Dynamic improved pixel value ordering reversible data hiding

Slides:



Advertisements
Similar presentations
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
Advertisements

1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Reversible data hiding based on histogram shifting scheme Reporter: Date: Wan-Yu Lu 2012/12/13.
Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
A lossless data hiding scheme based on three- pixel block differences Ching-Chiuan Lin and Nien-Lin Hsueh Pattern Recognition, Vol. 41(4), April 2008 Pages.
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
Advisor: Chin-Chen Chang Student: Thai-Son Nguyen
(k, n)-Image Reversible Data Hiding
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Source: IEEE Transactions on Circuits and Systems for Video Technology Vol.26.
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
Image camouflage by reversible image transformation
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source :Journal of visual Communication and Image Representation
Reversible data hiding scheme based on significant-bit-difference expansion Sourse: IET Image Processing ( Volume: 11, Issue: 11, ), Pages 1002.
Mean value based reversible data hiding in encrypted images
Source: J. Vis. Commun. Image R. 41 (2016) 58–64
Source : Signal Processing, vol. 150, pp ,  September 2018
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images Source: Symmetry, vol. 8, no. 6, June.
An efficient reversible data hiding method for AMBTC compressed images
Source: Information Sciences, 2018, accpeted.
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source : Signal Processing, vol. 126, pp ,  November 2016
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Skewed Histogram Shifting for Reversible Data Hiding using a Pair of Extreme Predictions Source: IEEE Transactions on Circuits and Systems for Video Technology(
Improved joint reversible data hiding in encrypted images
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Source: Signal Processing: Image Communication 64 (2018) 78-88
Source:. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL
Source: Signal Processing, Vol. 125, pp , August 2016.
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
A reversible and secure patient information hiding system for IoT driven e-health Source : International Journal of Information Management, Available online.
Source : Journal of Visual Communication and Image Representation, vol
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Skewed Histogram Shifting for Reversible Data Hiding using a Pair of Extreme Predictions Source: IEEE Transactions on Circuits and Systems for Video Technology(
Dynamic embedding strategy of VQ-based information hiding approach
Source : Journal of Visual Communication and Image Representation, vol
Sourse: Multimedia Tools and Applications, 2018, pp 1–17
Partial reversible data hiding scheme using (7, 4) hamming code
High-fidelity reversible data hiding based on pixel-value-ordering and pairwise prediction-error expansion Source: Journal of Visual Communication and.
High Capacity Data Hiding for Grayscale Images
Data hiding method using image interpolation
Partial reversible data hiding scheme using (7, 4) hamming code
New Framework for Reversible Data Hiding in Encrypted Domain
Novel Multiple Spatial Watermarking Technique in Color Images
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
Blind Reversible Authentication Based on PEE and CS Reconstruction
Source: Signal Processing Volume 111 June 2015, Pages
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Pairwise IPVO-Based Reversible Data Hiding
Sourse: Information Sciences, Vol. 494, pp , August 2019
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Source : Digital Signal Processing. Vol. 73, pp , Feb
Lossless Data Hiding in the Spatial Domain for High Quality Images
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
Rich QR Codes With Three-Layer Information Using Hamming Code
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Adopting secret sharing for reversible data hiding in encrypted images
Reversible data hiding in encrypted binary images by pixel prediction
Presentation transcript:

Dynamic improved pixel value ordering reversible data hiding Source : Information Sciences, vol. 489, pp. 136-154,  July 2019 Authors : Shaowei Weng, YunQing Shi, Wien Hong and Ye Yao Speaker : Chia-Shou Shih Date : 2019/07/25 1

Outline Introduction Related work Proposed method Experimental results Conclusions 2

Introduction Smooth area IPVO: The proposed method: 3 50 50 8 secret bits The proposed method: 50 > 8 secret bits 3

Introduction Complex area IPVO: The proposed method: 4 45 49 53 67 55 58 63 72 61 66 68 74 70 77 82 44 49 52 67 55 59 63 73 60 66 74 70 75 77 83 The proposed method: 45 49 53 67 55 58 63 72 61 66 68 74 70 77 82 44 49 53 67 55 58 63 72 61 66 68 74 70 77 83 4

Related work-Improved Pixel Value Ordering(IPVO) PVO: d = 1 IPVO: d = 0 or 1 max 𝑥 ′ =𝑥 𝑖𝑓 𝑑=0 𝑥 ′ =𝑥+𝑏 𝑖𝑓𝑑=1 𝑥 ′ =𝑥+1 𝑖𝑓𝑑>1 min 𝑥 ′ =𝑥 𝑖𝑓 𝑑=0 𝑥 ′ =𝑥−𝑏 𝑖𝑓𝑑=1 𝑥 ′ =𝑥−1 𝑖𝑓𝑑>1 max 𝑥 ′ =𝑥+𝑏 𝑖𝑓 𝑑=1 𝑥 ′ =𝑥+1 𝑖𝑓 𝑑>1 𝑥 ′ =𝑥+𝑏 𝑖𝑓 𝑑=0 𝑥 ′ =𝑥+1 𝑖𝑓 𝑑<0 min 𝑥 ′ =𝑥−𝑏 𝑖𝑓 𝑑=1 𝑥 ′ =𝑥−1 𝑖𝑓 𝑑>1 𝑥 ′ =𝑥−𝑏 𝑖𝑓 𝑑=0 𝑥 ′ =𝑥−1 𝑖𝑓 𝑑<0 5

