Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp

Slides:



Advertisements
Similar presentations
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
Advertisements

1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
多媒體網路安全實驗室 Source:International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH- MSP),2010 Sixth. Authors:Hsiang-Cheh.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Piyu Tsia,Yu-Chen Hu,Hsiu-Lien Yen Signal Processing 日期 :1 月 4 號 報告者 : 許睿中.
Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Improved PVO-based reversible data hiding Source: Digital Signal Processing, 2014 Authors: Fei Peng, Xiaolong Li,ng Reporter: Min-Hao Wu.
Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
Reversible Image Watermarking Using Interpolation Technique Source: IEEE Transcation on Information Forensics and Security, Vol. 5, No. 1, March 2010 Authors:
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
Data hiding in Least Significant Bit (LSB) Speaker: Feng Jen-Bang ( 馮振邦 )
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Palette Partition Based Data Hiding for Color Images Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, and Chien-Ting Huang Speaker : Yu-Chiang Li.
A lossless data hiding scheme based on three- pixel block differences Ching-Chiuan Lin and Nien-Lin Hsueh Pattern Recognition, Vol. 41(4), April 2008 Pages.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
1 Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems Adviser: Chih-Hung Lin Speaker : Chia-Wei Chang Date:2009/10/06.
多媒體網路安全實驗室 Source: IEICE Trans. Fundamentals, Vol. E90-A, No. 4, April 2007, pp Authors:Hong Lin Jin, Masaaki Fujiyoshi, Hitoshi Kiya Speaker:Cheng.
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
Palette Partition Based Data Hiding for Color Images
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Information Steganography Using Magic Matrix
Reversible data hiding scheme based on significant-bit-difference expansion Sourse: IET Image Processing ( Volume: 11, Issue: 11, ), Pages 1002.
Embedding Secrets Using Magic Matrices
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
A Restricted Region-based Data-hiding Scheme
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source : Signal Processing, vol. 126, pp ,  November 2016
Skewed Histogram Shifting for Reversible Data Hiding using a Pair of Extreme Predictions Source: IEEE Transactions on Circuits and Systems for Video Technology(
Reversible Data Hiding Scheme Using Two Steganographic Images
Information Steganography Using Magic Matrix
Source:. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL
Source: IEEE Access, Vol. 6, Dec. 2017, pp
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
A reversible and secure patient information hiding system for IoT driven e-health Source : International Journal of Information Management, Available online.
Source : Journal of Visual Communication and Image Representation, vol
Data hiding method using image interpolation
Skewed Histogram Shifting for Reversible Data Hiding using a Pair of Extreme Predictions Source: IEEE Transactions on Circuits and Systems for Video Technology(
Dynamic embedding strategy of VQ-based information hiding approach
Source : Journal of Visual Communication and Image Representation, vol
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Data hiding method using image interpolation
Partial reversible data hiding scheme using (7, 4) hamming code
Novel Multiple Spatial Watermarking Technique in Color Images
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection Source: Multimedia.
Source: IEICE-Transactions on Info and Systems
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Information Hiding Techniques Using Magic Matrix
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Dynamic improved pixel value ordering reversible data hiding
Steganographic Systems for Secret Messages
Lossless Data Hiding in the Spatial Domain for High Quality Images
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
A Restricted Region-based Data-hiding Scheme
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Adopting secret sharing for reversible data hiding in encrypted images
Presentation transcript:

Improving histogram-based reversible data hiding by interleaving predictive Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp.223-234 Authors : C.-H. Yang and M.-H. Tsai Speaker : Hon-Hang Chang Date : 2010/12/01

Outline Introduction Related work Proposed method Experiment results Conclusion

- = + = Introduction Histogram Difference Array D Cover image Predicted image + = Predicted image Stego-image Difference Array D’ Embed the secret bit 0 or 1

Related work D D D H Stego-image 62 56 63 60 61 59 58 55 57 x 6 7 3 2 Lin et al.’s method 62 56 63 60 61 59 58 55 57 x 6 7 3 2 1 4 x 7 8 4 3 1 5 x 7 8 4 3 1 2 5 Shift Embed D D D H Shift 63 56 64 60 62 59 58 54 55 Stego-image

Related work (Cont.) D D D Stego-image H x 7 8 4 3 1 2 5 x 7 8 4 3 1 5 Lin et al.’s method x 7 8 4 3 1 2 5 x 7 8 4 3 1 5 x 6 7 3 2 1 4 Extract Shift 63 56 64 60 62 59 58 54 55 D D D Stego-image 62 56 63 60 61 59 58 55 57 Shift H

