Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008

Slides:



Advertisements
Similar presentations
CHEN XIAOYU HUANG. Introduction of Steganography A group of data hiding technique,which hides data in undetectable way. Features extracted from modified.
Advertisements

A Secret Information Hiding Scheme Based on Switching Tree Coding Speaker: Chin-Chen Chang.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Computer Architecture Error Correcting Codes Ralph Grishman Oct (Text pp and B-65-67) NYU.
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
Digital Watermarking and Its Applications
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
基於龜殼魔術矩陣的隱寫技術及其衍生的研究問題
影像偽裝術 Dr. Chin-Chen Chang
Information Hiding Technology: Current Research and Future Trend
A Secret Information Hiding Scheme Based on Switching Tree Coding
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
A New Image Compression Scheme Based on Locally Adaptive Coding
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Recent Developments on Multimedia and Secure Networking Technologies
Information Steganography Using Magic Matrix
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Chair Professor Chin-Chen Chang Feng Chia University
Chair Professor Chin-Chen Chang Feng Chia University
Chair Professor Chin-Chen Chang Feng Chia University
A Data Hiding Scheme Based Upon Block Truncation Coding
第七章 資訊隱藏 張真誠 國立中正大學資訊工程研究所.
Hiding Data in a Color Palette Image with Hybrid Strategies
A Study of Digital Image Coding and Retrieving Techniques
Embedding Secrets Using Magic Matrices
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
A Restricted Region-based Data-hiding Scheme
Some Novel Steganographic Methods for Digital Images
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding Scheme Using Two Steganographic Images
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Information Steganography Using Magic Matrix
Data hiding based Hamming code
A Data Hiding Method for Text Documents Using Multiple-Base Encoding
Chair Professor Chin-Chen Chang Feng Chia University
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Hiding Information in VQ Index Tables with Reversibility
Information Hiding and Its Applications
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
Chair Professor Chin-Chen Chang Feng Chia University
Recent Developments on Multimedia and Secure Networking Technologies
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Data hiding method using image interpolation
A Virtual Image Cryptosystem Based upon Vector Quantization
Chair Professor Chin-Chen Chang Feng Chia University
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
Partial reversible data hiding scheme using (7, 4) hamming code
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection Source: Multimedia.
De-clustering and Its Application to Steganography
A Data Hiding Scheme Based Upon Block Truncation Coding
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Predictive Grayscale Image Coding Scheme Using VQ and BTC
資訊偽裝術 張真誠 講座教授 多媒體暨網路安全實驗室
Information Hiding Techniques Using Magic Matrix
Recent Developments in Information Hiding
Steganographic Systems for Secret Messages
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
A New Image Compression Scheme Based on Locally Adaptive Coding
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008 Using Nearest Covering Codes to Embed Secret Information in Grayscale Images Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008

Data Hiding Hiding system Stego image Cover image 1 0 1 0 1 0 0 1 0 1 1 1 1 0 0 Secret message

Cover Carriers Image Video Sound Text

VQ Encoding Index table Original Image Codebook … (120,155,…,80) 1 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 (90,135,…,120) (100,125,…,150) … Index table Original Image (49,117,…,25) (50,42,…,98) (20,65,…,110) Codebook

Previous Work of Steganography on VQ To find the closest pairs

d(CW0, CW8) > TH d(CW13, CW14) > TH Unused CW0, CW8, CW13, CW14

Encode Index Table CW0, CW8, CW13, CW14 Unused Index Table Original Image Index Table Unused CW0, CW8, CW13, CW14

A secret message: 1 0 1 0 1 0 0 1 0 1 1 1 1 0 0 1 1 1 1 1 1 1 1 Index Table Secret bits CW1, CW2, CW4, CW5 CW6, CW7 CW11, CW3 CW15, CW10 CW12, CW9 1

A secret message: 1 0 1 0 1 0 0 1 0 1 1 1 1 0 0 1 1 1 1 1 1 1 1 Index Table Secret bits CW1, CW2, CW4, CW5 CW6, CW7 CW11, CW3 CW15, CW10 CW12, CW9 1

A secret message: 1 0 1 0 1 0 0 1 0 1 1 1 1 0 0 1 1 1 1 1 1 1 1 Index Table Secret bits

(7, 4) Hamming Coding Encoding Data: 1 1 0 12 d1 d2 d3 d4 Data: 1 1 0 12 Rule: d1  d2  d4  p1 = 0 1  1  1  p1 = 0  p1 = 1 1 0 1 0 1 0 1 Rule: d1  d3  d4  p2 = 0 1  0  1  p2 = 0  p2 = 0 p1 p2 d1 p3 d2 d3 d4 Encoded data Rule: d2  d3  d4  p3 = 0 1  0  1  p3 = 0  p3 = 0

(7, 4) Hamming Coding (Cont.) Corrected data: 1 0 1 0 1 0 1 Error Detection p1 p2 d1 p3 d2 d3 d4 Correcting Parity check matrix H: Received data: 1 0 1 0 1 1 1 b1 b2 b3 b4 b5 b6 b7 Error bit

Inspiration from Hamming Coding (0000000)T = (000)T  010 (0000001)T = (111)T  710 SECRET (0000010)T = (110)T  610 (0000011)T = (001)T  110 : : : (1011100)T = (011)T  310 H : (1111101)T = (110)T  610 (1111110)T = (111)T  710 (1111111)T = (000)T  010

The Proposed Method Pre-process (0000000) : (1111111) C0 (0000011) (0000001)T = 710 C1 : : (0000010)T = 610 (1011100) C3 (0000011)T = 110 : : : : : (1011100)T = 310 (0000010) H : : C6 (1111101) (1111101)T = 610 : (1111110)T = 710 (0000001) (1111111)T = 010 : C7 (1111110)

The Proposed Method (Cont.) Embedding 7 10 9 6 3 4 12 8 11 00000111 00001010 00001001 00000110 00000011 00000100 00001100 00001000 00001011 I (0101100) Finding a nearest covering code (1010100) (1011100) : C3 (1110110) Compute Hamming distance: (1010100)  (0101100) = 4 (1010100)  (1011100) = 1 Minimum (1010100)  (1110110) = 2 :

The Proposed Method (Cont.) Embedding 00000111 00001010 00001001 00000110 00000011 00000100 00001100 00001000 00001011 00000111 00001010 00001001 00000011 00000100 00001100 00001000 00001011 Replace (1010100)  (1011100) = 1 7 10 9 3 4 12 8 11 I’

The Proposed Method (Cont.) Extracting 7 10 9 3 4 12 8 11 00000111 00001010 00001001 00000011 00000100 00001100 00001000 00001011 I’ 0112 H Secret data

Experimental Results Each stego image (512512) carried 112,347 secret bits (i.e. 0.42857 bpp)

Experimental Results (Cont.)

Experimental Results (Cont.)

Conclusions The proposed method has a lower cost of chip implementation and saves the power consumption for mobile devices.