<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article"><front><journal-meta><journal-id journal-id-type="publisher-id">INFORMATICA</journal-id><journal-title-group><journal-title>Informatica</journal-title></journal-title-group><issn pub-type="epub">0868-4952</issn><issn pub-type="ppub">0868-4952</issn><publisher><publisher-name>VU</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">inf16308</article-id><article-id pub-id-type="doi">10.15388/Informatica.2005.108</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research article</subject></subj-group></article-categories><title-group><article-title>Hiding Data in Halftone Images</article-title></title-group><contrib-group><contrib contrib-type="Author"><name><surname>Tseng</surname><given-names>Hsien-Wen</given-names></name><email xlink:href="mailto:wen@mail.ntctc.edu.tw">wen@mail.ntctc.edu.tw</email><xref ref-type="aff" rid="j_INFORMATICA_aff_000"/></contrib><contrib contrib-type="Author"><name><surname>Chang</surname><given-names>Chin-Chen</given-names></name><email xlink:href="mailto:ccc@cs.ccu.edu.tw">ccc@cs.ccu.edu.tw</email><xref ref-type="aff" rid="j_INFORMATICA_aff_001"/></contrib><aff id="j_INFORMATICA_aff_000">Library of National Taichung Teachers College, Taichung, Taiwan 403, R.O.C.</aff><aff id="j_INFORMATICA_aff_001">Department of Computer Science and Information Engineering, National Chung Cheng University, Chaiyi, Taiwan 621, R.O.C.</aff></contrib-group><pub-date pub-type="epub"><day>01</day><month>01</month><year>2005</year></pub-date><volume>16</volume><issue>3</issue><fpage>419</fpage><lpage>430</lpage><history><date date-type="received"><day>01</day><month>04</month><year>2005</year></date></history><abstract><p>Most recent papers about visual cryptography for halftone images are dedicated to get a higher contrast decoded image. However, the hidden visual pattern often blends into the background image and leads to a confused image. In this paper, we propose an improved method for halftone image hiding. By using the proposed method, the background image can be eliminated and the hidden visual pattern can be revealed precisely. Experimental results show that the decoded visual patterns could reveal good visual quality under various kinds of input patterns. Furthermore, better visual quality can be obtained when more halftone images are overlaid.</p></abstract><kwd-group><label>Keywords</label><kwd>data hiding</kwd><kwd>error diffusion</kwd><kwd>halftone</kwd><kwd>visual cryptography</kwd></kwd-group></article-meta></front></article>