基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University

Slides:



Advertisements
Similar presentations
1 影像偽裝術的最新發展 張真誠 逢甲大學 講座教授 中正大學 榮譽教授 清華大學 合聘教授 Watermarking 2. Image authentication 3. Secret sharing 4. Visual cryptography 5. Steganography.
Advertisements

Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
1 視覺密碼學 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University ( 清華大學 ) National Chung Cheng University ( 中正大學 ) Feng Chia University (
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Data hiding in Least Significant Bit (LSB) Speaker: Feng Jen-Bang ( 馮振邦 )
1 資訊隱藏技術之研究 The Study of Information Hiding Mechanisms 指導教授: Chang, Chin-Chen ( 張真誠 ) 研究生: Lu, Tzu-Chuen ( 呂慈純 ) Department of Computer Science and Information.
Digital Watermarking and Its Applications
Advisor: Chang, Chin-Chen Student: Chen, Chang-Chu
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
基於龜殼魔術矩陣的隱寫技術及其衍生的研究問題
影像偽裝術 Dr. Chin-Chen Chang
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Information Hiding Technology: Current Research and Future Trend
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
The Recent Developments in Visual Cryptography
Reversible Data Hiding in JPEG Images using Ordered Embedding
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Recent Developments on Multimedia and Secure Networking Technologies
Information Steganography Using Magic Matrix
Chair Professor Chin-Chen Chang Feng Chia University
Chair Professor Chin-Chen Chang Feng Chia University
Chair Professor Chin-Chen Chang Feng Chia University
A Data Hiding Scheme Based Upon Block Truncation Coding
The Recent Developments in Visual Secret Sharing
Hiding Data in a Color Palette Image with Hybrid Strategies
A Study of Digital Image Coding and Retrieving Techniques
Embedding Secrets Using Magic Matrices
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
A Restricted Region-based Data-hiding Scheme
Some Novel Steganographic Methods for Digital Images
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding Scheme Using Two Steganographic Images
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Information Steganography Using Magic Matrix
A Data Hiding Method for Text Documents Using Multiple-Base Encoding
Dynamic embedding strategy of VQ-based information hiding approach
Chair Professor Chin-Chen Chang Feng Chia University
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Hiding Information in VQ Index Tables with Reversibility
Information Hiding and Its Applications
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Chair Professor Chin-Chen Chang Feng Chia University
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
Chair Professor Chin-Chen Chang Feng Chia University
Recent Developments on Multimedia and Secure Networking Technologies
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Data hiding method using image interpolation
Chair Professor Chin-Chen Chang Feng Chia University
Partial reversible data hiding scheme using (7, 4) hamming code
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
De-clustering and Its Application to Steganography
A Data Hiding Scheme Based Upon Block Truncation Coding
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Information Hiding Techniques Using Magic Matrix
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Recent Developments in Information Hiding
My Research Projects Chair Professor Chin-Chen Chang (張真誠)
Steganographic Systems for Secret Messages
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University

2 Introduction Information Hiding Cover image Hiding system Secret message Stego image

3 Introduction (Cont.) Cover Carriers Image Video Sound Text

4 Data: SenderReceiver 1 1 ?.... Data: Corrected data:

5 (7, 4) Hamming Coding Encoding Data: p 1 p 2 d 1 p 3 d 2 d 3 d d 1  d 2  d 4 = p 1 1  1  1 = 1 d 1  d 3  d 4 = p 2 1  0  1 = 0 d 2  d 3  d 4 = p 3 1  0  1 = 0 d1 d2 d3 d4d1 d2 d3 d4 Encoded data Encoding p 1 p 2 d 1 p 3 d 2 d 3 d 4

6 (7, 4) Hamming Coding (Cont.) Error Detection Received data: Error Position Corrected data: Correcting Parity check matrix H Error bit

(7, 4) Hamming Coding (Cont.)  The (7,4) Hamming code can be applied to data hiding based on the pixel domain and AMBTC domain. 7

Matrix Coding Method 8 Example: [7,4] Hamming code, the parity check matrix H is : Embedding process: Cover vector Extraction process: Stego vector y = Change one bit in x according to coset leader associated to syndrome = Change one bit in x according to coset leader associated to = Change one bit in according to coset leader associated to = [ ]

9 Matrix Coding Method – based on the pixel domain Cover Image Parity check matrix H ( ) T = (1 1 1) T Secret data: …  Stego Image Embedding

10 Matrix Coding Method (Cont.) – based on the pixel domain ( ) T = (1 1 0) T Extracted secret data: … Stego Image Extracting ■ 7 pixels embed 3 bits

Matrix Coding Method – based on the AMBTC algorithm

Matrix Coding Method – based on the AMBTC algorithm AMBTC algorithm (Absolute moment block truncation coding) Reconstructed block 0/1 bitmap Original block Average=100 High mean value = 160 Low mean value = 64

The flowchart of the proposed scheme – embedding phase 13

An example of the proposed scheme – embedding phase 14

An example of the proposed scheme – embedding phase 15  Phase 1  Embed secret into the bitmaps

An example of the proposed scheme – embedding phase 16  Phase 2  Embed secret into (H, L) Final Result

An example of the proposed scheme – extraction phase 17  Phase 1  Extract secret from bitmaps

An example of the proposed scheme – extraction phase 18  Phase 2  Extract secret from quantization pairs

Experimental results 19 Test images

Experimental results SchemeCriteriaLenaZeldaElainJetBoatGoldhillAverage AMBTCPSNR (dB) Proposed scheme PSNR (dB) HC (bits)169, ,479168,388170,103172,771170,245 Chang et al.’s scheme [1] PSNR (dB) HC (bits)114,688 Chuang and Chang’s scheme [2] PSNR (dB) HC (bits)13,05113,16913,24812,63711,98912,48612, [1] C.C. Chang, Y.J. Liu, and S.T. Nguyen, “Hiding Secret Information in Block Truncation Code Using Dynamic Programming Strategy,” In Proceedings of 6th International Graphic and Image Processing, vol. 9443, Beijing, China, [2] J.C. Chuang and C.C. Chang, “Using a simple and fast image compression algorithm to hide secret information,” International Journal of Computers & Applications, vol. 28, no. 4, pp , 2006.

21 Conclusions Based on the property of Hamming code, the embedding and the extracting are very simple. The proposed steganographic scheme achieves much higher payload with a slightly lower visual quality of stego images compared with the related works.