Source: Information Sciences, 2018, accpeted.

Slides:



Advertisements
Similar presentations
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
Advertisements

1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan.
Reversible data hiding based on histogram shifting scheme Reporter: Date: Wan-Yu Lu 2012/12/13.
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Improved PVO-based reversible data hiding Source: Digital Signal Processing, 2014 Authors: Fei Peng, Xiaolong Li,ng Reporter: Min-Hao Wu.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
Reversible Date Hiding Based on Histogram Modification of pixel Differences IEEE Transactions on circuits and systems for video technology, VOL. 19, NO.
A lossless data hiding scheme based on three- pixel block differences Ching-Chiuan Lin and Nien-Lin Hsueh Pattern Recognition, Vol. 41(4), April 2008 Pages.
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
(k, n)-Image Reversible Data Hiding
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Source: IEEE Transactions on Circuits and Systems for Video Technology Vol.26.
Image camouflage by reversible image transformation
Reversible Data Hiding in JPEG Images using Ordered Embedding
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Reversible data hiding scheme based on significant-bit-difference expansion Sourse: IET Image Processing ( Volume: 11, Issue: 11, ), Pages 1002.
QR Code Authentication with Embedded Message Authentication Code
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
Source : Signal Processing, vol. 150, pp ,  September 2018
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images Source: Symmetry, vol. 8, no. 6, June.
Separable and error-free reversible data hiding in encrypted images
Yongjian Hu, Member, IEEE, Heung-Kyu Lee, Kaiying Chen, and Jianwei Li
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
A Restricted Region-based Data-hiding Scheme
An efficient reversible data hiding method for AMBTC compressed images
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source : Signal Processing, vol. 126, pp ,  November 2016
Skewed Histogram Shifting for Reversible Data Hiding using a Pair of Extreme Predictions Source: IEEE Transactions on Circuits and Systems for Video Technology(
Reversible Data Hiding
Reversible Data Hiding Scheme Using Two Steganographic Images
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Source: Signal Processing: Image Communication 64 (2018) 78-88
Source:. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL
Source: IEEE Access, Vol. 6, Dec. 2017, pp
Source: Signal Processing, Vol. 125, pp , August 2016.
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
Data hiding based Hamming code
Reversible Data Hiding in JPEG Images
Source : Journal of Visual Communication and Image Representation, vol
Data hiding method using image interpolation
Skewed Histogram Shifting for Reversible Data Hiding using a Pair of Extreme Predictions Source: IEEE Transactions on Circuits and Systems for Video Technology(
Dynamic embedding strategy of VQ-based information hiding approach
Information Hiding and Its Applications
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Source : Journal of Visual Communication and Image Representation, vol
Sourse: Multimedia Tools and Applications, 2018, pp 1–17
High-fidelity reversible data hiding based on pixel-value-ordering and pairwise prediction-error expansion Source: Journal of Visual Communication and.
High Capacity Data Hiding for Grayscale Images
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
New Framework for Reversible Data Hiding in Encrypted Domain
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
Blind Reversible Authentication Based on PEE and CS Reconstruction
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection Source: Multimedia.
Source: Signal Processing Volume 111 June 2015, Pages
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Pairwise IPVO-Based Reversible Data Hiding
Dynamic improved pixel value ordering reversible data hiding
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
A Restricted Region-based Data-hiding Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Adopting secret sharing for reversible data hiding in encrypted images
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Reversible data hiding using multi-pass pixel-value-ordering and pairwise prediction-error expansion Source: Information Sciences, 2018, accpeted. Authors: Wenguang He , Gangqiang Xiong, Shaowei Weng, Zhanchuan Cai, Yaomin Wang Speaker :Xiaozhu Xie Date : 2018/08/09

Outline Related work Proposed scheme Experimental results Conclusions Li et al.’s PVO Peng et al.’s IPVO Qu et al.’s PVO-based pairwise PEE Proposed scheme Experimental results Conclusions I would like to present in these five parts.

Related work - Li et al.’s PVO (1/9) A cover block Li X, Li J, Li B, et al. High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion[J]. Signal processing, 2013, 93(1): 198-205. 3

Related work - Li et al.’s PVO (2/9) Example of Li et al.’s PVO by modifying the maximum of a block 3

Related work-Peng et al.’s IPVO (3/9) Improved maximum-modification-based data embedding Redefine 𝑑 𝑚𝑎𝑥 𝑑 𝑚𝑎𝑥 = 𝑥 𝜎(𝑛) − 𝑥 𝜎 𝑛−1 >0 if 𝜎 𝑛 <𝜎(𝑛−1) 𝑥 𝜎(𝑛−1) − 𝑥 𝜎 𝑛 ≤0 if 𝜎 𝑛 >𝜎(𝑛−1) 3 [29] F. Peng , X. Li , B. Yang , Improved pvo-based reversible data hiding, Digit. Signal Process. 25 (2014) 255–265 .