Proposed method H D 5 4 6 3 2 5 1 4 -1 6 -2 3 Embedding in odd columns D1,1=H1,1-H1,2=5-5=0 5 4 6 3 2 5 1 4 -1 6 -2 3 D1,3=H1,3- ˻(H1,2+H1,4)/2˼ =5- 4= 1 D1,3=H1,5- H1,4 =4- 4= 0 H D Odd columns (Predicted pixels) Even columns(Sample pixels) D’s Histogram

Proposed method(Cont.) Embedding in odd columns 5 1 4 -1 6 -2 3 Podd1=0 Podd2=-1 Zodd1=2 Podd2=-3 D D’s Histogram 5 2 4 -1 6 -3 3 Shift Shift D D’s Histogram after shifting

Proposed method(Cont.) Embedding in odd columns Embed secret bit 0, no change!! Secret bits I: 01110011001 W1,1=W1,2+D1,1=5+0=5 W1,3=˻(W1,2+W1,4)/2˼+D1,3=4+2=6 W1,5=W1,4+D1,5=4+1=5 D’s Histogram after shifting Embed secret bit 1, changed to Podd2-1 or Podd1+1!! 5 6 4 3 1 5 2 4 -1 6 -3 3 5 2 4 1 -2 6 -1 -3 3 Embed Stego-image W1 D D

Proposed method(Cont.) Embedding in even columns 5 6 4 3 1 D1,2=H1,2- ˻(H1,1+H1,3)/2˼ =5- 5= 0 5 6 -1 4 3 2 1 -2 D1,4=H1,4- ˻(H1,3+H1,5)/2˼ =4-5=-1 W1 D Odd columns (Sample pixels ) Even columns(Predicted pixels) D’s Histogram

Proposed method(Cont.) 5 6 -1 4 3 2 1 -2 Embedding in even columns Shift Shift Podd1=2 Podd2=-1 Zodd1=4 Zodd2=-3 D D’s Histogram 5 6 -1 4 3 2 1 -3 D D’s Histogram after shifting

Proposed method(Cont.) Embedding in even columns Embed secret bit 0, no change!! Secret bits II: 01101 W1,2=˻(W1,1+W1,3)/2˼+D1,2=5+0=5 W1,4=˻(W1,3+W1,5)/2˼+D1,4 =5+(-1)=4 D’s Histogram after shifting Embed secret bit 1, changed to Podd2-1 or Podd1+1!! 5 6 4 7 3 1 2 5 6 -1 4 3 2 1 -3 5 6 -1 4 3 1 2 -2 -3 Embed Stego-image W2 D D

Proposed method(Cont.) D1,2= W1,2 -˻(W1,1+W1,3)/2˼ =5-5=0 D1,4= W1,4 -˻(W1,3+W1,5)/2˼ =4-5=-1 Extracting in even columns 5 6 -1 4 3 1 2 -2 -3 5 6 4 7 3 1 2 Podd1=2 Podd2=-1 D’s Histogram Zodd1=4 Zodd2=-3 Stego-image W2 D 5 6 -1 4 3 2 1 -2 5 6 4 3 1 D’s Histogram D Secret bits II: 01101 Stego-image W1

Proposed method(Cont.) D1,1=W1,1-W1,2=5-5=0 D1,3= W1,3 -˻(W1,2+W1,4)/2˼=6-4=2 D1,5=W1,5-W1,4=5-4=1 Extracting in odd columns 5 2 4 1 -2 6 -1 -3 3 5 6 4 3 1 Podd1=0 Podd2=-1 D’s Histogram Zodd1=2 Zodd2=-3 D Stego-image W1 5 4 6 3 2 5 1 4 -1 6 -2 3 D H Secret bits I: 01110011001 D’s Histogram

Proposed method(Cont.) Other predictive methods Figure 1 Chessboard with white pixels and black pixels

Experiment results Tabel 1 Compassion between the Lin’s method [4], Lin’smethod [5], Hsiao’s method [8] and our schemes with thechessboard interleaving prediction

Experiment results Table 2 Comparison of capacity, shifting numbers, changing numbers and PSNR values

Conclusion The proposed method achieve the larger capacity, but also keep the image quality better.