Cryptography Reference
In-Depth Information
tained by referencing both Y 1 and W. Let W b be the collection of the locations
of all the black pixels in W, and W w the collection of the white pixel locations.
In constructing Y 2 , we will force the pixel value at all locations belonging to
W w to be identical to Y 1 . In other words, values at these locations are merely
copied from Y 1 to Y 2 . That is,
y 2 (i;j) = y 1 (i;j) 8(i;j) 2 W w
(13.10)
For the remaining pixels in W b , Y 2 needs to look natural and thus DHSED
applies error diffusion with the same error kernel. However, DHSED seeks to
make Y 2 different from Y 1 statistically so that when they are overlaid, pixels
in W b would tend to be darker. To achieve this, DHSED first morphologically
dilate, W b with a structuring element D consisting of a (2L + 1) (2L + 1)
matrix. We denote the dilated W b as C.
C = W b D
(13.11)
which can be interpreted as a L-pixel expansion of W b in all directions.
For the pixels outside C, DHSED copies Y 2 from Y 1 using (13.10) but
forces the error for Y 2 to be zero, i.e. i.e. 2 (i;j) = 0 for (i;j) 62 C. Note that the
error for Y 1 are nonzero in general for the same locations.
Let E = CW b = C\W w be the "border" of the secret pattern, obtained
by removing W b from the expanded region C. For the pixels in E, (13.1) and
(13.2) are still applied while (13.3) and (13.4) are not. (13.10) will be used to
replace (13.3) since E W w and Y 2 pixels in W w are copied from Y 1 . We will
use (13.12) to replace (13.4).
e 2 (i;j) = maxfminfu 2 (i;j) y 2 (i;j); 127g;127g (13.12)
which is basically (13.4) with a limiter. As Y 2 pixels in E are copied from Y 1
with artificial zero error outside C, there are chances that u2(i, 2 (i;j)y 2 (i;j) is
outside 127. The limiter would then help to make the e 2 (i;j) reasonable.
For the pixels in W b , DHSED uses regular error diffusion to generate Y 2
so that region W b in Y 2 still has the same characteristic texture as regular
error diusion. But the "phase" of the texture will be dierent compared to
the corresponding region in Y 1 since the error outside the region C is different
in Y 1 and Y 2 .
The overlaying operation is equivalent to applying the logical AND oper-
ation between images Y 1 and Y 2 . Since the pixels in region W w of Y 1 and Y 2
have been forced to be identical, the overlaid pixel values are simply the reg-
ular error diffused pixel values. However, in region W b , although the texture
in Y 1 and Y 2 maintains the same characteristic, there is an artificially intro-
duced phase shift such that collocated Y 1 and Y 2 pixels tend to be statistically
independent. As a result, the overlaying operation tends to give darker local
intensity thus revealing the secret pattern W. A more detailed analysis of this
will be given in Section 13.4.
Using Lena as the test image and Figure 13.5 as the secret binary pattern
 
Search WWH ::




Custom Search