Related work-Peng et al.’s IPVO (4/9) Improved maximum-modification-based data embedding 𝑥 𝜎(𝑛) b: the to-be-embedded bit. 3

Related work-Peng et al.’s IPVO (5/9) Improved maximum-modification-based data embedding Example of Peng et al.’s IPVO by modifying the maximum of a block 3

Related work-Peng et al.’s IPVO (6/9) Improved minimum-modification-based data embedding Redefine 𝑑 𝑚𝑖𝑛 Data embedding 𝑑 𝑚𝑖𝑛 = 𝑥 𝜎(1) − 𝑥 𝜎 2 <0 if 𝜎 1 <𝜎(2) 𝑥 𝜎(2) − 𝑥 𝜎 1 ≥0 if 𝜎 1 >𝜎(2) 𝑥 𝜎(1) 3

Related work-Ou et al.’s PVO-based pairwise PEE (7/9) Redefine 𝑒 𝑚𝑎𝑥 , viz., 𝑑 𝑚𝑎𝑥 Modification manner on the 2D-PEH of Peng et al.’s IPVO ( 𝑓 2 ) [22] B. Ou , X. Li , J. Wang , High-fidelity reversible data hiding based on pixel-value-ordering and pairwise prediction-error expansion, J. Vis. Commun. Image R 39 (2016) 12–23 . 3

Related work-Ou et al.’s PVO-based pairwise PEE (8/9) C D E F 2D-PEH generated by Ou et al.’s method on Lena image (2×3 blocksize) 2D mapping for Ou et al.’s PVO-based pairwise PEE( 𝑓 1 ) 3

Related work-Ou et al.’s PVO-based pairwise PEE (9/9) Threshold: 𝑇 1 , 𝑇 2 NL: Noise level 11

Proposed scheme (1/6)

Proposed scheme (2/6) F B C D A E High power version of PVO-based pairwise PEE (improve 𝑓 1 ) A B C D E F Redefine 𝑒 𝑚𝑎𝑥 𝑒 𝑚𝑎𝑥 2 = 𝑝 𝑣 − 𝑝 𝜎 𝑛−2 >0 𝑣<𝜎 𝑛−2 𝑝 𝜎 𝑛−2 −𝑝 𝑣 ≤0 𝑣>𝜎 𝑛−2

Proposed scheme (3/6) High power version of PVO-based pairwise PEE (improve 𝑓 1 ) Data embedding 2D mapping for the proposed pairwise PEE( 𝑓 𝐻 )

Proposed scheme (4/6) Low power version of PVO-based pairwise PEE(improve 𝑓 2 ) ≤1 ≤1 2D mapping for the proposed pairwise PEE( 𝑓 𝐿 )

Proposed scheme (5/6) Optimal-threshold-determination 𝑇 1 ∗ , 𝑇 2 ∗ : Two threshold. 𝐷 𝐻 𝑡 , 𝐷 𝐿 𝑡 : Distortion generated by 𝑓 𝐻 , 𝑓 𝐿 . 𝐸 𝐻 𝑡 , 𝐸 𝐿 𝑡 : Capacity generated by 𝑓 𝐻 , 𝑓 𝐿 . EC: Embedding capacity. 60+ 𝐿 𝑐𝑙𝑚 : The length of auxiliary information and compressed location map.

Proposed scheme (6/6) Step 1. Location map construction Blocks with pixel values equal to 0 or 255 are unavailable. Step 2. Payload preparation The LSBs of first 60+ 𝐿 𝑐𝑙𝑚 pixels and secret message make up the real payload. Step 3. Payload embedding For available blocks, calculate 𝑁𝐿 and two error pairs 𝑒 𝑚𝑎𝑥 1 , 𝑒 𝑚𝑎𝑥 2 , 𝑒 𝑚𝑖𝑛 1 , 𝑒 𝑚𝑖𝑛 2 , then embed data guiding by 𝑓. 𝑓= 𝑓 𝐻 𝑁𝐿≤ 𝑇 1 ∗ 𝑓 𝐿 𝑇 1 ∗ <𝑁𝐿≤ 𝑇 2 ∗ Step 4. Auxiliary information embedding

Experimental results-(1/8)

Experimental results-(2/8)

Experimental results-(3/8) [20] B. Ou , X. Li , Y. Zhao , R. Ni , Reversible data hiding using invariant pixel-value-ordering and prediction-error expansion, Signal Process. Image Commun. 29 (7) (2014) 760–772 . [22] B. Ou , X. Li , J. Wang , High-fidelity reversible data hiding based on pixel-value-ordering and pairwise prediction-error expansion, J. Vis. Commun. Image R 39 (2016) 12–23 . [29] F. Peng , X. Li , B. Yang , Improved pvo-based reversible data hiding, Digit. Signal Process. 25 (2014) 255–265 . [30] X. Qu , H.J. Kim , Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding, Signal Process. 111 (2015) 249–260 . [32] V. Sachnev , H.J. Kim , J. Nam , S. Suresh , Y.Q. Shi , Reversible watermarking algorithm using sorting and prediction, IEEE Trans. Circuits Syst. Video Technol. 19 (7) (2009) 989–999 . Performance comparison between the proposed scheme and other related schemes.

Experimental results-(4/8) Performance comparison between the proposed scheme and other related schemes.

Experimental results-(5/8) Performance comparison between the proposed scheme and other related schemes.

Experimental results-(6/8)

Experimental results-(7/8)

Experimental results-(8/8)

CONCLUSIONS Multi-pass PVO prediction. The high and low power version of PVO-based pairwise PEE. Efficient capacity-distortion trade-off.

Thank you!