Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, 2019. doi: 10.1109/ACCESS.2019.2903079.

Slides:



Advertisements
Similar presentations
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Advertisements

Reversible Data Hiding Based on Two-Dimensional Prediction Errors
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan.
Reversible watermarking Wu Dan Introduction Difference expansion Histogram bin shifting.
多媒體網路安全實驗室 Source:International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH- MSP),2010 Sixth. Authors:Hsiang-Cheh.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Reversible Data Hiding ECE643 Digital Image Processing (I) Course Project Professor: Yun Q. Shi Su Yu 12/02/2011.
Reversible data hiding based on histogram shifting scheme Reporter: Date: Wan-Yu Lu 2012/12/13.
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
Reversible Image Watermarking Using Interpolation Technique Source: IEEE Transcation on Information Forensics and Security, Vol. 5, No. 1, March 2010 Authors:
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
Reversible watermarking Wu Dan Introduction What?
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
Reversible Date Hiding Based on Histogram Modification of pixel Differences IEEE Transactions on circuits and systems for video technology, VOL. 19, NO.
A lossless data hiding scheme based on three- pixel block differences Ching-Chiuan Lin and Nien-Lin Hsueh Pattern Recognition, Vol. 41(4), April 2008 Pages.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
Advisor: Chin-Chen Chang Student: Thai-Son Nguyen
Source: IEEE Signal Processing Letters (Accepted)2016
(k, n)-Image Reversible Data Hiding
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Source: IEEE Transactions on Circuits and Systems for Video Technology Vol.26.
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
Image camouflage by reversible image transformation
Reversible Data Hiding in JPEG Images using Ordered Embedding
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Reversible data hiding scheme based on significant-bit-difference expansion Sourse: IET Image Processing ( Volume: 11, Issue: 11, ), Pages 1002.
Mean value based reversible data hiding in encrypted images
Source: J. Vis. Commun. Image R. 41 (2016) 58–64
Source : Signal Processing, vol. 150, pp ,  September 2018
Separable and error-free reversible data hiding in encrypted images
Source: Information Sciences, 2018, accpeted.
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source : Signal Processing, vol. 126, pp ,  November 2016
Skewed Histogram Shifting for Reversible Data Hiding using a Pair of Extreme Predictions Source: IEEE Transactions on Circuits and Systems for Video Technology(
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Improved joint reversible data hiding in encrypted images
Reversible Data Hiding
Reversible Data Hiding Scheme Using Two Steganographic Images
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Source:. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL
Source: Signal Processing, Vol. 125, pp , August 2016.
A reversible and secure patient information hiding system for IoT driven e-health Source : International Journal of Information Management, Available online.
Sourse: IEEE Transactions on Circuits and Systems for Video Technology
Reversible Data Hiding in JPEG Images
Source : Journal of Visual Communication and Image Representation, vol
Data hiding method using image interpolation
Skewed Histogram Shifting for Reversible Data Hiding using a Pair of Extreme Predictions Source: IEEE Transactions on Circuits and Systems for Video Technology(
Source : Journal of Visual Communication and Image Representation, vol
Sourse: Multimedia Tools and Applications, 2018, pp 1–17
High Capacity Data Hiding for Grayscale Images
Data hiding method using image interpolation
New Framework for Reversible Data Hiding in Encrypted Domain
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
Blind Reversible Authentication Based on PEE and CS Reconstruction
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection Source: Multimedia.
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Information Hiding Techniques Using Magic Matrix
Sourse: Information Sciences, Vol. 494, pp , August 2019
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Dynamic improved pixel value ordering reversible data hiding
Sourse: arXiv preprint, arXiv: , 2018 (Submit to IEEE Trans
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
Rich QR Codes With Three-Layer Information Using Hamming Code
Adopting secret sharing for reversible data hiding in encrypted images
Reversible data hiding in encrypted binary images by pixel prediction
Presentation transcript:

Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, 2019. doi: 10.1109/ACCESS.2019.2903079 Authors: J. Wang, X. Chen and Y. Shi Speaker: 李琳 Date: 2019.03.14

