Presentation is loading. Please wait.

Presentation is loading. Please wait.

Reversible Data Hiding using Histogram Shifting

Similar presentations


Presentation on theme: "Reversible Data Hiding using Histogram Shifting"— Presentation transcript:

1 Reversible Data Hiding using Histogram Shifting
Sai Saketh Nandagiri

2 Need for reversible data hiding
Restoring the original cover image after extraction of payload from the stego image in which the payload is hidden. E.g., in medical images it is required that the image is losslessly reconstructed after extraction of payload. Content authentication to verify the authenticity of the multimedia material. E.g., to verify the authenticity of a bank check transmitted over the internet. A watermarked image is deemed to be authentic if pixel values in the stego image are not altered after embedding the data.

3 Reversible Data Hiding-Histogram Shifting
Original image is modified based on tonal distribution to hide the payload. The peak and zero points in the histogram are used for embedding data. The peak and zero values should be transmitted as side-information to the receiver for payload extraction.

4 Algorithm-I First reversible data hiding algorithm as proposed by Ni et al [25]. Steps: Find the peak and zero point in the histogram of cover image. Scan the whole image in a sequential order, such as row-by-row, from top to bottom. Shift the histogram to left/right based on the location of zero point. If zero point is on the left side of histogram, i.e. v_zero < v_peak, shift the histogram towards left. Embed data in the shifted histogram.

5 Step 1: From the original image matrix f, histogram is plotted to locate zero and peak values. Figure 1: Original image f Figure 2: Original histogram h

6 Step 2: Figure 3: (a)Original image f (left) (b)Shifted image 𝑓 (right) Shift the histogram to the left as the zero point is located on the left side of the histogram using equation 1. 𝑓 𝑥 = 𝑓 𝑥,𝑦 −1, 𝑣 𝑧𝑒𝑟𝑜 <𝑓 𝑥,𝑦 < 𝑣 𝑝𝑒𝑎𝑘 𝑓(𝑥,𝑦), 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 Eq. 1 Figure 4: (a)Original histogram h (left) (b)Shifted histogram ℎ (right)

7 Step 3: Figure 5: (a)Shifted image 𝑓 (left) (b)Stego image 𝑓 (right) Embed payload p = ‘ ’ in the shifted image using equation 2. 𝑓 𝑥,𝑦 = 𝑓 𝑥,𝑦 −1, 𝑓 𝑥,𝑦 = 𝑣 𝑝𝑒𝑎𝑘 𝑎𝑛𝑑 𝑝 𝑙 =0 𝑓 (𝑥,𝑦), 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 Eq. 2 Figure 6: (a)Shifted histogram ℎ (right) (b)Stego histogram ℎ (left)

8 Algorithm-II Reversible data hiding algorithm proposed by Pan et al [26]. Steps: Divide the cover image into blocks of size s x s. For each block B, the peak value v_peak is located from its histogram. The neighboring points v_peak-1 and v_peak+1 are also located. Histogram is shifted to the left and right based on v_peak-2 and v_peak+2 Embed data in the shifted histogram.

9 Histogram is shifted to the left and right using equation 3.
𝐵′ 𝑖,𝑗 = 𝐵 𝑖,𝑗 +1, 𝑣 𝑝𝑒𝑎𝑘 +2≤𝐵(𝑖,𝑗)≤254 𝐵 𝑖,𝑗 −1, ≤𝐵(𝑖,𝑗)≤ 𝑣 𝑝𝑒𝑎𝑘 −2 Eq. 3 Binary bit stream is embedded in the cover image using equation 4. 𝐵′′ 𝑖,𝑗 = 𝐵′ 𝑖,𝑗 +1, & 𝐵 ′ 𝑖,𝑗 =𝑣 𝑝𝑒𝑎𝑘 +1, 𝑝 𝑙 =1 𝐵′ 𝑖,𝑗 −1, & 𝐵 ′ 𝑖,𝑗 =𝑣 𝑝𝑒𝑎𝑘 −1, 𝑝 𝑙 =1 Eq. 4

10 Proposed method to achieve RDH-HS
Fig 7: Flowchart of the proposed data hiding method

11 Proposed method to achieve RDH(cont.)
Steps: At the transmitter: The cover image (512 × 512) is 8 bits quantized as shown in fig. 7, is split into four blocks, each of size (256 × 256) as shown in fig. 8. The histogram of each block is shown in fig. 9. Then the histogram of each block is inverted as shown in fig. 10 using eq 𝐵 𝑖,𝑗 =255−𝐼 𝑖,𝑗 , 1≤𝑖≤𝑟𝑜𝑤𝑠;1≤𝑗≤𝑐𝑜𝑙𝑢𝑚𝑛𝑠 Eq. 5 Fig 8: Cover image

