Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 資訊隱藏技術之研究 The Study of Information Hiding Mechanisms 指導教授: Chang, Chin-Chen ( 張真誠 ) 研究生: Lu, Tzu-Chuen ( 呂慈純 ) Department of Computer Science and Information.

Similar presentations


Presentation on theme: "1 資訊隱藏技術之研究 The Study of Information Hiding Mechanisms 指導教授: Chang, Chin-Chen ( 張真誠 ) 研究生: Lu, Tzu-Chuen ( 呂慈純 ) Department of Computer Science and Information."— Presentation transcript:

1 1 資訊隱藏技術之研究 The Study of Information Hiding Mechanisms 指導教授: Chang, Chin-Chen ( 張真誠 ) 研究生: Lu, Tzu-Chuen ( 呂慈純 ) Department of Computer Science and Information Engineering, National Chung Cheng University

2 2 Information Hiding Sender Receiver Internet illegal Information

3 3 Information Hiding Sender Receiver Internet illegal Information Information

4 4 Information Hiding - LSB Information 00000101000010100000101100001100 00010100000111110010100000110011 00011011000010100001000100101101 00100101010101010000111100100010 34158537 45171027 51403120 1211105 Image 1 1 0 1 0 1 1 1 10 1 0 11 0 1 5111013 20314151 27101744 37851435 Least Significant Bit (LSB) Stego Image

5 5 Information Hiding - LSB 34158537 45171027 51403120 1211105 Image 35148537 44171027 51413120 1310115 Stego-Image MSE ==0.4375 PSNR ( Peak Signal to Noise Ratio) = =51.72 Payload = 1 (bit per pixel, bpp)

6 6 Information Hiding - LSB 00000101000010110000100000001111 00010110000111010010100100110001 00011001000010100001001100101110 00100101010101110000110000100001 PSNR = 43.27 Payload = 2 bpp Trade-off: Image quality and Payload Robustness

7 7 Pixel Domain –Quantization-based Information Hiding Scheme –A Difference Expansion Oriented Data Hiding Scheme

8 8 Pixel Domain Quantization-based Information Hiding Scheme

9 9 Quantization-based Information Hiding Scheme 34158537 45171027 51403120 1211105 Image Information 35158538 45171027 51403220 12 106 Modified Image 612

10 10 35158538 45171027 51403220 12 106 Modified Image 0 255 8162432248240 12332314 10 10 10 6 081624 101 11

11 35158538 45171027 51403220 12 1011 Modified Image 0 255 8162432248240 12332314 10 10 10 10 081624 101 13

12 12 Quantization-based Information Hiding Scheme - Extraction Process 37198643 50201333 53444026 14 1311 Stego Image 0 255 8162432248240 12332314 10 10 10 0000000110110111 PSNR = 34.91 Payload = 1 bpp

13 13 37198643 50201333 53444026 14 1311 Stego Image 6 0 255 81624 48 248 56 1233231 4 10 10 10 1 7 10 51

14 14 35158538 45171027 51403220 12 106 Repaired Image 37198643 50201333 53444026 14 1311 Stego Image PSNR = 34.91 Payload = 1 bpp PSNR = 53.18 Payload = 1 bpp Quantization-based Information Hiding Scheme -Repairing Process

15 15 37198643 50201333 53444026 14 1311 Stego Image Quantization-based Information Hiding Scheme -Robustness 37228643 50181333 53444029 1014139 Stego Image 0 255 8162432248 240 12332314 10 10 10

16 16 Experimental Results Modified Images Stego Images

17 17 Experimental Results PSNRLenaPeppersAirplaneBaboon 8 Modified Image51.1451.1351.1451.15 Stego Image34.7934.8034.8634.81 Repaired Image51.1451.1351.1451.15 4 Modified Image51.1551.1351.1451.12 Stego Image40.7140.7240.7440.73 Repaired Image51.1551.1351.1451.12 Payload: 1 bpp

18 18 Pixel Domain A Difference Expansion Oriented Data Hiding Scheme

19 19 A Difference Expansion Oriented Data Hiding Scheme Hiding Process 00 A u0u0 u1u1 u2u2

