Source : Journal of Visual Communication and Image Representation, vol

Slides:



Advertisements
Similar presentations
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
Advertisements

1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Reversible data hiding based on histogram shifting scheme Reporter: Date: Wan-Yu Lu 2012/12/13.
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Improved PVO-based reversible data hiding Source: Digital Signal Processing, 2014 Authors: Fei Peng, Xiaolong Li,ng Reporter: Min-Hao Wu.
Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
Reversible Image Watermarking Using Interpolation Technique Source: IEEE Transcation on Information Forensics and Security, Vol. 5, No. 1, March 2010 Authors:
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
Reversible Date Hiding Based on Histogram Modification of pixel Differences IEEE Transactions on circuits and systems for video technology, VOL. 19, NO.
A lossless data hiding scheme based on three- pixel block differences Ching-Chiuan Lin and Nien-Lin Hsueh Pattern Recognition, Vol. 41(4), April 2008 Pages.
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
Vishnu Vardhan Reddy Mukku Mav ID : Under the guidance of.
1 Security of fragile watermarking scheme for image authentication Authors: K. C. Liao, W. B. Lee, and C. W. Liao Source: The Imaging Science Journal,
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
(k, n)-Image Reversible Data Hiding
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Source: IEEE Transactions on Circuits and Systems for Video Technology Vol.26.
Image camouflage by reversible image transformation
Reversible Data Hiding in JPEG Images using Ordered Embedding
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Wavelet in POCS for image segment
Source :Journal of visual Communication and Image Representation
Reversible data hiding scheme based on significant-bit-difference expansion Sourse: IET Image Processing ( Volume: 11, Issue: 11, ), Pages 1002.
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
Source : Signal Processing, vol. 150, pp ,  September 2018
Separable and error-free reversible data hiding in encrypted images
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
Source: Information Sciences, 2018, accpeted.
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source : Signal Processing, vol. 126, pp ,  November 2016
Skewed Histogram Shifting for Reversible Data Hiding using a Pair of Extreme Predictions Source: IEEE Transactions on Circuits and Systems for Video Technology(
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding
Reversible Data Hiding Scheme Using Two Steganographic Images
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Source: Signal Processing: Image Communication 64 (2018) 78-88
Source:. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL
Source: IEEE Access, Vol. 6, Dec. 2017, pp
Source: Signal Processing, Vol. 125, pp , August 2016.
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
A reversible and secure patient information hiding system for IoT driven e-health Source : International Journal of Information Management, Available online.
Reversible Data Hiding in JPEG Images
Source : Journal of Visual Communication and Image Representation, vol
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Skewed Histogram Shifting for Reversible Data Hiding using a Pair of Extreme Predictions Source: IEEE Transactions on Circuits and Systems for Video Technology(
Dynamic embedding strategy of VQ-based information hiding approach
Partial reversible data hiding scheme using (7, 4) hamming code
High-fidelity reversible data hiding based on pixel-value-ordering and pairwise prediction-error expansion Source: Journal of Visual Communication and.
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Source: Pattern Recognition Letters 29 (2008)
Partial reversible data hiding scheme using (7, 4) hamming code
New Framework for Reversible Data Hiding in Encrypted Domain
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
Blind Reversible Authentication Based on PEE and CS Reconstruction
Source: Signal Processing Volume 111 June 2015, Pages
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Dynamic improved pixel value ordering reversible data hiding
Lossless Data Hiding in the Spatial Domain for High Quality Images
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
Presentation transcript:

Reversible data hiding based on multilevel histogram modification and pixel value grouping Source : Journal of Visual Communication and Image Representation, vol.40, pp.459-469 , October 2016 Authors : Wenguang He , Gangqiang Xiong , Ke Zhou and Jie Cai Speaker : Chia-Shuo Shih Date : 2018/07/19 1

Outline Related work Proposed method Experimental results Conclusion Histogram shifting Proposed method Experimental results Conclusion 2

Related work-Histogram shifting 2 3 4 5 1 Z. Ni, Y.Q. Shi, N. Ansari, W. Su Reversible data hiding IEEE Trans. Circuits Syst. Video Technol., 16 (3) (2006), pp. 354-362 3

Related work-Histogram shifting 2 3 5 6 1 4

Related work-Histogram shifting 2 3 5 6 1 2 3 5 6 4 1 s = 010111001 5

Proposed method-PVG Pixel value grouping(PVG) 6 96 95 94 97 92 98 91 93 91 92 93 94 95 96 97 98 6

Proposed method-PVG 7 T = 4 𝑃 𝐿 ={91} 𝑃 𝑅 ={98} 91 92 93 94 95 96 97 = {91,92} 98-98 = 0 ≤ T = {98,98} 𝑃 𝐿 𝑃 𝑅 𝑃 𝐿 𝑃 𝑅 91 92 93 94 95 96 97 98 7

