Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)

Slides:



Advertisements
Similar presentations
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Advertisements

1 影像偽裝術的最新發展 張真誠 逢甲大學 講座教授 中正大學 榮譽教授 清華大學 合聘教授 Watermarking 2. Image authentication 3. Secret sharing 4. Visual cryptography 5. Steganography.
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan.
Reversible Data Hiding ECE643 Digital Image Processing (I) Course Project Professor: Yun Q. Shi Su Yu 12/02/2011.
Reversible data hiding based on histogram shifting scheme Reporter: Date: Wan-Yu Lu 2012/12/13.
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Reversible watermarking Wu Dan Introduction What?
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
1 資訊隱藏技術之研究 The Study of Information Hiding Mechanisms 指導教授: Chang, Chin-Chen ( 張真誠 ) 研究生: Lu, Tzu-Chuen ( 呂慈純 ) Department of Computer Science and Information.
A lossless data hiding scheme based on three- pixel block differences Ching-Chiuan Lin and Nien-Lin Hsueh Pattern Recognition, Vol. 41(4), April 2008 Pages.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
Advisor: Chang, Chin-Chen Student: Chen, Chang-Chu
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
基於龜殼魔術矩陣的隱寫技術及其衍生的研究問題
影像偽裝術 Dr. Chin-Chen Chang
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
(k, n)-Image Reversible Data Hiding
Information Hiding Technology: Current Research and Future Trend
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
Advisor: Chin-Chen Chang1, 2 Student: Yi-Hui Chen2
Reversible Data Hiding in JPEG Images using Ordered Embedding
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Information Steganography Using Magic Matrix
Chair Professor Chin-Chen Chang Feng Chia University
指導教授: Chang, Chin-Chen (張真誠)
A Data Hiding Scheme Based Upon Block Truncation Coding
Hiding Data in a Color Palette Image with Hybrid Strategies
A Study of Digital Image Coding and Retrieving Techniques
Embedding Secrets Using Magic Matrices
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
A Restricted Region-based Data-hiding Scheme
Some Novel Steganographic Methods for Digital Images
Reversible Data Hiding
Reversible Data Hiding Scheme Using Two Steganographic Images
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
Information Steganography Using Magic Matrix
Source : Journal of Visual Communication and Image Representation, vol
Dynamic embedding strategy of VQ-based information hiding approach
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Hiding Information in VQ Index Tables with Reversibility
Information Hiding and Its Applications
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Source : Journal of Visual Communication and Image Representation, vol
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
Chair Professor Chin-Chen Chang Feng Chia University
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Chair Professor Chin-Chen Chang Feng Chia University
Partial reversible data hiding scheme using (7, 4) hamming code
New Framework for Reversible Data Hiding in Encrypted Domain
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Data Hiding Scheme Based Upon Block Truncation Coding
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Information Hiding Techniques Using Magic Matrix
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
LSB matching revisited
Steganographic Systems for Secret Messages
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Image Steganography and Reversible Data Embedding Techniques 影像偽裝與可逆式資訊隱藏技術 Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良) Department of Computer Science and Information Engineering, National Chung Cheng University

Outline Part I: Image Steganography Part II: Reversible Data Embedding covert (undetectable) communication slight modification Part II: Reversible Data Embedding lossless (reversibility) original image

Image Steganography Escape Alice Bob Warden

Steganography for VQ Compressed Images Using Hamming Codes and Declustering

Vector Quantization (VQ)

LSB Embedding Codebook Y of size m : Arrange Codebook : such that are similar Cover compression codes : {3, 6, 5, 0} = {011, 110, 101, 000}2 Secret message bits : (0, 0, 1, 1) Stego compression codes : {010, 110, 101, 001}2 = {2, 6, 5, 1} Embedding efficiency =

Single-Error-Correcting Codes Send 1101 1 1 1 1 Finally send 1101010

Single-Error-Correcting Codes (Cont.) Receive 1101000 1 Binary (7, 4) Hamming Code

Single-Error-Correcting Codes (Cont.) Receive w=1101010 s=HwT= Receive w=1101000 s=HwT= HwT ≠ 0, 1-error occurred Corrected x = w - el(HwT) = (1101000) – (0000010) = (1011010)

Proposed Method Apply binary (7, 4) Hamming Code Codebook Y of size m : Arrange Codebook : such that are similar Two sub-codebooks: Apply binary (7, 4) Hamming Code 7 Cover compression codes : {3, 7, 4, 1, 2, 6, 4} 7-bit Cover vector: w=(1101000) 3-bit Message m=(011)

Embedding and Extraction s=HwT= HxT = 0 HxT = m HxT = HwT – HwT + m HxT = HwT – (HwT – m) HxT = H(w - el(HwT - m)) x = w - el(HwT - m) HwT – m = (010)-(011) = (001) Stego vector x = w – el(001) =(1101000)-(0000001) =(1101001) 7 Stego codes = {3, 7, 4, 1, 2, 6, 5} Extract : m = HxT=(011) Embedding efficiency =

q-ary Hamming Codes Apply 3-ary (4, 2) Hamming Code Codebook q -1 … Y0 Y1 Yq -1 Similar Apply 3-ary (4, 2) Hamming Code 4 Cover vector: w=(1021) 2 Message m=(21)3 s=HwT= HwT – m = (02)-(21) = (11) Stego vector x = w – el(11) =(1021)-(0010) =(1011) Extract : m = HxT=(21) Embedding efficiency =

Analysis Use the q-ary Hamming codes to convey r q-ary symbols in Embedding efficiency = > 2 = LSB embedding Use the q-ary Hamming codes by performing at most one embedding change. indices to convey r q-ary symbols in

VQ compressed image (PSNR = 31.26 dB) Visual Quality VQ compressed image (PSNR = 31.26 dB) LSB embedding (PSNR = 29.92 dB) Proposed scheme (PSNR = 30.97 dB)

Reversible Data Embedding Marked image Authentication code Original cover image Cover image = authentic Extracted auth. code Auth. code

Reversible Data Hiding Based on Histogram Modification of Pixel Differences

Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354-362, Mar. 2006. Original image peak point zero point 2 5 3 1 4 2 6 4 1 5 3 2 6 3 1 5 Marked image Messages: 11001101

Histogram Modification Marked image 2 6 4 1 5 3 a=3 b=6 2 6 4 1 5 3 Extracted bits =11001101 extract 2 6 4 1 5 3 2 5 3 1 4 recover Original cover image

Proposed Method

Proposed Method Peak point P=1 Cover image 155 156 158 159 160 153 157 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 xi 155 156 158 159 160 157 153 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 di 155 Peak point P=1

Shift xi by 1 units: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 xi 155 156 158 159 160 157 153 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 di 155 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 yi 155 159 158 157 152

Let m be the secret data to be embedded m={0 ,1}. P = 1, message to be embedded: 011001 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 xi 155 156 158 159 160 157 153 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 di 155 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 yi 155 156 154 159 158 160 157 152

Extraction and Recovery 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 yi 155 156 154 159 158 160 157 152 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 xi 155 156 158 159 160 157 153 P=1, extracted message m= 011001

Experimental Results In the worse case, all pixel values will be increased or decreased by 1 but the first pixel. That is, the mean squared error (MSE) is (N-1)/N . The lower bound of PSNR: Original Lena 48.32 dB embedded with 0.0854 bpp

Performance Comparison

Future Works Image Steganography Reversible Data Embedding spatial domain, JPEG, JPEG2000, etc. combine other codes Reversible Data Embedding higher hiding capacity with lower distortion. transform domains such as wavelet