20 20 Hiding Process h =1 Image 3245 32019 0000 4314 0 2 4 h=1 8

21 21 Hiding Process Image 3248 32019 0000 4314 0 1 Expandable h =1

22 22 Hiding Process Image 3248 12019 0000 4314 0 A Non-Expandable h =1

23 23 Hiding Process Image 3248 12019 0000 4314 0 A Changeable 1 h =1

24 24 Hiding Process Image 3248 11019 0000 4314 Expandable h =1 d > Threshold = 10 Changeable 19

25 25 Hiding Process Image 3248 11019 0000 4314 0 A Non-Changeable h =1

26 26 A Difference Expansion Oriented Data Hiding Scheme Image 3248 22019 0000 4314 3248 110 0000 9206 0001 1000 0000 1111 Location Map PSNR: 44.99 Payload: 0.56 bpp

27 27 32483245 0 Extraction Process for Expandable 3248 11019 0000 9206

28 28 Extraction Scheme for Expandable 24 8 1 2483 0 3248 11019 0000 9206

29 29 48114812 Extraction Process for Changeable 0 3248 11019 0000 9206

30 30 00000000 Extraction Process for non-Changeable 3248 11019 0000 9206

31 31 A Difference Expansion Oriented Data Hiding Scheme Image 3248 22019 0000 4314 3248 110 0000 9206 0001 1000 0000 1111 Location Map PSNR: 44.99 Payload: 0.56 bpp 0100101

32 32 Experimental Results

33 33 Experimental Results

34 34 Experimental Results Image namePayload (bpp)PSNR (dB) Barbara0.65133.840 Baboon0.53932.642 Boats0.78734.575 Gold Hill0.79432.939 F140.73733.889 F160.85035.818 Lena0.85734.794 Pepper0.88035.277 Sailboat0.77633.294 Tiffany0.88035.355 Toys0.84635.362 Zelda0.92136.343

35 35 Experimental Results

36 36 Sender Receiver Internet Compressed codes: 1011101111….. Information ?

37 37 Sender Receiver Internet Compressed codes: 1011101111….. Information Information

38 38 Index Domain –Reversible Hiding Scheme based on Switching Tree Coding –Reversible Hiding Scheme based on Side-Match VQ

39 39 Index Domain Reversible Hiding Scheme based on Switching Tree Coding

40 40 Vector Quantization (VQ) Original Image Index table VQ Encoder 77 910

41 41 Vector Quantization (VQ) Reconstructed Image Index table VQ Decoder

42 42 Switching-Tree Coding (STC) Sheu proposed the STC algorithm in 1999 Re-encode the index table the current index U L Index Table

43 43 If A = 7, then A = U  A ’ = 11 Switching-Tree Coding (STC) If A = 10, then A = L  A ’ = 10

44 44 If A = 14  A ’ =01 + ‘ 00011 ’ Switching-Tree Coding (STC) If A = 17  A ’ =00 + ‘ 00010001 ’

45 Information : 0 1 0 0 1 1 0 0 0 1 1 0 1 0 … A ’ = 00+(10)00+(25)00+(21) … 00+(17) Information Hiding on STC Codes (IHSTC) Index table

46 46 Information : 0 1 0 0 1 1 0 0 0 1 1 0 1 0 … A ’ = 00+(10)00+(25)00+(21) … 00+(17) ‘ 10 ’ 0 Information Hiding on STC Codes (IHSTC)

47 47 Information : 0 1 0 0 1 1 0 0 0 1 1 0 1 0 … A ’ = 00+(10)00+(25)00+(21) … 00+(17) ‘ 10 ’ 10+00+(128) … Information Hiding on STC Codes (IHSTC) 1

48 48 A ’ = 00+(10)00+(25)00+(21) … 00+(17) 10 00+(128) … 10 Extraction and Reconstruction 1025211001017 Information: 0

49 49 A ’ = 00+(10)00+(25)00+(21) … 00+(17) 10+ 00+(128) … 10 Extraction and Reconstruction 1025211001017 128 66237100 Information: 0 1 100