12 Fig 9: Cover image split into blocks
Fig 10: Histogram of individual blocks(see fig. 9) Fig 11: Inverted histogram of individual blocks(see fig. 10)

13 Continued Histogram shifting of each block as proposed by Pan et al. [26]. 𝐵′ 𝑖,𝑗 = 𝐵 𝑖,𝑗 +1, 𝑣 𝑝𝑒𝑎𝑘 +2≤𝐵(𝑖,𝑗)≤254 𝐵 𝑖,𝑗 −1, ≤𝐵(𝑖,𝑗)≤ 𝑣 𝑝𝑒𝑎𝑘 −2 Eq. 6 Fig 12

14 Continued The data is embedded in each block along using eq. 7. 𝐵′′ 𝑖,𝑗 = 𝐵′ 𝑖,𝑗 +1, & 𝐵 ′ 𝑖,𝑗 =𝑣 𝑝𝑒𝑎𝑘 +1, 𝑝 𝑙 =1 𝐵′ 𝑖,𝑗 −1, & 𝐵 ′ 𝑖,𝑗 =𝑣 𝑝𝑒𝑎𝑘 −1, 𝑝 𝑙 =1 Eq. 7 Fig 13

15 Continued The histograms of each block are inverted and stitched to form a stego image of size (512 × 512). 𝐵′′′ 𝑖,𝑗 =255−𝐵′′ 𝑖,𝑗 , 1≤𝑖≤𝑟𝑜𝑤𝑠;1≤𝑗≤𝑐𝑜𝑙𝑢𝑚𝑛𝑠 Eq. 8 Fig 14

16 Fig 15

17 Continued Fig 16 At the receiver:
The stego image (512 × 512) is split into four blocks, each of size (256 × 256). Fig 16

18 Continued Eq. 9 Fig 17 Invert the histogram of each block using eq. 9.
𝐶 𝑖,𝑗 =255−𝐵′′′ 𝑖,𝑗 , 1≤𝑖≤𝑟𝑜𝑤𝑠;1≤𝑗≤𝑐𝑜𝑙𝑢𝑚𝑛𝑠 Eq. 9 Fig 17

19 Continued The data is extracted from each block and shifted histogram is obtained using equation 𝐶 ′ (𝑖,𝑗)= 𝐶 𝑖,𝑗 −1, 𝐶 𝑖,𝑗 =𝑣 𝑝𝑒𝑎𝑘 +2, 𝑝 𝑙 =1 𝐶 𝑖,𝑗 +1, 𝐶 𝑖,𝑗 =𝑣 𝑝𝑒𝑎𝑘 −2, 𝑝 𝑙 =1 𝐶 𝑖,𝑗 , 𝐶 𝑖,𝑗 = 𝑣 𝑝𝑒𝑎𝑘 ±1 ,𝑝 𝑙 = Eq. 10 Fig 18

20 Continued The shifted blocks are re-shifted using equation 11. 𝐶′′ 𝑖,𝑗 = 𝐶′ 𝑖,𝑗 −1, 𝑣 𝑝𝑒𝑎𝑘 +3≤𝐶′(𝑖,𝑗)≤255 𝐶′ 𝑖,𝑗 +1, ≤𝐶′(𝑖,𝑗)≤ 𝑣 𝑝𝑒𝑎𝑘 −3 Eq. 11 Fig 19

21 Continued The histogram of each block is inverted using equation 12. 𝐶′′′ 𝑖,𝑗 =255−𝐶′′ 𝑖,𝑗 , 1≤𝑖≤𝑟𝑜𝑤𝑠;1≤𝑗≤𝑐𝑜𝑙𝑢𝑚𝑛𝑠 Eq. 12 Fig 20

22 Continued The inverted blocks are stitched together to get the original cover image. Fig 21

23 PSNR of stego image (in dB)
Results Block size PSNR of stego image (in dB) Max number of bits 256 x 256 8987 128 x 128 12675 32 x 32 24209 16 x 16 29579 8x8 33960 Table 1: Results for Lena image

24 PSNR of stego image (in dB)
Continued Block size PSNR of stego image (in dB) Max number of bits 256 x 256 5797 128 x 128 8322 32 x 32 17438 16 x 16 21798 8x8 24808 Table 2: Results for Barbara image

