De-clustering and Its Application to Steganography

Slides:



Advertisements
Similar presentations
A Secret Information Hiding Scheme Based on Switching Tree Coding Speaker: Chin-Chen Chang.
Advertisements

Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
1 An Efficient VQ-based Data Hiding Scheme Using Voronoi Clustering Authors:Ming-Ni Wu, Puu-An Juang, and Yu-Chiang Li.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
基於龜殼魔術矩陣的隱寫技術及其衍生的研究問題
影像偽裝術 Dr. Chin-Chen Chang
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Information Hiding Technology: Current Research and Future Trend
Visual Secret Sharing Chair Professor Chin-Chen Chang (張真誠)
A Secret Information Hiding Scheme Based on Switching Tree Coding
Data Mining and Its Applications to Image Processing
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
The Recent Developments in Visual Cryptography
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Information Steganography Using Magic Matrix
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Chair Professor Chin-Chen Chang Feng Chia University
Chair Professor Chin-Chen Chang Feng Chia University
Advisor: Chin-Chen Chang1, 2 Student: Wen-Chuan Wu2
指導教授: Chang, Chin-Chen (張真誠)
Chair Professor Chin-Chen Chang Feng Chia University
A Data Hiding Scheme Based Upon Block Truncation Coding
第七章 資訊隱藏 張真誠 國立中正大學資訊工程研究所.
Hiding Data in a Color Palette Image with Hybrid Strategies
A Study of Digital Image Coding and Retrieving Techniques
Embedding Secrets Using Magic Matrices
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
An Innovative Steganographic Scheme Based on Vector Quantization
A Restricted Region-based Data-hiding Scheme
An Innovative Steganographic Scheme Based on Vector Quantization
The New Developments in Visual Cryptography
Some Novel Steganographic Methods for Digital Images
Reversible Data Hiding Scheme Using Two Steganographic Images
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Information Steganography Using Magic Matrix
A Data Hiding Method for Text Documents Using Multiple-Base Encoding
Data hiding method using image interpolation
Dynamic embedding strategy of VQ-based information hiding approach
Chair Professor Chin-Chen Chang Feng Chia University
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Hiding Information in VQ Index Tables with Reversibility
Information Hiding and Its Applications
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
Chair Professor Chin-Chen Chang Feng Chia University
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
A Virtual Image Cryptosystem Based upon Vector Quantization
Chair Professor Chin-Chen Chang Feng Chia University
Partial reversible data hiding scheme using (7, 4) hamming code
A Data Hiding Scheme Based Upon Block Truncation Coding
資訊偽裝術 張真誠 講座教授 多媒體暨網路安全實驗室
Information Hiding Techniques Using Magic Matrix
Recent Developments in Information Hiding
My Research Projects Chair Professor Chin-Chen Chang (張真誠)
Steganographic Systems for Secret Messages
High-capacity Reversible Data-hiding for LZW Codes
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

De-clustering and Its Application to Steganography Chair Professor Chin-Chen Chang (張真誠) Feng Chia University National Chung Cheng University National Tsing Hua University http://msn.iecs.fcu.edu.tw/~ccc

Data Hiding Hiding system Stego image Cover image 1 0 1 0 1 0 0 1 0 1 1 1 1 0 0 Secret message

Cover Carriers Image Video Sound Text

VQ Encoding Index table Original Image Codebook … (120,155,…,80) 1 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 (90,135,…,120) (100,125,…,150) … Index table Original Image (49,117,…,25) (50,42,…,98) (20,65,…,110) Codebook

Previous Work of Steganography on VQ To find the closest pairs

d(CW0, CW8) > TH d(CW13, CW14) > TH Unused CW0, CW8, CW13, CW14

Encode Index Table CW0, CW8, CW13, CW14 Unused Index Table Original Image Index Table Unused CW0, CW8, CW13, CW14

A secret message: 1 0 1 0 1 0 0 1 0 1 1 1 1 0 0 1 1 1 1 1 1 1 1 Index Table Secret bits CW1, CW2, CW4, CW5 CW6, CW7 CW11, CW3 CW15, CW10 CW12, CW9 1

A secret message: 1 0 1 0 1 0 0 1 0 1 1 1 1 0 0 1 1 1 1 1 1 1 1 Index Table Secret bits CW1, CW2, CW4, CW5 CW6, CW7 CW11, CW3 CW15, CW10 CW12, CW9 1

A secret message: 1 0 1 0 1 0 0 1 0 1 1 1 1 0 0 1 1 1 1 1 1 1 1 Index Table Secret bits

Drawback of the Previous Work Irreversible Original index values can not be recovered after extraction

Find the most dissimilar pairs (De-clustering) … CW1 CW8 CW2 CW9 CW3 CW10 CW4 CW11 CW5 CW12 CW6 CW13 CW7 CW14 1 Dissimilar

