1 影像偽裝術的最新發展 張真誠 逢甲大學 講座教授 中正大學 榮譽教授 清華大學 合聘教授. 2 1. Watermarking 2. Image authentication 3. Secret sharing 4. Visual cryptography 5. Steganography.

Slides:



Advertisements
Similar presentations
研究生的學習與成長 張真誠 逢甲大學 講座教授 中正大學 榮譽教授 清華大學 合聘教授 個人網頁 : 多媒體暨網路安全實驗室網頁 :
Advertisements

1 視覺密碼學 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University ( 清華大學 ) National Chung Cheng University ( 中正大學 ) Feng Chia University (
Digital Watermarking Parag Agarwal
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
利用網路聊天室傳送機密訊息 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
NTIT1 A chaos-based robust wavelet- domain watermarking algorithm Source: Chaos, Solitions and Fractals, Vol. 22, 2004, pp Authors: Zhao Dawei,
1 資訊隱藏技術之研究 The Study of Information Hiding Mechanisms 指導教授: Chang, Chin-Chen ( 張真誠 ) 研究生: Lu, Tzu-Chuen ( 呂慈純 ) Department of Computer Science and Information.
Palette Partition Based Data Hiding for Color Images Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, and Chien-Ting Huang Speaker : Yu-Chiang Li.
A lossless data hiding scheme based on three- pixel block differences Ching-Chiuan Lin and Nien-Lin Hsueh Pattern Recognition, Vol. 41(4), April 2008 Pages.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
人力資源報告 Image and Signal Processing 1 Steganography Using Sudoku Revisited Wien Hong, Tung-Shou Chen, Chih-Wei Shiu Department of Information Management,
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
Digital Watermarking and Its Applications
Advisor: Chin-Chen Chang Student: Thai-Son Nguyen
Advisor: Chang, Chin-Chen Student: Chen, Chang-Chu
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
基於龜殼魔術矩陣的隱寫技術及其衍生的研究問題
影像偽裝術 Dr. Chin-Chen Chang
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
(k, n)-Image Reversible Data Hiding
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Information Hiding Technology: Current Research and Future Trend
Image Watermarking Chu, Hsi-Cheng.
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
Embedding Secret Messages in Texts
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Recent Developments on Multimedia and Secure Networking Technologies
Information Steganography Using Magic Matrix
指導教授: Chang, Chin-Chen (張真誠)
Chair Professor Chin-Chen Chang Feng Chia University
The Recent Developments in Visual Secret Sharing
Hiding Data in a Color Palette Image with Hybrid Strategies
基於邊緣吻合向量量化編碼 法之資訊隱藏 張 真 誠 逢甲大學 講座教授 中正大學 榮譽教授、合聘教授 清華大學 合聘教授
A Study of Digital Image Coding and Retrieving Techniques
Parag Agarwal Digital Watermarking Parag Agarwal
Embedding Secrets Using Magic Matrices
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
Some Novel Steganographic Methods for Digital Images
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding Scheme Using Two Steganographic Images
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Information Steganography Using Magic Matrix
Data hiding method using image interpolation
Dynamic embedding strategy of VQ-based information hiding approach
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Information Hiding and Its Applications
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
High Capacity Data Hiding for Grayscale Images
Chair Professor Chin-Chen Chang Feng Chia University
Recent Developments on Multimedia and Secure Networking Technologies
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Chair Professor Chin-Chen Chang Feng Chia University
Novel Multiple Spatial Watermarking Technique in Color Images
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Data Hiding Scheme Based Upon Block Truncation Coding
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Information Hiding Techniques Using Magic Matrix
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Recent Developments in Information Hiding
Steganographic Systems for Secret Messages
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Lossless Data Hiding in the Spatial Domain for High Quality Images
Presentation transcript:

1 影像偽裝術的最新發展 張真誠 逢甲大學 講座教授 中正大學 榮譽教授 清華大學 合聘教授

2 1. Watermarking 2. Image authentication 3. Secret sharing 4. Visual cryptography 5. Steganography

3 Watermarking Visible watermarking Easy to embed Clear to see watermark

4 Watermarking (Cont.) Invisible watermarking Requirements: Good visual quality of watermarked image Robustness Watermarking Watermarked imageOriginal image Watermark

5 Image authentication Requirements: Detect the tampered area Try to restore the tampered area Image Tampered imageDetected imageRestored image

6 Secret sharing Classification: Meaningless shadows Meaningful shadows

7 Secret sharing (Cont.) Shadow size: 256  256 Image size: 512  512 Sharing Reconstructing PSNR=24 dB (2,4)-threshold secret sharing scheme

8 Secret sharing (Cont.) Secret image Stego-image Hiding Reconstructed secret image Reconstructing (2, n)-threshold secret sharing scheme Stego-image

9 Visual cryptography Shadow 1Shadow 2 Secret Stacking

10 Visual cryptography (Cont.) Shadow 1Shadow 2 Secret Stacking

11 Visual cryptography (Cont.) Share 1 Share 2 Secret 1 “ VISUAL ” Secret 2 “ SECRET ” Stacking Rotating 40 o

12 Steganography The targets Frequency domain (e.g. DCT, DWT, DFT) Spatial domain (e.g. pixel values) Compression domain (e.g. VQ) Text Restoration Irreversible Reversible

13 Steganography (Cont.) Cover image Hiding system Secret message Stego image Image

14 Steganography (Cont.) Text 壞的毛病 壞毛病 山東的蘋果 山東蘋果 我的媽媽 我媽媽 主要的問題 主要問題 另外的一件事 另外一件事 其他的問題 其他問題 北京的大學 北京大學 Video Sound

15 Zhang and Wang ’ s Method (Embedding) … : … … … … … … … … … … … … :::::::::::: Magic Matrix Cover image Secret data: … Stego image p1p1 p2p2

16 Zhang and Wang ’ s Method (Extracting) … : … … … … … … … … … … … … :::::::::::: Magic Matrix Stego image Extracted secret data: p1p1 p2p2

17 Sudoku A logic-based number placement puzzle

18 Sudoku (Cont.) Property Possible solutions: 6,670,903,752,021,072,936,960 (i.e. ≈ 6.671×10 21 ) A Sudoku grid contains nine 3 × 3 matrices, each contains different digits from 1 to 9. Each row and each column of a Sudoku grid also contain different digits from 1 to 9.

19 Data Hiding Using Sudoku - 1 Reference Matrix M

20 Data Hiding Using Sudoku (Embedding) (Cont.) Cover Image Stego Image Secret data: … d(, ) = ((8-8) 2 +(4-7) 2 ) 1/2 =3 d(, ) = ((9-8) 2 +(7-7) 2 ) 1/2 =1 d(, ) = ((6-8) 2 +(8-7) 2 ) 1/2 =2.24 min.

21 Data Hiding Using Sudoku (Embedding) (Cont.) Cover Image Stego Image d(, ) = ((11-11) 2 +(15-12) 2 ) 1/2 =3 d(, ) = ((15-11) 2 +(12-12) 2 ) 1/2 =4 d(, ) = ((9-11) 2 +(14-12) 2 ) 1/2 =2.83 min Secret data: …

22 Data Hiding Using Sudoku (Extracting) (Cont.) Stego Image Extracted data: 27 9 =

23 Experimental Results

24 Experimental Results (Cont.) The results of visual quality and Embedding capacity comparisons Images Proposed PSNRC Baboon Barbara Boats Goldhill Jet(F16) Lena Pepper Sailboat Tiffany Average