Reversible Data Hiding in JPEG Images using Ordered Embedding

Slides:



Advertisements
Similar presentations
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Advertisements

1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Reversible data hiding based on histogram shifting scheme Reporter: Date: Wan-Yu Lu 2012/12/13.
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
Reversible watermarking Wu Dan Introduction What?
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
1 資訊隱藏技術之研究 The Study of Information Hiding Mechanisms 指導教授: Chang, Chin-Chen ( 張真誠 ) 研究生: Lu, Tzu-Chuen ( 呂慈純 ) Department of Computer Science and Information.
Palette Partition Based Data Hiding for Color Images Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, and Chien-Ting Huang Speaker : Yu-Chiang Li.
JPEG - JPEG2000 Isabelle Marque JPEGJPEG2000. JPEG Joint Photographic Experts Group Committe created in 1986 by: International Organization for Standardization.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
Advisor: Chang, Chin-Chen Student: Chen, Chang-Chu
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
Source: IEEE Signal Processing Letters (Accepted)2016
(k, n)-Image Reversible Data Hiding
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Source: IEEE Transactions on Circuits and Systems for Video Technology Vol.26.
Source : Signal Processing, Volume 133, April 2017, Pages
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Source :Journal of visual Communication and Image Representation
Chair Professor Chin-Chen Chang Feng Chia University
Advisor: Chin-Chen Chang1, 2 Student: Wen-Chuan Wu2
Mean value based reversible data hiding in encrypted images
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
A Data Hiding Scheme Based Upon Block Truncation Coding
Separable and error-free reversible data hiding in encrypted images
Hiding Data in a Color Palette Image with Hybrid Strategies
Yongjian Hu, Member, IEEE, Heung-Kyu Lee, Kaiying Chen, and Jianwei Li
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
A Restricted Region-based Data-hiding Scheme
Source: Information Sciences, 2018, accpeted.
Source : Signal Processing, vol. 126, pp ,  November 2016
Reduction of blocking artifacts in DCT-coded images
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding Scheme Using Two Steganographic Images
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Source: Signal Processing: Image Communication 64 (2018) 78-88
Reversible Data Hiding in JPEG Images
Source : Journal of Visual Communication and Image Representation, vol
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Data hiding method using image interpolation
Dynamic embedding strategy of VQ-based information hiding approach
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Information Hiding and Its Applications
Digital Steganography Utilizing Features of JPEG Images
Source : Journal of Visual Communication and Image Representation, vol
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Partial reversible data hiding scheme using (7, 4) hamming code
New Framework for Reversible Data Hiding in Encrypted Domain
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Data Hiding Scheme Based Upon Block Truncation Coding
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
A Restricted Region-based Data-hiding Scheme
Adopting secret sharing for reversible data hiding in encrypted images
Presentation transcript:

Reversible Data Hiding in JPEG Images using Ordered Embedding Source: KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 11, NO. 2, 2017, pp. 945-958. Authors:Zhenxing Qian, Shu Dai and Boyang Chen Speaker :Xiaozhu Xie Date : 2017/11/16

Outline Related work JPEG Compression Proposed scheme Experimental results Conclusions I would like to present in these five parts.

Related work--JPEG Compression(1/4) Procedure of JPEG compression 3

Related work-- JPEG Compression(2/4) 52 55 61 66 70 64 73 63 59 90 109 85 69 72 62 68 113 144 104 58 71 122 154 106 67 126 88 79 65 60 77 75 83 87 76 78 94 -415 -30 -61 27 56 -20 -2 4 -22 10 13 -7 -9 5 -47 7 77 -25 -29 -6 -49 12 34 -15 -10 6 2 -13 -4 -3 3 -8 1 -1   DCT Original Image 4

Related work-- JPEG Compression(3/4) DC(direct current ) The others are AC(alternating current ). 26 2 3 -1 1 DC: differential pulse code modulation (DPCM) Quantification JPEG file Entropy encoding AC: Run Length Coding (RLC) Quantization table 5

Related work-- JPEG Compression(4/4) AC coefficients : {0, 2, -1,0, 0, 0, 3, 0, 1, 0, ......, 0} ZRV(zero-run-value)(R,V): {(1, 2), (0, -1), (3, 3), (1,1), …} [(R, C) / V]: {[(1,2) /2],[(0,1) /-1],[(3,2) /3],[(1,1) /1],…} R: Zero run length V: The non-zero value following these zero coefficients C: The category that V belongs to 6

Proposed scheme(1/5)- Analyses of ZRV Pairs Remark 1: If the values V and V' belong to the same category, length of the encoded bits is unchanged; otherwise, the length changes. Remark 2: The number of ZRV pairs belonging to each type in all DCT blocks of a JPEG image increases when R approaches zero.

