Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): 330-339 Authors:

Slides:



Advertisements
Similar presentations
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
Advertisements

1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A Secret Information Hiding Scheme Based on Switching Tree Coding Speaker: Chin-Chen Chang.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Phen-Lan Lin, Chung-Kai Hsieh, and Po-Whei Huang
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
Source: IEEE Signal Processing Letters (Accepted)2016
Palette Partition Based Data Hiding for Color Images
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Source: IEEE Transactions on Circuits and Systems for Video Technology Vol.26.
Der-Chyuan Lou and Jiang-Lung Liu,
Digital information encrypted in an image using binary encoding
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
Source : Signal Processing, Volume 133, April 2017, Pages
Reversible data hiding scheme based on significant-bit-difference expansion Sourse: IET Image Processing ( Volume: 11, Issue: 11, ), Pages 1002.
Chair Professor Chin-Chen Chang Feng Chia University
Mean value based reversible data hiding in encrypted images
Source: J. Vis. Commun. Image R. 41 (2016) 58–64
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images Source: Symmetry, vol. 8, no. 6, June.
Separable and error-free reversible data hiding in encrypted images
Hiding Data in a Color Palette Image with Hybrid Strategies
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
Source: Pattern Recognition, Vol. 38, Issue 11, December 2005, pp
Source: Information Sciences, 2018, accpeted.
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Improved joint reversible data hiding in encrypted images
Reversible Data Hiding Scheme Using Two Steganographic Images
Source: IEEE Access, Vol. 6, Dec. 2017, pp
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Data hiding method using image interpolation
Hiding Information in VQ Index Tables with Reversibility
Sourse: Multimedia Tools and Applications, 2018, pp 1–17
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
A new chaotic algorithm for image encryption
Digital Watermarking for Image Authentication with Localization
Data hiding method using image interpolation
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
Source: Signal Processing: Image Communication 16 (2001) pp
Partial reversible data hiding scheme using (7, 4) hamming code
Hiding Multiple Watermarks in Transparencies of Visual Cryptography
New Framework for Reversible Data Hiding in Encrypted Domain
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
Source: IEICE-Transactions on Info and Systems
Secret Image Sharing Based on Encrypted Pixels
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Pairwise IPVO-Based Reversible Data Hiding
Sourse: Information Sciences, Vol. 494, pp , August 2019
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Dynamic improved pixel value ordering reversible data hiding
Source : Digital Signal Processing. Vol. 73, pp , Feb
Sourse: arXiv preprint, arXiv: , 2018 (Submit to IEEE Trans
Lossless Data Hiding in the Spatial Domain for High Quality Images
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
A Quadratic-Residue-based Fragile Watermarking Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
Adopting secret sharing for reversible data hiding in encrypted images
Reversible data hiding in encrypted binary images by pixel prediction
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): 330-339 Authors: Ching-Chun Chang and Chang-Tsun Li Speaker: Jiang-Yi Lin Date: 2019-08-08

Outline Introduction Related Works Proposed scheme Experimental results Conclusions

Introduction (1/3) – Reversible data hiding in encrypted image (RDHEI) Encryption Key 𝐾 𝑒 Embedding Key 𝐾 𝑟 Encrypt the image Embedding Original image m Marked image Key 𝐾 𝑒 Secret data extraction Key 𝐾 𝑟 Image recover & Secret data extraction 𝐾 𝑒 , 𝐾 𝑟

Introduction (2/3) – Vacating room before Encryption Encryption Key 𝐾 𝑒 Embedding Key 𝐾 𝑟 Encrypt the image Embedding Vacating room Original image m Marked image Key 𝐾 𝑒 Secret data extraction Key 𝐾 𝑟 Image recover & Secret data extraction 𝐾 𝑒 , 𝐾 𝑟

Introduction (3/3) – Vacating room after Encryption Encryption Key 𝐾 𝑒 Embedding Key 𝐾 𝑟 Vacating room Encrypt the image Embedding Original image m Marked image Key 𝐾 𝑒 Secret data extraction Key 𝐾 𝑟 Image recover & Secret data extraction 𝐾 𝑒 , 𝐾 𝑟

Related work(1/1)- Lexicographic Permutations 1. Given an original sequence: {12, 1, 7} 2. Permute the original sequence and sort permutation lexicons. 3. For watermark encoding, substitute {12,1,7} with a sorted lexicon {7, 1, 12} to encode the digit ‘2’. {1, 7, 12}: 0 {1, 12, 7}: 1 {7, 1, 12}: 2 {7, 12, 1}: 3 {12, 1, 7}: 4 {12, 7, 1}: 5

Proposed scheme (1/8)-embedding Create the original sequence by the low nybbles of a pixel pair from the encrypted image. 109 98 59 …………. 163 16 129 212 174 149 …………. 146 85 60 113 25 117 ………..... 115 48 241 174 = (10101110)2, low nybble: (1110)2 = 14 85 = (01010101)2, low nybble: (0101)2 = 5 Original sequence: {14, 5} from (174, 85) Permutation lexicons : {5, 14}: 0 {14, 5}: 1 Pixels at the black positions are modifiable in terms of their low nybbles, whereas those at the white positions are unmodifiable.

