Reversible Data Hiding Based on Two-Dimensional Prediction Errors

Slides:



Advertisements
Similar presentations
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
Advertisements

A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan.
多媒體網路安全實驗室 Source:International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH- MSP),2010 Sixth. Authors:Hsiang-Cheh.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Improved PVO-based reversible data hiding Source: Digital Signal Processing, 2014 Authors: Fei Peng, Xiaolong Li,ng Reporter: Min-Hao Wu.
Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
Reversible Date Hiding Based on Histogram Modification of pixel Differences IEEE Transactions on circuits and systems for video technology, VOL. 19, NO.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
1 Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems Adviser: Chih-Hung Lin Speaker : Chia-Wei Chang Date:2009/10/06.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
1 LSB Matching Revisited Source: IEEE Signal Processing Letters (Accepted for future publication) Authors: Jarno Mielikainen Speaker: Chia-Chun Wu ( 吳佳駿.
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
Palette Partition Based Data Hiding for Color Images
An Information Hiding Scheme Using Sudoku
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Information Steganography Using Magic Matrix
Reversible data hiding scheme based on significant-bit-difference expansion Sourse: IET Image Processing ( Volume: 11, Issue: 11, ), Pages 1002.
Mean value based reversible data hiding in encrypted images
Source : Signal Processing, vol. 150, pp ,  September 2018
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images Source: Symmetry, vol. 8, no. 6, June.
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
A Restricted Region-based Data-hiding Scheme
Source: Information Sciences, 2018, accpeted.
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source : Signal Processing, vol. 126, pp ,  November 2016
Some Novel Steganographic Methods for Digital Images
Reversible Data Hiding Scheme Using Two Steganographic Images
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Information Steganography Using Magic Matrix
Source:. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL
Source: IEEE Access, Vol. 6, Dec. 2017, pp
Source: Signal Processing, Vol. 125, pp , August 2016.
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
Source : Journal of Visual Communication and Image Representation, vol
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Data hiding method using image interpolation
Dynamic embedding strategy of VQ-based information hiding approach
Source : Journal of Visual Communication and Image Representation, vol
Sourse: Multimedia Tools and Applications, 2018, pp 1–17
Partial reversible data hiding scheme using (7, 4) hamming code
High-fidelity reversible data hiding based on pixel-value-ordering and pairwise prediction-error expansion Source: Journal of Visual Communication and.
High Capacity Data Hiding for Grayscale Images
Data hiding method using image interpolation
Partial reversible data hiding scheme using (7, 4) hamming code
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection Source: Multimedia.
Source: IEICE-Transactions on Info and Systems
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Pairwise IPVO-Based Reversible Data Hiding
Information Hiding Techniques Using Magic Matrix
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Dynamic improved pixel value ordering reversible data hiding
Lossless Data Hiding in the Spatial Domain for High Quality Images
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
A Restricted Region-based Data-hiding Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Adopting secret sharing for reversible data hiding in encrypted images
Presentation transcript:

Reversible Data Hiding Based on Two-Dimensional Prediction Errors Source : IET Image Processing, Vol. 7, No. 9, pp. 805-816, 2013 Authors : Shyh-Yih Wang, Chun-Yi Li and Wen-Chung Kuo Speaker : Min-Hao Wu Date : 2014/03/17

Outline Related work – Yang et al.’s scheme Proposed scheme Experimental results Conclusions

Yang’s Proposed scheme (1/6)

Yang’s Proposed scheme Proposed scheme (2/6) Embedding Process of odd columns P1 P2 5 4 6 3 2 5 1 4 -1 6 -2 3 Z2 Z1 H 5 2 4 -1 6 -3 3

Yang’s Proposed scheme Proposed scheme(3/6) Embedding Process of odd columns Rule: Embed bit 0, keep unchanged Embed bit 1, P2 -1 or P1 +1, respectively 5 2 4 -1 6 -3 3 B1=01110011001 5 2 4 1 -2 6 -1 -3 3 5 6 4 3 1 D’

Yang’s Proposed scheme Proposed scheme(6/6)

Embedding process Step 1: scan the cover image and apply the two prediction methods to predict the pixel values in the image. For each scanned pixel, let (e1, e2) denote the prediction errors.

Embedding process Step 2: Step 3: Step 4: Step 5: generate the 2D histogram, H(e1, e2). Step 3: split the e1 − e2 plane into channels and partition the histogram H(e1, e2) correspondingly. Step 4: select ‘embedding channels (ECs)’, which are the channels for embedding messages. Step 5: for each EC, use a 1D embedding technique to embed the message.

Proposed scheme(chessboard, C-2D) (2,2) (2,2) Prediction error e1 (2,2) Cover image X For example : x1’ (2, 2) = (150+150+150+153)/4 = 150 x2’ (2, 2) = (150+150)/2 = 150 Prediction error e2

Proposed scheme(chessboard, C-2D) pl c = 0 e1 e2 Cover image X Result after histogram H(e1, e2) e’1 e’2 Result after shifting Result after shifting channel 0

Proposed scheme(chessboard, C-2D) pl = (-2, -2) Secret bit : 1001110(2) e”2 e’1 e’2 e”1 Result after shifting Stego image Y

Proposed scheme(chessboard, C-2D) pl = (-2, -2) Stego image Y e”1 Secret bit : 1001110(2) Cover image X

Proposed scheme(framework) c ∈ [−cb, cb] Channel 0 (e1, e2) : denote the two prediction errors for a pixel Part of a practical histogram H(e1, e2) generated from Lena

15

Experimental results

Conclusions This scheme can be used to design 2D reversible data- hiding schemes is presented. This framework can be applied to any architecture, and it can easily be extended into a multi-dimensional framework.