120 likes | 547 Views
Halftone Visual Cryptography. IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 15, NO. 8, AUGUST 2006, pp. 2441-2453 Zhi Zhou, Gonzalo R. Arce, and Giovanni Di Crescenzo Reporter: Jen-Bang Feng. Visual Cryptography. +. =. +. =. Visual Cryptography. The Proposed Scheme. Comparisons. EX.
E N D
Halftone Visual Cryptography IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 15, NO. 8, AUGUST 2006, pp. 2441-2453 Zhi Zhou, Gonzalo R. Arce, and Giovanni Di Crescenzo Reporter: Jen-Bang Feng
Visual Cryptography + = + =
Comparisons EX. Block size: 4*4 m = 2 PSNR = 9.03
Results (2, 3)-threshold • (b) (e) extended VC • (c) (d) (f) proposed
Error diffusion EDF1 watermark Lena (gray level) Stacking EDF2 EDF1 Data Hiding in Halftone Images With Noise-Balanced Error Diffusion Soo-Chang Pei, and Jing-Ming Guo IEEE Signal Processing Letters, Vol.10, No.12, December 2003 Steganography in halftone images:conjugate error diffusion Ming Sun Fu, Oscar C. Au Signal Processing 83 (2003) 2171 – 2178
Hybrid Pixel-Based Data Hiding and Block-Based Watermarking for Error-Diffused Halftone ImagesSoo-Chang Pei (貝蘇章) and Jing-Ming GuoIEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 13, NO. 8, AUGUST 2003, Pages: 867-884. EDF 1 Watermark + Stacking EDF 2 * NBEDF Original Lena
Conclusions and Comments • Applying VC to halftone images • Classify: • During process • Outside process