Proposed scheme(2/5)- Analyses of ZRV Pairs Remark 3: Hiding data into ZRV pairs with a fixed R using histogram shift based algorithm causes the increment of JPEG file size. The increment is determined by R. Remark 4: Embedding data into the blocks with fewer ZRV pairs using histogram shift based algorithm can result in fewer shifts. 𝑆 1 :blocks with fewer ZRV pairs (the first 50%) 𝑆 2 :blocks with more ZRV pairs (the last 50%) 𝑁 𝑝 : the average embedding payload 𝑁 𝑠 : the average number of ZRV shifts

Proposed scheme(3/5)- Carrier Selection and Ordered Embedding Calculate the number of ZRV pairs and the number of ZRV pairs with (R,1) or (R, -1) in each block; 𝐴 𝑖 : 4, 3, 5, ⋯ 𝐵 𝑖 : 2, 1, 3, ⋯ 𝑖=1,2,⋯,𝑀, 𝑀 is the number of 8×8 blocks. ZRV pairs {(1, 2), (0, 1), (3, 3), (1,1)} {(0, 3), (3, 2), (0,1)} {(1, 1), (2, -1), (1, 2), (4,-1),(2,2)} … JPEG file partially decoding Select blocks satisfying 𝐴 𝑖 ≤𝑇, (0≤T≤63) to be embedded: 𝑠 1 ,𝑠 2 ,⋯,𝑠(𝐿) Where , P is the number of secret bits Construct a map 𝑊(𝑖,𝑅), the number of ZRV pairs with R zero-run-length in 𝑠 𝑖 block. 𝑊 1,0 =1,𝑊 1,1 =2, 𝑊 1,2 =0, 𝑊 1,3 =1 𝑊 2,0 =2, 𝑊 2,1 =0, 𝑊 2,2 =0,𝑊 2,3 =1 𝑊 3,0 =0, 𝑊 3,1 =2, 𝑊 3,2 =2,𝑊 3,3 =0, 𝑊 3,4 =1 {(1, 3), (0, 1), (3, 3), (1,2)} {(0, 4), (3, 2), (0,2)} {(1, 1), (2, -1), (1, 3), (4,-1),(2,2)} … 01100 Embedding

Proposed scheme(4/5) Flowchart of ordered embedding

Proposed scheme(5/5)- Data Extraction and Image Recovery Marked JPEG file ZRV pairs {(1, 3), (0, 1), (3, 3), (1,2)} {(0, 4), (3, 2), (0,2)} {(1, 1), (2, -1), (1, 3), (4,-1),(2,2)} … Calculate the number of ZRV pairs in each block; 𝐴 𝑖 : 4, 3, 5, ⋯ partially decoding Select blocks satisfying 𝐴 𝑖 ≤𝑇: 𝑠 1 ,𝑠 2 ,⋯,𝑠(𝐿) In order to avoid overflow and underflow problems, the LSBs of the reference pixels are set to zero before encryption so that MCGs can be constructed for data hiding and extraction in directly encrypted domain. Reconstruct the map 𝑊(𝑖,𝑅), the number of ZRV pairs with R zero-run-length in 𝑠 𝑖 block. 𝑊 1,0 =1,𝑊 1,1 =2, 𝑊 1,2 =0, 𝑊 1,3 =1 𝑊 2,0 =2, 𝑊 2,1 =0, 𝑊 2,2 =0,𝑊 2,3 =1 𝑊 3,0 =0, 𝑊 3,1 =2, 𝑊 3,2 =2,𝑊 3,3 =0, 𝑊 3,4 =1 …

Experimental results (1/4) A group of results, (a)~(c): the original JPEG images “Lena”, “Peppers” and “Baboon”; (d)~(f): the marked JPEG images Payloads: 26442 bits,21919 bits ,42855 bits T : 36, 36, and 42 PSNR: 39.4dB, 40.6dB, and 33.2dB

Experimental results (2/4) 50 grayscale images from Bossbase [18] F. Huang, X. Qu, H. J. Kim, and J. Huang, “Reversible Data Hiding in JPEG Images,”IEEE Trans on Circuits and Systems for Video Technology, 2015.

Experimental results (3/4) Average increment of JPEG file size corresponding to embedding payloads and quality factors

Experimental results (4/4) Average increased file size corresponding to average PSNR values using different quality factors

Conclusions Analyze the features of JPEG embedding and achieve a number of remarks. Provide an ordered embedding based method to efficiently reduces the increment of JPEG file size. Large embedding capacity can be achieved and the marked image preserves good quality.

Thank you!