Source:. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL

Slides:



Advertisements
Similar presentations
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Advertisements

Reversible Data Hiding Based on Two-Dimensional Prediction Errors
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Improved PVO-based reversible data hiding Source: Digital Signal Processing, 2014 Authors: Fei Peng, Xiaolong Li,ng Reporter: Min-Hao Wu.
BIN LI, HOUQIAN LI, LI LI, AND JINLEI ZHANG IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL.23, NO.9, SEPTEMBER
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
A lossless data hiding scheme based on three- pixel block differences Ching-Chiuan Lin and Nien-Lin Hsueh Pattern Recognition, Vol. 41(4), April 2008 Pages.
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
Advisor: Chin-Chen Chang Student: Thai-Son Nguyen
(k, n)-Image Reversible Data Hiding
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Source: IEEE Transactions on Circuits and Systems for Video Technology Vol.26.
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
Image camouflage by reversible image transformation
Reversible Data Hiding in JPEG Images using Ordered Embedding
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
A new two-level QR code with visual cryptography scheme
Reversible data hiding scheme based on significant-bit-difference expansion Sourse: IET Image Processing ( Volume: 11, Issue: 11, ), Pages 1002.
Mean value based reversible data hiding in encrypted images
Source: J. Vis. Commun. Image R. 41 (2016) 58–64
Source : Signal Processing, vol. 150, pp ,  September 2018
Yongjian Hu, Member, IEEE, Heung-Kyu Lee, Kaiying Chen, and Jianwei Li
An efficient reversible data hiding method for AMBTC compressed images
Source: Information Sciences, 2018, accpeted.
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source : Signal Processing, vol. 126, pp ,  November 2016
Skewed Histogram Shifting for Reversible Data Hiding using a Pair of Extreme Predictions Source: IEEE Transactions on Circuits and Systems for Video Technology(
Improved joint reversible data hiding in encrypted images
Reversible Data Hiding
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Source: Signal Processing: Image Communication 64 (2018) 78-88
Source: IEEE Access, Vol. 6, Dec. 2017, pp
Source: Signal Processing, Vol. 125, pp , August 2016.
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
Sourse: IEEE Transactions on Circuits and Systems for Video Technology
Reversible Data Hiding in JPEG Images
Source : Journal of Visual Communication and Image Representation, vol
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Data hiding method using image interpolation
Skewed Histogram Shifting for Reversible Data Hiding using a Pair of Extreme Predictions Source: IEEE Transactions on Circuits and Systems for Video Technology(
Source : Journal of Visual Communication and Image Representation, vol
Sourse: Multimedia Tools and Applications, 2018, pp 1–17
High-fidelity reversible data hiding based on pixel-value-ordering and pairwise prediction-error expansion Source: Journal of Visual Communication and.
High Capacity Data Hiding for Grayscale Images
Chair Professor Chin-Chen Chang Feng Chia University
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Chair Professor Chin-Chen Chang Feng Chia University
New Framework for Reversible Data Hiding in Encrypted Domain
Novel Multiple Spatial Watermarking Technique in Color Images
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
Blind Reversible Authentication Based on PEE and CS Reconstruction
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection Source: Multimedia.
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Pairwise IPVO-Based Reversible Data Hiding
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Dynamic improved pixel value ordering reversible data hiding
Sourse: arXiv preprint, arXiv: , 2018 (Submit to IEEE Trans
Rich QR Codes With Three-Layer Information Using Hamming Code
Adopting secret sharing for reversible data hiding in encrypted images
Reversible data hiding in encrypted binary images by pixel prediction
Presentation transcript:

Efficient Reversible Data Hiding Based on Multiple Histograms Modification Source: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 10, NO. 9, SEPTEMBER 2015 Authors: Xiaolong Li, Weiming Zhang, Xinlu Gui, and Bin Yang Speaker: ZhaoHua Zhu Date: 12/01/2017

Outline Related Work Proposed Scheme Experiment Result Conclusions

Predict error after embedding e’ Related Work(1/9) -Frame work of PEE I - I’ -2 1 6 -3 7 Cover Image I Predict Image I’ Predict error e embedding I’ + e’ -3 2 1 7 -4 8 Predict error after embedding e’ Predict error Histogram h Stego Image I’’

Related Work(2/9) -Prediction error 162 161  … 164 158 155 160 163 159 157 Predicted value: 162 164 161 156  … 158 160 159 163 155 157 -2 1 5  … 6 -4 -3 7 -1 4

Related Work(3/9) -complexity measurement 162 161  … 164 158 155 160 163 159 157 1 4  … 2 3 5

Related Work(4/9) -PEH (0,1) (-2,4) (1,4) (5,4) … (0,2) (6,3) (-2,5) n = 0 (0,1) (-2,4) (1,4) (5,4)  … (0,2) (6,3) (-2,5) (-4,2) (0,0) (-3,5) (7,2) (-1,2) (0,3) (4,2) (-2,0) (-1,0) Ignore n n = 1 (e , n) n = … …

