Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 影像偽裝術的最新發展 張真誠 逢甲大學 講座教授 中正大學 榮譽教授 清華大學 合聘教授. 2 1. Watermarking 2. Image authentication 3. Secret sharing 4. Visual cryptography 5. Steganography.

Similar presentations


Presentation on theme: "1 影像偽裝術的最新發展 張真誠 逢甲大學 講座教授 中正大學 榮譽教授 清華大學 合聘教授. 2 1. Watermarking 2. Image authentication 3. Secret sharing 4. Visual cryptography 5. Steganography."— Presentation transcript:

1 1 影像偽裝術的最新發展 張真誠 逢甲大學 講座教授 中正大學 榮譽教授 清華大學 合聘教授

2 2 1. Watermarking 2. Image authentication 3. Secret sharing 4. Visual cryptography 5. Steganography

3 3 Watermarking Visible watermarking Easy to embed Clear to see watermark

4 4 Watermarking (Cont.) Invisible watermarking Requirements: Good visual quality of watermarked image Robustness Watermarking Watermarked imageOriginal image Watermark

5 5 Image authentication Requirements: Detect the tampered area Try to restore the tampered area Image Tampered imageDetected imageRestored image

6 6 Secret sharing Classification: Meaningless shadows Meaningful shadows

7 7 Secret sharing (Cont.) Shadow size: 256  256 Image size: 512  512 Sharing Reconstructing PSNR=24 dB (2,4)-threshold secret sharing scheme

8 8 Secret sharing (Cont.) Secret image Stego-image Hiding Reconstructed secret image Reconstructing (2, n)-threshold secret sharing scheme Stego-image

9 9 Visual cryptography Shadow 1Shadow 2 Secret Stacking

10 10 Visual cryptography (Cont.) Shadow 1Shadow 2 Secret Stacking

11 11 Visual cryptography (Cont.) Share 1 Share 2 Secret 1 “ VISUAL ” Secret 2 “ SECRET ” Stacking Rotating 40 o

12 12 Steganography The targets Frequency domain (e.g. DCT, DWT, DFT) Spatial domain (e.g. pixel values) Compression domain (e.g. VQ) Text Restoration Irreversible Reversible

13 13 Steganography (Cont.) Cover image Hiding system Secret message Stego image 1 0 1 0 1 0 0 1 0 1 1 1 1 0 0 Image

14 14 Steganography (Cont.) Text 壞的毛病 壞毛病 山東的蘋果 山東蘋果 我的媽媽 我媽媽 主要的問題 主要問題 另外的一件事 另外一件事 其他的問題 其他問題 北京的大學 北京大學 Video Sound

15 15 Zhang and Wang ’ s Method (Embedding) 8794 79545511 20211224 1210 9 01234 0 1 2 3 4 5 6 7 0123456789 11 8 9 10 11 255 0123401 … 2340123401 40123401234 : 0 23 123401234012 340123401234 012340123401 2340123401 401234012340 23 123401234012 340123401234 012340123401 234012340123 012340123401 0 2 4 1 3 0 2 4 1 3 0 2 … … … … … … … … … … … … :::::::::::: Magic Matrix Cover image 1000 2 1 3 5 Secret data: 1000 1011… 77104 Stego image p1p1 p2p2

16 16 Zhang and Wang ’ s Method (Extracting) 01234 0 1 2 3 4 5 6 7 01234567891011 8 9 10 11 255 0123401 … 2340123401 40123401234 : 0 23 123401234012 340123401234 012340123401 2340123401 401234012340 23 123401234012 340123401234 012340123401 234012340123 012340123401 0 2 4 1 3 0 2 4 1 3 0 2 … … … … … … … … … … … … :::::::::::: Magic Matrix 77104 Stego image 1 351 35 Extracted secret data: 1000 2 p1p1 p2p2

17 17 Sudoku A logic-based number placement puzzle

18 18 Sudoku (Cont.) Property Possible solutions: 6,670,903,752,021,072,936,960 (i.e. ≈ 6.671×10 21 ) A Sudoku grid contains nine 3 × 3 matrices, each contains different digits from 1 to 9. Each row and each column of a Sudoku grid also contain different digits from 1 to 9.

19 19 Data Hiding Using Sudoku - 1 Reference Matrix M

20 20 Data Hiding Using Sudoku (Embedding) (Cont.) 871112 79545511 20211224 1210 9 97 Cover Image Stego Image Secret data: 011 001 10… 279279 d(, ) = ((8-8) 2 +(4-7) 2 ) 1/2 =3 d(, ) = ((9-8) 2 +(7-7) 2 ) 1/2 =1 d(, ) = ((6-8) 2 +(8-7) 2 ) 1/2 =2.24 min.

21 21 Data Hiding Using Sudoku (Embedding) (Cont.) 871112 79545511 20211224 1210 9 97914 Cover Image Stego Image d(, ) = ((11-11) 2 +(15-12) 2 ) 1/2 =3 d(, ) = ((15-11) 2 +(12-12) 2 ) 1/2 =4 d(, ) = ((9-11) 2 +(14-12) 2 ) 1/2 =2.83 min. 279279 Secret data: 011 001 10…

22 22 Data Hiding Using Sudoku (Extracting) (Cont.) 97914 Stego Image Extracted data: 27 9 = 011 001 2

23 23 Experimental Results

24 24 Experimental Results (Cont.) The results of visual quality and Embedding capacity comparisons Images Proposed PSNRC Baboon Barbara Boats Goldhill Jet(F16) Lena Pepper Sailboat Tiffany 44.68 44.77 44.94 44.84 45.02 44.97 44.67 45.02 1.5 Average44.881.5


Download ppt "1 影像偽裝術的最新發展 張真誠 逢甲大學 講座教授 中正大學 榮譽教授 清華大學 合聘教授. 2 1. Watermarking 2. Image authentication 3. Secret sharing 4. Visual cryptography 5. Steganography."

Similar presentations


Ads by Google