Related work-Improved Pixel Value Ordering(IPVO) max 𝑥 ′ =𝑥+𝑏 𝑖𝑓 𝑑=1 𝑥 ′ =𝑥+1 𝑖𝑓 𝑑>1 𝑥 ′ =𝑥+𝑏 𝑖𝑓 𝑑=0 𝑥 ′ =𝑥+1 𝑖𝑓 𝑑<0 min 𝑥 ′ =𝑥−𝑏 𝑖𝑓 𝑑=1 𝑥 ′ =𝑥−1 𝑖𝑓 𝑑>1 𝑥 ′ =𝑥−𝑏 𝑖𝑓 𝑑=0 𝑥 ′ =𝑥−1 𝑖𝑓 𝑑<0 6

Proposed method 7 Classification of smoothness by pixel neighborhood Data embedding with IPVO Original image Stego image 7

Proposed method 1≤𝑡≤𝑚 c r 8 𝑛=𝑟∗𝑐 𝑡=𝑡𝑎𝑟𝑔𝑒𝑡 𝑏𝑙𝑜𝑐 𝑘 ′ 𝑠 𝑠𝑚𝑜𝑜𝑡ℎ 𝑙𝑒𝑣𝑒𝑙 𝑚= (𝑛−1)/2 c r 1≤𝑡≤𝑚 Original image Target block 8

Proposed method 𝑡=1 𝑡+1 & (𝑛−𝑡) n=3*3 9 82 81 89 93 96 95 94 98 99 82 𝑡+1 & (𝑛−𝑡) 82 81 89 93 96 95 94 98 99 82 81 89 95 96 93 94 98 99 81 82 89 93 94 95 96 98 99 82-81 d=1 98-99 d=-1 81 82 89 93 94 95 96 98 99 Secret bit = 0 82 81 89 93 96 95 94 98 100 81 82 89 93 94 95 96 98 100 9

Proposed method 𝑡=2 𝑡+1 & (𝑛−𝑡) n=3*3 10 82 81 93 98 95 94 97 99 82 81 𝑡+1 & (𝑛−𝑡) 82 81 93 98 95 94 97 99 82 81 95 98 93 94 97 99 81 82 93 94 95 97 98 99 -1 1 -2 81 82 93 94 95 97 98 99 Secret bit = 0 81 80 82 93 98 95 94 97 100 Secret bit = 1 80 81 82 93 94 95 97 98 100 10

Proposed method 𝑡=4 𝑡+1 & (𝑛−𝑡) n=3*3 11 79 77 76 78 73 79 77 76 78 73 𝑡+1 & (𝑛−𝑡) 79 77 76 78 73 79 77 76 78 73 73 76 77 78 79 4 1 1 -1 2 -2 73 76 77 78 79 Secret bit = 010 Secret bit = 1 80 77 76 78 79 75 72 72 76 75 77 78 79 80 11

Proposed method-extract and recover 𝑡=4 n=3*3 𝑡+1 & (𝑛−𝑡) 80 77 76 78 79 75 72 80 77 78 76 79 75 72 72 75 76 77 78 79 80 𝑑=−1 →𝑏=1 𝑑=0 → 𝑏=0 𝑑=1 → 𝑏=0 𝑑=2 → 𝑏=1 5 2 1 -1 -2 3 -3 Secret bit = 0101 72 75 76 77 78 79 80 b=1 b=0 b=0 79 77 76 78 73 b=1 73 76 77 78 79 12

Experimental results Weng et al.’s Alg: S.W. Weng, J.-S. Pan, L.D. Li “Reversible data hiding based on an adaptive pixel-embedding strategy and two-layer embedding” Inf. Sci., 369 (2016), pp. 144-159 Ou et al’s Alg: B. Ou, X.L. Li, Y. Zhao, R.R. Ni “Reversible data hiding using invariant pixel-value-ordering and prediction-error expansion” Signal Process. Image Commun., 29 (7) (2014), pp. 198-205 Peng et al.’s Alg: F. Peng, X.L. Li, B. Yang “Improved pvo-based reversible data hiding” Digit. Signal Process., 25 (2014), pp. 255-265 Sachnev et al.’s Alg: V. Sachnev, H.J. Kim, J. Nam, S. Suresh, Y.Q. Shi “Reversible watermarking algorithm using sorting and prediction” IEEE Trans. Circuits Syst. Video Technol., 19 (7)(2009), pp. 989-999 13

Experimental results 14

Conclusions Dynamic IPVO RDH method Partition the local complexity into m+1 levels 15

-END- 16