Related Work(5/9) C-PEE -2 1 5 … 6 -4 -3 7 -1 4 -3 2 6 … 1 7 -5 -4 8 -2 1 5  … 6 -4 -3 7 -1 4 -3 2 6  … 1 7 -5 -4 8 -2 5 -1 010100…

Related Work(6/9) A-PEE Pick those histogram which n < T, T is threshold Supposed T = 3 (0,1) (-2,4) (1,4) (5,4)  … (0,2) (6,3) (-2,5) (-4,2) (0,0) (-3,5) (7,2) (-1,2) (0,3) (4,2) (-2,0) (-1,0) (0,1) (-2,4) (1,4) (5,4)  … (1,2) (6,3) (-2,5) (-5,2) (0,0) (-3,5) (8,2) (-2,2) (0,3) (5,2) (-3,0) (-1,0) 01010… -3 2 6  … 1 7 -5 -4 8 -2 5 -1 C-PEE

Related Work(7/9) C-PEE A-PEE

Related Work(8/9) O-PEE Set(a,b) to determine hide value -2 1 5 … 6 -4 -2 1 5  … 6 -4 -3 7 -1 4 -2 1 6  … 7 -5 -3 8 -1 5 0…. (-3,2)

Related Work(9/9) AO-PEE (-2,2) T=3 (0,1) (-2,4) (1,4) (5,4)  … (0,2) (6,3) (-2,5) (-4,2) (0,0) (-3,5) (7,2) (-1,2) (0,3) (4,2) (-2,0) (-1,0) (0,1) (-2,4) (1,4) (5,4)  … (0,2) (6,3) (-2,5) (-5,2) (0,0) (-3,5) (8,2) (-1,2) (0,3) (5,2) (-3,0) (-1,0) 1…

Main idea of proposed method (a0,b0) : (-2,1) (a1,b1) : (-3,2) (a2,b2) : (-4,3) (a3,b3) : (-4,3) (a4,b4) : (-∞, ∞)

Proposed Method(2/5) 1011 (1,1) (-2,0) (1,0) (2,0) (0,2) (-1,1) (2,1) (-2,1) (0,0) (-3,4) (7,2) (-1,2) (0,3) (4,2) (-1,0) Nend = 8 (1,1) (-2,0) (1,0) (2,0) (0,2) (-1,1) (2,1) (-2,1) g(e) h(e)

Proposed Method(3/5) g(e) g’(e) embedding distortion -3 -2 -1 0 1 2 3 4 -4 -3 -2 -1 0 1 2 3 4 5 g(e) g’(e) embedding distortion ED = g’(-2) + g’(-3) + g’(-4) + g’(2) + g’(3) + g’(4) + g’(5) ED = g(-2) + g(-3) + g(2) + g(3) + g(4) + (g(1) + g(-1))/2 ED payload PS = g(1) + g(-1) PS

Proposed Method(4/5) ED PS

Proposed Method(5/5)——Optimize Predicted value Complexity Measurement

Experiment Result(1/2) [29] W. Hong, T.-S. Chen, and C.-W. Shiu, “Reversible data hiding for high quality images using modification of prediction errors,” J. Syst. Softw., vol. 82, no. 11, pp. 1833–1842, Nov. 2009. [35] G. Coatrieux, W. Pan, N. Cuppens-Boulahia, F. Cuppens, and C. Roux,“Reversible watermarking based on invariant image classification and dynamic histogram shifting,” IEEE Trans. Inf. Forensics Security, vol. 8,no. 1, pp. 111–120, Jan. 2013. [40] V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y. Q. Shi, “Reversible watermarking algorithm using sorting and prediction,” IEEE Trans.Circuits Syst. Video Technol., vol. 19, no. 7, pp. 989–999, Jul. 2009. [44] C. Wang, X. Li, and B. Yang, “Efficient reversible image watermarking by using dynamical prediction-error expansion,” in Proc. IEEE ICIP, Sep. 2010, pp. 3673–3676. [48] X. Li, W. Zhang, X. Gui, and B. Yang, “A novel reversible data hiding scheme based on two-dimensional difference-histogram modification,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 7, pp. 1091–1100, Jul. 2013. [49] B. Ou, X. Li, Y. Zhao, R. Ni, and Y.-Q. Shi, “Pairwise predictionerror expansion for efficient reversible data hiding,” IEEE Trans. Image Process., vol. 22, no. 12, pp. 5010–5021, Dec. 2013. [55] H. J. Hwang, H. J. Kim, V. Sachnev, and S. H. Joo, “Reversible watermarking method using optimal histogram pair shifting based on prediction and sorting,” KSII Trans. Internet Inf. Syst., vol. 4, no. 4, pp. 655–670, Aug. 2010.

Experiment Result(2/2)

Conclusion This method can achieve higher PSNR value than other method, but have limits in hiding capacity. I think this method can provide higher security of Image.

Thank You