25 PSNR of stego image (in dB)
Continued Block size PSNR of stego image (in dB) Max number of bits 256 x 256 7160 128 x 128 9966 32 x 32 17385 16 x 16 21806 8x8 24237 Table 3: Results for Goldhill image

26 PSNR of stego image (in dB)
Continued Block size PSNR of stego image (in dB) Max number of bits 256 x 256 22754 128 x 128 27149 32 x 32 38959 16 x 16 44047 8x8 47568 Table 4: Results for Airplane image

27 PSNR of stego image (in dB)
Cont. Block size PSNR of stego image (in dB) Max number of bits 256 x 256 16409 128 x 128 21617 32 x 32 35272 16 x 16 40449 8x8 44490 Table 5: Results for Tiffany image

28 Conclusions & Future work
The objective of this research is to improve the security of the present data hiding algorithms. This is achieved using histogram inversion before embedding the data in the cover image. In the results section it is also clear that the PSNR of the image improves with decrease in block size. The only tradeoff is, when the block size decreases, there is significant increase in number of blocks to be processed. This leads to increase in the embedding time. This research is mainly based on algorithm proposed by Pan et al [26]. Future work can be, extending the present algorithm by using the stego image to embed data again. This is defined as multi-layer embedding.

29 Acronyms and Abbreviations
HS-RDH – Histogram shifting based RDH ICMP – Internet Control Message Protocol IWT – Integer Wavelet Transform JPEG – Joint Photographic Experts Group LSB – Least Significant Bit PSNR – Peak Signal to Noise Ratio  QIM – Quantization Index Modulation RDH - Reversible Data Hiding

30 References M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber: Reversible data hiding, Proceedings of IEEE International Conference on Image Processing, Rochester, NY, pp , 2002. I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” in IEEE Trans. on Image Processing, vol. 6. No. 12, pp , Dec C. C. Chang, J. Y. Hsiao, and C. S. Chan: Finding optimal LSB substitution in image hiding by dynamic programming strategy, Pattern Recognition, vol. 36, no. 7, pp , July J. Huang and Y. Q. Shi, "An adaptive image watermarking scheme based on visual masking," IEE Electronics Letters, vol. 34, no. 8, pp , April 1998. B. Chen, G. W. Wornell, “Quantization index modulation: a class of provably good methods for digital watermarking and information embedding,” IEEE Transactions on Information Theory, vol. 47, no. 4, pp , May 2001.

31 References C. W. Honsinger, P. Jones, M. Rabbani, and J. C. Stoffel, “Lossless recovery of an original image containing embedded data,” US Patent: 6,278,791, 2001. S. Katzenbeissar and F. Petitcolas, (Editors), “Information hiding techniques for steganography and digital watermarking,” Artech House, 1999. Liu, Shao-Hui, Tun-Hang Chen, Hong-Xun Yao, and Wen Gao. “A variable depth LSB data hiding technique in images”. Proceedings of IEEE International Conference on  Machine Learning and Cybernetics, vol. 7, pp , Aug., 2004. Z. M. Lu, J. S. Pan, and S. H. Sun, “VQ-based digital image watermarking method”, Electronics Letters, vol. 36, no. 14, pp , April, 2000. M. Goljan, J. Fridrich, and R. Du, “Distortion-free data embedding,” Proceedings of 4th Information Hiding Workshop, pp , Pittsburgh, PA, April 2001.

32 References C. I. Podilchuk and E. J Delp, “Digital watermarking: Algorithms and applications,” IEEE Signal Processing Magazine, pp. 33–46, July, 2001. G. Xuan et al, “Distortionless data hiding based on integer wavelet transform,” IEE Electronics Letters, pp , Dec 2002. H. C. Wu, N. I. Wu, C. S. Tsai and M. S. Hwang, "Image steganographic scheme based on pixel-value differencing and LSB replacement methods," IEE Proceedings - Vision, Image and Signal Processing, vol. 152, no. 5, pp , 7 Oct B. Yang et al, "Integer DCT Based Reversible Image Watermarking by Adaptive Coefficient Modification" in E. J. Delp, editor, Proceedings of Electronic Imaging, volume VII of Security and Watermarking of Multimedia Contents, SPIE vol. 7, pp , Jan, 2005. Jun Tian, "Reversible data embedding using a difference expansion," in IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp , Aug