Proposed method-PVG (1) i + 1 < j 8 T = 4 𝑃 𝐿 𝑃 𝑅 91 92 93 94 95 96 97 98 95-91 = 4 ≤ T = {91,92,93,93,94,94,95,95,95} 𝑃 𝐿 (1) i + 1 < j 𝑃 𝐿 𝑃 𝑅 91 92 93 94 95 96 97 98 8

Proposed method-PVG 9 𝑃 𝐿 𝑃 𝑅 T = 4 15 16 17 18 19 23 25 26 27 = {15,15,16,16,17,18,18,18,18} 27-19 = 8 > T 𝑓 𝑅 = 1 𝑃 𝑅 = {23,25,26,26,26,27,27} 𝑃 𝐿 𝑃 𝐿 𝑃 𝑅 (2) i +1 =j and (𝑓 𝐿 =1 𝑜𝑟 𝑓 𝑅 = 1) 15 16 17 18 19 23 25 26 27 9

Proposed method-PVG 10 T = 4 𝑃 𝐿 𝑃 𝑅 15 16 17 18 19 23 25 26 27 = {15,15,16,16,17,18,18,18,18,19} 𝑓 𝑅 = 1 𝑃 𝐿 𝑃 𝐿 𝑃 𝑅 (2) i +1 =j and (𝑓 𝐿 =1 𝑜𝑟 𝑓 𝑅 = 1) 15 16 17 18 19 23 25 26 27 10

Proposed method-PVG 11 (3) 𝑓 𝐿 =1 𝑎𝑛𝑑 𝑓 𝑅 =1 T = 4 𝑃 𝐿 𝑃 𝑅 60 62 63 67 70 71 72 73 67-60 = 7 > T 𝑃 𝐿 = {60,60,62,62,63} 𝑓 𝐿 = 1 73-71 = 2 ≤ T 𝑃 𝑅 = {71,71,72,73,73,73} 𝑃 𝐿 𝑃 𝑅 (3) 𝑓 𝐿 =1 𝑎𝑛𝑑 𝑓 𝑅 =1 60 62 63 67 70 71 72 73 73-67 = 6 > T 𝑃 𝑅 = {70,70,70,70,71,71,72,73,73,73} 𝑓 𝑅 = 1 𝑓 𝐿 = 1 11

Proposed method-Embedding EL = 4 𝑃 𝐿 𝑃 𝑅 𝑓 𝑅 = 1 𝑓 𝐿 = 0 15 16 17 18 19 23 25 26 27 PVG 23 15 16 27 19 18 25 26 17 15 16 19 18 17 23 27 25 26 𝑃 𝐿 𝑃 𝑅 12

Proposed method-Embedding 15 16 19 18 17 19 -4 -3 -1 -2 𝑝 ref =19 𝑃 𝐿 𝑓 𝐿 = 0 13

Proposed method-Embedding Serect bit: 01000010 15 16 19 18 17 -4 -3 -1 -2 1 15 -> 1 = 10 15 -> 0 = 11 16 -> 1 = 12 16 -> 0 = 13 17 -> 1 = 14 17 -> 0 = 15 18 -> 1 = 16 18 -> 0 = 17 11 13 19 17 10 16 15 14

Proposed method-Embedding 23 27 25 26 22    𝑝 v−ref = 𝑃 σ(n) - (EL+1)   22 = 27 - (4+1) 𝑃 𝑅 𝑓 𝑅 = 1 1 5 3 4 15

Proposed method-Embedding Serect bit: 01101 23 27 25 26 1 5 3 4 1 23 -> 0 = 24 23 -> 1 = 25 24 -> 0 = 26 24 -> 1 = 27 25 -> 0 = 28 25 -> 1 = 29 26 -> 0 = 30 26 -> 1 = 31 25 32 28 30 31 16

Experimental results 17 Image Scheme EL = 1 EL = 3 EL = 5 EL = 7 EC PSNR Lena Proposed 0.14 49.27 0.47 42.71 0.65 39.56 0.73 37.61 0.77 36.38 Luo et al. 0.33 43.33 0.59 38.84 0.7 36.64 0.76 35.23 0.79 34.21 Baboon 0.03 50.65 0.09 44.23 0.17 40.25 0.25 37.38 35.2 42.62 0.19 36.99 0.29 33.86 0.37 31.75 0.43 30.18 Pepper 0.07 49.97 0.28 43.14 0.49 39.2 0.63 36.83 0.72 35.34 0.23 43.03 0.48 38.12 35.72 34.26 33.25 Elaine 0.06 50.21 43.64 0.34 39.59 36.74 0.61 34.69 0.18 42.89 0.38 37.68 0.54 35.01 33.36 0.74 32.26 Boat 50.13 0.22 43.47 39.45 0.51 36.79 34.93 42.88 0.52 34.97 33.23 0.68 31.98 Barbara 0.08 49.98 43.29 39.61 37.21 0.58 35.42 42.9 37.7 34.88 0.55 32.97 0.6 31.53 Comparison of our scheme and Luo et al.’s scheme with 4 × 4 block partition. 17

Experimental results 18

Experimental results 19

Conclusion Pixel Value Grouping(PVG) 20

-END- 22