Partial reversible data hiding scheme using (7, 4) hamming code

Slides:



Advertisements
Similar presentations
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
Advertisements

1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Source: IEEE Transactions on Circuits and Systems for Video Technology Vol.26.
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
Image camouflage by reversible image transformation
Reversible Data Hiding in JPEG Images using Ordered Embedding
Source : Signal Processing, Volume 133, April 2017, Pages
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Reversible data hiding scheme based on significant-bit-difference expansion Sourse: IET Image Processing ( Volume: 11, Issue: 11, ), Pages 1002.
A Color Image Hidden in a
A Restricted Region-based Data-hiding Scheme
An efficient reversible data hiding method for AMBTC compressed images
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Some Novel Steganographic Methods for Digital Images
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Improved joint reversible data hiding in encrypted images
Reversible Data Hiding Scheme Using Two Steganographic Images
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Source: IEEE Access, Vol. 6, Dec. 2017, pp
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
A reversible and secure patient information hiding system for IoT driven e-health Source : International Journal of Information Management, Available online.
Data hiding based Hamming code
Source : Journal of Visual Communication and Image Representation, vol
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Data hiding method using image interpolation
Dynamic embedding strategy of VQ-based information hiding approach
Information Hiding and Its Applications
Source : Journal of Visual Communication and Image Representation, vol
Sourse: Multimedia Tools and Applications, 2018, pp 1–17
High Capacity Data Hiding for Grayscale Images
Chair Professor Chin-Chen Chang Feng Chia University
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Data hiding method using image interpolation
Chair Professor Chin-Chen Chang Feng Chia University
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
Partial reversible data hiding scheme using (7, 4) hamming code
New Framework for Reversible Data Hiding in Encrypted Domain
Novel Multiple Spatial Watermarking Technique in Color Images
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Source: IEEE Transactions on multimedia, Vol. 21, No
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection Source: Multimedia.
Source: IEICE-Transactions on Info and Systems
De-clustering and Its Application to Steganography
A New Method for Tamper Detection and Recovery
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Sourse: Information Sciences, Vol. 494, pp , August 2019
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Sourse: arXiv preprint, arXiv: , 2018 (Submit to IEEE Trans
Lossless Data Hiding in the Spatial Domain for High Quality Images
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Presentation transcript:

Partial reversible data hiding scheme using (7, 4) hamming code Source: Multimedia Tools and Applications, Volume 76, Issue 20, October 2017, pp 21691–21706 Author: Biswapati Jana, Debasis Giri, Shyamal Kumar Mondal Speaker: Su Guodong Date: 2019-01-24

Outline Introduction Related works Proposed scheme Experiments Conclusions

Introduction Secret message: 10101100110……. Original image Stego image Secret message: 10101100110……. Hiding Reversible Extracted Secret message: 10101100110…….

Related Work(1/3)—(7,4) Hamming code-Encoding Encoded data Encoding d1 d2 d3 d4 r1 r2 d1 r3 d2 d3 d4 1 Data: 1 1 0 1 Data(CW):

Related Work(2/3)—(7,4) Hamming code-Error correcting Received data(RCW): 1010101 Error data: 1010111 Corrected data: 1010101 RCW: RCW: Correct Error position: 6

Related Work(3/3)—(7,4) Hamming code-Error correcting Received data(RCW): 1010101 Error data: 1010111 Corrected data: 1010101 z 001 010 011 100 101 110 111 ei 1000000 0100000 0010000 0001000 0000100 0000010 0000001

Proposed scheme(1/10)—Embedding Size: 7 7 pixels Original image 167 166 163 162 1 LSB

Proposed scheme(2/10)— Embedding Position Number: Position Number: 1 2 3 4 5 6 7 r1 r2 d1 r3 d2 d3 d4 1 2 3 4 5 6 7 r1 r2 d1 r3 d2 d3 d4 Adjust redundant bits using odd parity

Proposed scheme(3/10)— Embedding 1/0 or 0/1: Previous value/Changed value for secret position 0/1 or 1/0: Previous value/Changed value for message bits Secret position: k=5 (using key) : Shared secret key Position Number: Embedding position: w=2 (suitable) 1 2 3 4 5 6 7 r1 r2 d1 r3 d2 d3 d4 1 2 3 4 5 6 7 r1 r2 d1 r3 d2 d3 d4 0/1 1/0 Secret message bits: s =1 1 0 0 1 1 1 1/0 0/1 0/1 1/0 1/0 0/1 0/1 0/1 Secret position: k=2 (from w of the first row) 0/1 0/1 0/1 0/1 Embedding position: w=4 (suitable)

Proposed scheme(4/10)— Embedding 2 3 4 5 6 7 r1 r2 d1 r3 d2 d3 d4 Stego image i : is block number; w : is data embedding position : Changes bits (once)

Proposed scheme(5/10)— Extraction Size: 7 7 pixels Stego image 167 166 163 162 165 1 LSB

Secret position: k=5 (using key) Proposed scheme(6/10)— Extraction Secret position: k=5 (using key) Position Number: 1 2 3 4 5 6 7 r1 r2 d1 r3 d2 d3 d4 1 2 3 4 5 6 7 r1 r2 d1 r3 d2 d3 d4 1

Proposed scheme(7/10)— Extraction Secret message bits: s =1 ….. Error position: 1 2 3 4 5 6 7 r1 r2 d1 r3 d2 d3 d4 Error position: 2

Proposed scheme(8/10)— Extraction Secret message bits: s =1 1 ….. Error position: 1 2 3 4 5 6 7 r1 r2 d1 r3 d2 d3 d4 1 Error position: 4

Proposed scheme(9/10)— Extraction Secret position k Data embedding position w Secret message s (r1,r2,r3) data 1 2 3 4 5 6 7 r1 r2 d1 r3 d2 d3 d4 1/0 0/1 5 (010)=2 s=1 0/1 1/0 2 (100)=4 s=1 1/0 0/1 4 (110)=6 s=0 Secret message bits: s =1 1 0 0 1 1 1 0/1 1/0 6 (010)=2 s=0 1/0 1/0 2 (100)=4 s=1 1/0 1/0 4 (010)=2 s=1 1/0 1/0 2 (110)=6 s=1

Proposed scheme(10/10)— Recovery 2 3 4 5 6 7 r1 r2 d1 r3 d2 d3 d4 1 2 3 4 5 6 7 r1 r2 d1 r3 d2 d3 d4 Recovered cover image

Experiments(1/6)--- PSNRs of Stego images

Experiments(2/6)

Experiments(3/6)

Experiments(4/6)- RS analysis

Experiments(5/6)- Relative entropy

Experiments(6/6)- Standard Deviation and Correlation Coefficient

Conclusions Introduce shared secret key and modify shared secret key to enhance the security Partial reversible data hiding Achieve visual quality of stego images are better than others.

Thanks!