50 50 Experiment Results ImagePSNRNSTC Compression Ratio Payload (bpp) Lena29.8711,1290.390.04 Pepper29.4910,5680.400.04 Baboon23.0794,7710.550.02 Airplane28.5811,4700.350.04

51 51 Pixel Domain Reversible Hiding Scheme based on Side-Match VQ

52 52 Vector Quantization (VQ) Original Image Index table VQ Encoder 77 910

53 53 Side-Match VQ (SMVQ) Seed Block Residual Block

54 54 X = (81, 15, 53, 34, 51,?, ?, ?, 91, ?, ?, ?, 49,?, ?, ?) Codebook

55 55 No.CodewordSED 0 81643286086661927885740191810672.76 1 784214635466543927546898407028485.36 2 96269212941168 24807479 495698.65 3 99782814775824602987247735733848100.17 4 56206172633775122335918319949100.50 5 548849261725191651525090155334120.83 6 1163919045023625853348553599412122.87 7 28806952192579889673353761736125.53 State Codebook 000

56 56 Reversible Hiding Scheme based on Side-Match VQ

57 57 No.CodewordSED 0 81643286086661927885740191810672.76 1 784214635466543927546898407028485.36 2 96269212941168 24807479 495698.65 3 99782814775824602987247735733848100.17 4 56206172633775122335918319949100.50 5 548849261725191651525090155334120.83 6 1163919045023625853348553599412122.87 7 28806952192579889673353761736125.53 State Codebook 000 Message Type = 0 SC 0 SC 1 Message Type = 1 h = 0 Reversible Hiding Scheme based on Side-Match VQ

58 58 No.CodewordSED 0 81643286086661927885740191810672.76 1 784214635466543927546898407028485.36 2 96269212941168 24807479 495698.65 3 99782814775824602987247735733848100.17 4 56206172633775122335918319949100.50 5 548849261725191651525090155334120.83 6 1163919045023625853348553599412122.87 7 28806952192579889673353761736125.53 State Codebook 100 Message Type = 0 SC 0 SC 1 Message Type = 1 h = 1 Reversible Hiding Scheme based on Side-Match VQ

59 59 X = (81, 15, 53, 34, 51,?, ?, ?, 91, ?, ?, ?, 49,?, ?, ?) Extraction phase 100 No.CodewordSED 0 81643286086661927885740191810672.76 1 784214635466543927546898407028485.36 2 96269212941168 24807479 495698.65 3 99782814775824602987247735733848100.17 4 56206172633775122335918319949100.50 5 548849261725191651525090155334120.83 6 1163919045023625853348553599412122.87 7 28806952192579889673353761736125.53 h = 1

60 60 Extraction phase

61 61 File nameNCPSNRPayloadCompression Ratio Boats 25623.1714,0630.35 51224.3314,1860.35 102424.9414,2240.36 Jet(F16) 25623.4814,2900.34 51225.0214,4210.35 102425.3614,3710.36 Lena 25624.0514,7030.34 51225.1214,7370.34 102425.7214,7130.35 Pepper 25623.4414,5280.34 51224.7414,5910.35 102425.2114,6520.35 Experimental Results

62 62 Experimental Results

63 63Conclusions Information Hiding Pixel-domain Hiding Schemes –Quantization-based Hiding Scheme –Difference Expansion Oriented Data Hiding Scheme Index-domain Hiding Schemes – Reversible Hiding Scheme based on STC – Reversible Hiding Scheme based on SMVQ

64 64 Future Works Information Hiding Applications –Watermarking Reversible Information Hiding –Audio, Video, HTML, Text, DNA Sequence Other Compression Methods –JPEG, Wavelet, MPEG

65 65 Thanks for your attention


Download ppt "1 資訊隱藏技術之研究 The Study of Information Hiding Mechanisms 指導教授: Chang, Chin-Chen ( 張真誠 ) 研究生: Lu, Tzu-Chuen ( 呂慈純 ) Department of Computer Science and Information."

Similar presentations


Ads by Google