33 References G. Xuan et al, “Lossless data hiding based on integer wavelet transform”, IEEE Workshop on Multimedia Signal Processing, 2002, pp , Dec., 2002. Y. C. Hu, “High capacity image hiding scheme based on vector quantization”, Pattern Recognition, vol. 39, no. 9, pp , Sep., 2006. G. Xuan, Y. Q. Shi, and Z. Ni, “Reversible data hiding using integer wavelet transform and companding technique,” Proc. IWDW04, Korea, October 2004. J. Fridrich, M. Goljan and R. Du, “Invertible authentication,” Proc. SPIE, Security and Watermarking of Multimedia Contents, pp , San Jose, CA, January 2001. M. Thodi and J. J. Rodríguez, “Reversible watermarking by prediction-error expansion,” Proceedings of 6th IEEE Southwest Symposium on Image Analysis and Interpretation, pp , Lake Tahoe, CA,USA, March , 2004.

34 References C. De Vleeschouwer, J. F. Delaigle and B. Macq, “Circular interpretation of bijective transformations in lossless watermarking for media asset management,” IEEE Trans. Multimedia, vol. 5, pp , March W. Bender, D. Gruhl, N. Mprimoto and A. Lu, “Techniques for data hiding,” IBM Systems Journal, vol. 35, Nos. 3&4, pp , 1996. Z. Ni et al, “Robust lossless data hiding,” IEEE International Conference and Expo, Taipei, Taiwan, June D. Zou, Y. Q. Shi and Z. Ni, "A semi-fragile lossless digital watermarking scheme based on integer wavelet transform,"  IEEE 6th Workshop on Multimedia Signal Processing, pp , Oct., 2004. Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354–362, Mar 2006.

35 References Z. Pan, S. Hu, X. Ma, and L. Wang, “Reversible data hiding based on local histogram shifting with multilayer embedding,” Journal of Visual Communication and Image Representation, vol. 31, pp. 64–74, Aug., [Online]. Available: G. Xuan et al., "High capacity lossless data hiding based on integer wavelet transform," Circuits and Systems, ISCAS '04. Proceedings of the 2004 International Symposium on, Vol.2, pp. II-29-32, May, 2004. Z. Zhang et al, "A unified authentication framework for JPEG2000," IEEE International Conference on Multimedia and Expo, Vol. 2, pp , Taipei, June, 2004. N. Ramaswamy, “Digital signature in H.264/AVC MPEG4 Part 10,” M.S. Thesis, Dept. of Electrical Engineering, University of Texas at Arlington, Aug 2004. S. Puthussery, “A progressive secret reveal system for color images,” M.S. Thesis, Dept. of Electrical Engineering, University of Texas at Arlington, Aug 2004.

36 References M. T. Sandford II, J. N. Bradley, and T. G. Handel, “Data embedding method,”Proc. SPIE 2615, Integration Issues in Large Commercial Media Delivery Systems, pp. 226–259, Jan, 1996. C. A. Allen and J. L. Davidson, “Steganography using the minimax eigenvalue decomposition,” Proc. SPIE 3456, Mathematics of Data/Image Coding, Compression, and Encryption, pp. 13–24, Nov., 1998. S. Takano, K. Tanaka, and T. Sugimura, “Steganograpic image transformation,” Proc. SPIE 3657, Security and Watermarking of Multimedia Contents, pp. 365–374, April, 1999. L.-C. Huang, L.-Y. Tseng, and M.-S. Hwang, “A reversible data hiding method by histogram shifting in high quality medical images,” Journal of Systems and Software, vol. 86, no. 3, pp. 716–727, March, 2013. H. J. Hwang, “Reversible Watermarking Method Using Optimal Histogram Pair Shifting Based on Prediction and Sorting,” KSII Transactions on Internet and Information Systems, vol. 4, no. 4, pp. 655–670, Aug, 2010.

37 References J. Gupta, P. Gupta, and S. C. Gupta, “Reversible data hiding technique using histogram shifting,”2nd International Conference on Computing for Sustainable Global Development, pp. 2114–2119, March M. Fujiyoshi, “A Histogram Shifting-Based Blind Reversible Data Hiding Method With a Histogram Peak Estimator,” 2012 International Symposium on Communications and Information Technologies (ISCIT), vol. 1, pp. 313–318, Oct., 2012. F. Shih, “Digital watermarking and steganography: Fundamentals and Techniques,” CRC Press, 2008. Notes on Steganography, Available: steganography.html S. Jajodia, N. F. Johnson, and Z. Duric, “Information hiding: Steganography and Watermarking- attacks and Countermeasures,” Springer US, 2001.

38 Thank You!


Download ppt "Reversible Data Hiding using Histogram Shifting"

Similar presentations


Ads by Google