Outline Related Work Proposed Scheme Experiment Result Conclusions Histogram shifting (HS) Prediction-error Expansion (PEE) Proposed Scheme Experiment Result Conclusions

Related Works - HS (Ni et al. Method) 114 112 113 115 114 112 113 116 1 114 115 112 113 116 01001000 1 [17] Z. Ni, Y. Q. Shi, N. Ansari and W. Su, “Reversible data hiding," IEEE Trans. Circuits Syst. Video Technol., vol.16, no.3, pp.354-362, 2006. Peak bin Zero bin

Predict error after embedding Related Work -PEE -2 1 6 -3 7 Predict error e Cover Image I Predict Image I’ p1 embedding -3 2 1 7 -4 8 z1 Predict error after embedding Predict-error Histogram Stego Image I’’

Proposed Scheme: The aim of proposed scheme is to determine the unconstraint optimal side information.

Performance Evaluation for Conventional HS Based Embedding Process

A general optimization model to determine the optimal peak and zero bins as side information associated with minimum distortion:

Case 1: When the given payload is 4500 bits

Case 1: When the given payload is 4500 bits

12 / 29

Based on both examples, the superiority of "multilevel embedding" is demonstrated.

IV. RAPID PERFORMANCE EVALUATION OF MULTILEVEL EMBEDDING

16/29

The flowchart of rapid performance evaluation Calculate the accelerate shifting value Evaluate distortion D Add all those frequencies to acquire rate EC

V. AN EVOLUTIONARY ALGORITHM BASED EFFECTIVE SEARCH METHOD

To achieve an expected evolution: Way 1: selection, crossover and mutation(for a rapid search speed) Way 2: empirical modification(for small search step and controllable search direction)

Mutation: another unused one replace current one Crossover Selection: Roulette wheel selection (those one with less distortion to reproduce the next generation.)

EMBEDDING and EXTRACTING PROCESS Reservation for auxiliary information Aux(O) Cross set recovery, the rest hidden message stego-image, λ%, Aux(O), in the inverse order(Round set ), extract half of the secret message Rhombus prediction of Cross set extract the auxiliary information Aux(O) EXTRACTION Stego-pixels generation in the Cross set Stego-pixels generation in the Round set Optimal peak and zero bins selection Cross set embedding

Experiment Results [12] X. L. Li, B. Yang and T. Y. Zeng, “Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection," IEEE Trans.Image Process., vol.20, no.12, pp.3524-3533, 2011. [22] L. Luo, Z. Chen, M. Chen, X. Zeng and Z. Xiong, “Reversible image watermarking using interpolation technique," IEEE Trans. Inf. Forensics Security, vol.5, no.1, pp.187-193, 2010. [30] J. Wang, J. Ni, X. Zhang and Y. Shi, “Rate and distortion optimization for reversible data hiding using multiple histogram shifting," IEEE Trans. On Cybernetics, vol. 99, no. 1, pp. 1-12, 2017. [19] V. Sachnev, H. J. Kim, J. Nam, S. Suresh and Y. Q. Shi, “Reversible watermarking algorithm using sorting and prediction," IEEE Trans.Circuits Syst. Video Technol., vol.19, no.7, pp. 989-999, 2009. [27] G. Xuan, X. Tong, J. Teng, X. Zhang and Y. Q. Shi, “Optimal histogram pair and prediction-error based image reversible data hiding," Proc. Int. Workshop Digit.-Forensics Watermarking, Shanghai, China, pp. 368-383, 2012. [28] H. T. Wu and J. Huang, “Reversible image watermarking on prediction errors by efficient histogram modification”, SignalProcess., vol.92,no.12, pp. 3000-3009, 2012.

Conclusions 1. multilevel embedding based 2. expected performance at different payloads. 3. the computation complexity is reduced. 4. stable search 5. an affordable time cost

The major weakness of this paper: Bpp is too low, not to mention too much extra information to hide 2. High time complexity 3. GA may not find out a global optimal solution

Thank you for listening!