung University. From 1983–1989, he was on the faculty of the Institute of Applied Mathematics, National Chung Hsing University, Taichung, Taiwan. From 1989 to 2004, he has worked as a professor in the Institute of Computer Science and Information Engineering at National Chung Cheng University, Chiayi, Taiwan. Since 2005, he has worked as a professor in the Department of Information Engineering and Computer Science at Feng Chia University, Taichung, Taiwan.

Dr. Chang is a fellow of the IEEE, a fellow of the IEE, and a member of the Chinese Language Computer Society, the Chinese Institute of Engineers of the Republic of China, and the Phi Tau Phi Society of the Republic of China. His research interests include computer cryptography, data engineering, and image compression.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chang, C.C., Chan, C.S. & Tai, W.L. Hiding a halftone secret image in two camouflaged halftone images. Pattern Recognit. Image Anal. 16, 486–496 (2006). https://doi.org/10.1134/S1054661806030163

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1134/S1054661806030163

Keywords

Navigation