High Capacity Data Hiding for Grayscale Images

Slides:



Advertisements
Similar presentations
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Advertisements

Reversible Data Hiding Based on Two-Dimensional Prediction Errors
A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan.
Piyu Tsia,Yu-Chen Hu,Hsiu-Lien Yen Signal Processing 日期 :1 月 4 號 報告者 : 許睿中.
Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Palette Partition Based Data Hiding for Color Images Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, and Chien-Ting Huang Speaker : Yu-Chiang Li.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
多媒體網路安全實驗室 Source: IEICE Trans. Fundamentals, Vol. E90-A, No. 4, April 2007, pp Authors:Hong Lin Jin, Masaaki Fujiyoshi, Hitoshi Kiya Speaker:Cheng.
人力資源報告 Image and Signal Processing 1 Steganography Using Sudoku Revisited Wien Hong, Tung-Shou Chen, Chih-Wei Shiu Department of Information Management,
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
基於龜殼魔術矩陣的隱寫技術及其衍生的研究問題
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Information Hiding Technology: Current Research and Future Trend
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
A steganographic method for digital images using side match
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
Reversible Information Hiding Techniques for Digital
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Information Steganography Using Magic Matrix
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Chair Professor Chin-Chen Chang Feng Chia University
High-capacity image hiding scheme based on vector quantization
A Digital Watermarking Scheme Based on Singular Value Decomposition
A Digital Watermarking Scheme Based on Singular Value Decomposition
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images Source: Symmetry, vol. 8, no. 6, June.
Hiding Data in a Color Palette Image with Hybrid Strategies
A Study of Digital Image Coding and Retrieving Techniques
Embedding Secrets Using Magic Matrices
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
A Restricted Region-based Data-hiding Scheme
Some Novel Steganographic Methods for Digital Images
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding Scheme Using Two Steganographic Images
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Information Steganography Using Magic Matrix
Data hiding based Hamming code
Data hiding method using image interpolation
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Partial reversible data hiding scheme using (7, 4) hamming code
Chair Professor Chin-Chen Chang Feng Chia University
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Data hiding method using image interpolation
Chair Professor Chin-Chen Chang Feng Chia University
Partial reversible data hiding scheme using (7, 4) hamming code
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection Source: Multimedia.
Source: IEICE-Transactions on Info and Systems
A Data Hiding Scheme Based Upon Block Truncation Coding
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Information Hiding Techniques Using Magic Matrix
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Recent Developments in Information Hiding
Steganographic Systems for Secret Messages
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Lossless Data Hiding in the Spatial Domain for High Quality Images
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Reversible data hiding in encrypted binary images by pixel prediction
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

High Capacity Data Hiding for Grayscale Images Author: Chin-Chen Chang, Yung-Chen Chou and The Duc Kieu Speaker: Yung-Chen Chou

Outline Introduction Zhang and Wang’s method The proposed method Experimental result Conclusions Yung-Chen Chou

Introduction Sender Receiver Stego-Image Stego-Image Host Image Secret data: 01110101 Secret data: 01110101 Yung-Chen Chou

Introduction (cont.) Data hiding: Requirement: Spatial domain Frequency domain Compression domain Requirement: Low distortion High capacity Yung-Chen Chou

Zhang and Wang’s method 12 19 15 23 79 54 55 11 20 21 24 10 9 Translate binary secret message to (2n+1)-ary notification system image Secret data: 011101011… 01112  125 01012  105 Yung-Chen Chou

Zhang and Wang’s method (cont.) Extracting function: n=2 19 12 19 13 12 19 15 23 79 54 55 11 20 21 24 10 9 f(13,19)=(13+19*2) mod 5 = 1 f(11,19)=(11+19*2) mod 5 = 4 f(12,19)=(12+19*2) mod 5 = 0 f(12,18)=(12+18*2) mod 5 = 3 f(12,20)=(12+20*2) mod 5 = 2 19 13 11 18 12 20 image x1 x2 …11 12 13… 1 3 4 2 : 20 19 18 Secret data: 01112  125 Yung-Chen Chou

Zhang and Wang’s method (cont.) 2 x1 x2 …14 15 16… 3 1 4 : 22 21 20 n=2 13 19 15 21 79 54 55 11 20 12 24 10 9 21 15 f(16,21)=(16+21*2) mod 5 = 3 f(14,21)=(14+21*2) mod 5 = 1 f(15,21)=(15+21*2) mod 5 = 2 f(15,20)=(15+20*2) mod 5 = 0 f(15,22)=(15+22*2) mod 5 = 4 21 16 14 20 15 22 image Low embedding rate Secret data: 01112  125 Yung-Chen Chou

The proposed method Magic matrix construction Extracting function: f(0,0)=(0+0*2) mod 5 = 0 f(1,0)=(1+0*2) mod 5 = 1 : f(2, 1)=(2+1*2) mod 5 = 4 : f(3,252)=(3+252*2) mod 5 = 2 : f(252,3)=(252+3*2) mod 5 = 3 : Yung-Chen Chou

The proposed method (cont.) x1 = 2 x2 = 255-x1 = 253 2 3 15 23 79 54 55 11 20 21 12 24 10 9 4 x1=3 x2=255-x1 = 252 Secret data: 011101011… 01112  125 01012  105 image Yung-Chen Chou

The proposed method (cont.) Data extraction f(4, 255-4) = (4+251*2) mod 5 = 1 4 3 15 23 79 54 55 11 20 21 12 24 10 9 f(3, 255-3) = (3+252*2) mod 5 = 2 Stego-image 125=01112 Yung-Chen Chou

Experimental Results The proposed method embeds two secret bits per pixel Zhang and Wang’s method using two pixels to embed two secret bits Yung-Chen Chou

Experimental results Original image Stego-image with 524288 bits secret message Yung-Chen Chou

Conclusions The proposed method embeds one digit into one pixel. We provide a simple and efficient data embedding method to achieve secret message delivery purpose with high capacity. Yung-Chen Chou