Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 影像偽裝術的最新發展 張真誠 逢甲大學 講座教授 中正大學 榮譽教授 清華大學 合聘教授. 2 1. Watermarking 2. Image authentication 3. Secret sharing 4. Visual cryptography 5. Steganography.

Similar presentations


Presentation on theme: "1 影像偽裝術的最新發展 張真誠 逢甲大學 講座教授 中正大學 榮譽教授 清華大學 合聘教授. 2 1. Watermarking 2. Image authentication 3. Secret sharing 4. Visual cryptography 5. Steganography."— Presentation transcript:

1 1 影像偽裝術的最新發展 張真誠 逢甲大學 講座教授 中正大學 榮譽教授 清華大學 合聘教授

2 2 1. Watermarking 2. Image authentication 3. Secret sharing 4. Visual cryptography 5. Steganography

3 3 Watermarking Visible watermarking Easy to embed Clear to see watermark

4 4 Watermarking (Cont.) Invisible watermarking Requirements: Good visual quality of watermarked image Robustness Watermarking Watermarked imageOriginal image Watermark

5 5 Image authentication Requirements: Detect the tampered area Try to restore the tampered area Image Tampered imageDetected imageRestored image

6 6 Secret sharing Classification: Meaningless shadows Meaningful shadows

7 7 Secret sharing (Cont.) Shadow size: 256  256 Image size: 512  512 Sharing Reconstructing PSNR=24 dB (2,4)-threshold secret sharing scheme

8 8 Secret sharing (Cont.) Secret image Stego-image Hiding Reconstructed secret image Reconstructing (2, n)-threshold secret sharing scheme Stego-image

9 9 Visual cryptography Shadow 1Shadow 2 Secret Stacking

10 10 Visual cryptography (Cont.) Shadow 1Shadow 2 Secret Stacking

11 11 Visual cryptography (Cont.) Share 1 Share 2 Secret 1 “ VISUAL ” Secret 2 “ SECRET ” Stacking Rotating 40 o

12 12 Steganography The targets Frequency domain (e.g. DCT, DWT, DFT) Spatial domain (e.g. pixel values) Compression domain (e.g. VQ) Text Restoration Irreversible Reversible

13 13 Steganography (Cont.) Cover image Hiding system Secret message Stego image Image

14 14 Steganography (Cont.) Text 壞的毛病 壞毛病 山東的蘋果 山東蘋果 我的媽媽 我媽媽 主要的問題 主要問題 另外的一件事 另外一件事 其他的問題 其他問題 北京的大學 北京大學 Video Sound

15 15 Zhang and Wang ’ s Method (Embedding) … : … … … … … … … … … … … … :::::::::::: Magic Matrix Cover image Secret data: … Stego image p1p1 p2p2

16 16 Zhang and Wang ’ s Method (Extracting) … : … … … … … … … … … … … … :::::::::::: Magic Matrix Stego image Extracted secret data: p1p1 p2p2

17 17 Sudoku A logic-based number placement puzzle

18 18 Sudoku (Cont.) Property Possible solutions: 6,670,903,752,021,072,936,960 (i.e. ≈ 6.671×10 21 ) A Sudoku grid contains nine 3 × 3 matrices, each contains different digits from 1 to 9. Each row and each column of a Sudoku grid also contain different digits from 1 to 9.

19 19 Data Hiding Using Sudoku - 1 Reference Matrix M

20 20 Data Hiding Using Sudoku (Embedding) (Cont.) Cover Image Stego Image Secret data: … d(, ) = ((8-8) 2 +(4-7) 2 ) 1/2 =3 d(, ) = ((9-8) 2 +(7-7) 2 ) 1/2 =1 d(, ) = ((6-8) 2 +(8-7) 2 ) 1/2 =2.24 min.

21 21 Data Hiding Using Sudoku (Embedding) (Cont.) Cover Image Stego Image d(, ) = ((11-11) 2 +(15-12) 2 ) 1/2 =3 d(, ) = ((15-11) 2 +(12-12) 2 ) 1/2 =4 d(, ) = ((9-11) 2 +(14-12) 2 ) 1/2 =2.83 min Secret data: …

22 22 Data Hiding Using Sudoku (Extracting) (Cont.) Stego Image Extracted data: 27 9 =

23 23 Experimental Results

24 24 Experimental Results (Cont.) The results of visual quality and Embedding capacity comparisons Images Proposed PSNRC Baboon Barbara Boats Goldhill Jet(F16) Lena Pepper Sailboat Tiffany Average


Download ppt "1 影像偽裝術的最新發展 張真誠 逢甲大學 講座教授 中正大學 榮譽教授 清華大學 合聘教授. 2 1. Watermarking 2. Image authentication 3. Secret sharing 4. Visual cryptography 5. Steganography."

Similar presentations


Ads by Google