Proposed scheme (2/8) -embedding To embed bit 0, substitute the lexicon {14, 5} with {5, 14} by modifying the low nybbles of the pixel pair. 109 98 59 …………. 163 16 129 212 165 149 …………. 146 94 60 113 25 117 ………..... 115 48 241 Encrypted image 165 = (1010 0101)2, low nybble: (0101)2 = 5 94 = (0101 1110)2, low nybble: (1110)2 = 14 So the original (174, 85) has been changed to (165, 94).

Proposed scheme (3/8)-Extraction According to the Lexicographic order, the secret bit can be error-free extracted. Encrypted image 109 98 59 …………. 163 16 129 212 165 149 …………. 146 94 60 113 25 117 ………..... 115 48 241 Encrypted image 165 = (1010 0101)2, low nybble: (0101)2 = 5 94 = (0101 1110)2, low nybble: (1110)2 = 14 Lexicographic order: 0 The embedded bit: 0 Low nybbles: {5, 14}

Proposed scheme (4/8) -Extraction Step 1: Receiver restores two candidate encrypted images. 109 98 59 …………. 163 16 129 212 174 149 …………. 146 85 60 113 25 117 ………..... 115 48 241 Low nybbles: {14, 5} 174 = (10101110)2 85 = (01010101)2, Low nybbles: {5, 14} 165 = (1010 0101)2 94 = (0101 1110)2 Encrypted image 1 109 98 59 …………. 163 17 129 212 165 149 …………. 146 94 61 113 25 117 ………..... 116 49 241 Encrypted image 2

Proposed scheme (5/8) -Extraction Step 2: Decrypt two candidate images using the decryption key(same as the encryption key). 97 104 98 …………. 116 117 118 106 100 102 …………. 116 118 121 108 112 101 ………..... 120 119 115 97 104 98 …………. 116 117 118 106 91 102 …………. 116 127 121 108 112 101 ………..... 120 119 115

Proposed scheme (6/8) -Extraction Step 3: A content-adaptive estimation is designed for assisting host pixel recovery. 97 104 98 …………. 116 117 118 106 100 102 …………. 116 118 121 108 112 101 ………..... 120 119 115 Candidate image 1 Origin version Error = Sum(|{100,118} – {99,119}|) = Sum({1,1}) = 2 97 104 98 …………. 116 117 118 106 91 102 …………. 116 127 121 108 112 101 ………..... 120 119 115 Candidate image 2 Error = Sum(|{91,127} – {99,119}|) = Sum({8,8}) = 16

Proposed scheme (7/8)-Predictor

Proposed scheme (8/8)- Enhance distinction Low nybbles: {5, 4} 85 = (0101 0101)2 84 = (0101 0100)2, Low nybbles: {4, 5} 84 = (01010100)2 85 = (01010101)2 Low nybbles: {5, 4} 85 = (01010101)2 84 = (01010100)2 Extraction Pixels={85,84}. e={5, 4}, N=16. p={3,7},q={11,7}. Suppose secret bit w=0. pu is coprime to N e'={5*7, 4*7} (mod N) = {35, 28} (mod N) ={3, 12}. Since w=0, e'={3, 12} keep intact. In the extraction phase. e'={3, 12} => w=0. For any permutations of e’ G = {{3, 12}*q0, {3, 12}*q1}={{1,4},{5,4}} GB={{1,4},{5,4}} Thus, candidate pixels={81,84} or {85,84} G0={3, 12}*11 (mod N) ={33, 132} (mod N) ={1,4} G1={3, 12}*7 (mod N) ={21,84} (mod N) ={5,4} {4, 5}: 0 {5, 4}: 1 {3, 12}: 0 {12, 3}: 1

Experimental results (1/2)

Experimental results (2/2)

CONCLUSIONS Utilize the Lexicographic Permutations for RDHEI. A Content-Adaptive Estimator for Prediction. Enhance Distinction.

Thank you for listening!