Encode Index Table Original Image

Embedding Using Side-Match CW1 CW8 :Dissimilar Pair Assume X = CW1 V0 = ((U13+L4)/2, U14, U15, U16, L8, L12, L16) V1 = (X1, X2, X3, X4, X5, X9, X13)CW1 V8 = (X1, X2, X3, X4, X5, X9, X13)CW8 d1=Euclidean_Distance(V0, V1) d8=Euclidean_Distance(V0, V8) If (d1<d8), then Block X is replaceable Otherwise, Block X is non-replaceable

CW1 CW8 :Dissimilar Pair V0 = ((129+131)/2, 137, 132, 131, 131, 134, 140) = (130, 137, 132, 131, 131, 134, 140)

V0 = (130, 137, 132, 131, 131, 134, 140) (128,136,130,130,129,?,?,?,125,?,?,?,142,?,?,?) V1 = (128, 136, 130, 130, 129, 125, 142) d1=Euclidean_Distance(V0, V1) =((130-128)2+(137-136)2+(132-130)2+(131-130)2+ (131-129)2+(134-125)2+(140-142)2)1/2 =4.36 Codebook

Here, d1 < d8 => So block X is replaceable V0 = (130, 137, 132, 131, 131, 134, 140) d1=4.36 (2, 19, 43, 56, 9, ?, ?, ?, 30, ?, ?, ?, 12, ?, ?, ?) V8 = (2, 19, 43, 56, 9, 30, 12) d8=Euclidean_Distance(V0, V8) =((130-2)2+(137-19)2+(132-43)2+(131-56)2+ (131-9)2+(134-30)2+(140-12)2)1/2 =293.15 Here, d1 < d8 => So block X is replaceable Codebook

A secret message: 1 0 1 0 1 0 0 1 0 1 1 1 1 0 0 0 1 1 1 1 1 1 1 1 Secret bits Index Table If (d6<d13) CW1, CW2, CW3, CW4 CW5, CW6 CW7 , CW15 CW8, CW9 CW10, CW11 CW12, CW13 CW14 , CW0 6 Embedding Result 1

A secret message: 1 0 1 0 1 0 0 1 0 1 1 1 1 0 0 0 1 1 1 1 1 1 1 1 Secret bits Index Table If (d2<d9) CW1, CW2, CW3, CW4 CW5, CW6 CW7, CW15 CW8, CW9 CW10, CW11 CW12, CW13 CW14 , CW0 6 9 Embedding Result 1

A secret message: 1 0 1 0 1 0 0 1 0 1 1 1 1 0 0 0 1 1 1 1 1 1 1 1 Secret bits Index Table If (d12>=d5) CW1, CW2, CW3, CW4 CW5, CW6 CW7 , CW15 CW8, CW9 CW10, CW11 CW12, CW13 CW14 , CW0 6 9 15||12 Embedding Result 1 CW15: embed 1

A secret message: 1 0 1 0 1 0 0 1 0 1 1 1 1 0 0 0 1 1 1 1 1 1 1 1 Secret bits Index Table If (d9>=d2) CW1, CW2, CW3, CW4 CW5, CW6 CW7 , CW15 CW8, CW9 CW10, CW11 CW12, CW13 CW14 , CW0 6 9 15||12 0||9 Embedding Result 1 CW0: embed 0

Steganographic Index Table Extraction and Recovery 6 9 15||12 0||9 1 Extract Secret bits Steganographic Index Table If (d6<d13) CW1, CW2, CW3, CW4 CW5, CW6 CW7 , CW15 CW8, CW9 CW10, CW11 CW12, CW13 CW14 , CW0 6 Recovery 1

Steganographic Index Table Extraction and Recovery 6 9 15||12 0||9 1 Extract Secret bits Steganographic Index Table If (d9>=d2) CW1, CW2, CW3, CW4 CW5, CW6 CW7 , CW15 CW8, CW9 CW10, CW11 CW12, CW13 CW14 , CW0 6 2 Recovery 1

Steganographic Index Table Extraction and Recovery 6 9 15||12 0||9 1 1 Extract Secret bits Steganographic Index Table CW1, CW2, CW3, CW4 CW5, CW6 CW7 , CW15 CW8, CW9 CW10, CW11 CW12, CW13 CW14 , CW0 6 2 12 Recovery 1

Steganographic Index Table Extraction and Recovery 6 9 15||12 0||9 1 1 Extract Secret bits Steganographic Index Table CW1, CW2, CW3, CW4 CW5, CW6 CW7 , CW15 CW8, CW9 CW10, CW11 CW12, CW13 CW14 , CW0 6 2 12 9 Recovery 1

How to find the dissimilar pairs? Codebook CW1 CW2 CW3 CW4 CW5 CW6 CW7 CW8 CW9 CW10 CW11 CW12 CW13 CW14

Codeword Distribution

Codeword Projection by PCA (Principle Component Analysis)

Find the Dissimilar Pairs

Experiments Codebook size: 512 Codeword size: 16 The number of original image blocks:128*128=16384 The number of non-replaceable blocks: 139

Experiments Codebook size: 512 Codeword size: 16 The number of original image blocks:128*128=16384 The number of non-replaceable blocks: 458

Conclusions A reversible VQ steganographic method is proposed Efficient and suitable for large payload

Thank you very much for your attention !!