Reversible watermarking Wu Dan 2008.9.10. Introduction Difference expansion Histogram bin shifting.

Slides:



Advertisements
Similar presentations
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Advertisements

Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Robust statistical method for background extraction in image segmentation Doug Keen March 29, 2001.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan.
A reversible data hiding method by histogram shifting in high quality medical images Author: Li-Chin Huang, Lin-Yu Tseng, Min-Shiang Hwang Source: The.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Reversible Data Hiding ECE643 Digital Image Processing (I) Course Project Professor: Yun Q. Shi Su Yu 12/02/2011.
Reversible data hiding based on histogram shifting scheme Reporter: Date: Wan-Yu Lu 2012/12/13.
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Improved PVO-based reversible data hiding Source: Digital Signal Processing, 2014 Authors: Fei Peng, Xiaolong Li,ng Reporter: Min-Hao Wu.
Object Tracking for Retrieval Application in MPEG-2 Lorenzo Favalli, Alessandro Mecocci, Fulvio Moschetti IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR.
Digital Watermarking With Phase Dispersion Algorithm Team 1 Final Presentation SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu,
Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Reversible Color Image Watermarking in YCoCg-R Color Space Aniket Roy under the supervision of Dr. Rajat Subhra Chakraborty.
Optimal Histogram-pair and Prediction-error Based Image Reversible Data Hiding 1 Computer Science, Tongji University, Shanghai, China 2 ECE, New Jersey.
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
Reversible Data Embedding Using Difference Expansion IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No. 8, Aug. 2003, page(s):
Watermarking Text Document Images Using Edge Direction Histograms Young-Won Kim and Il-Seok Oh Pattern Recognition Letters, Vol. 25, 2004, pp – 1251.
Lossless Watermarking for Image Authentication: A New Framework and an Implementation IEEE TRANSACTIONS ON IMAGE PROCESSING APRIL 2006 C.M.Chen.
A Novel Method for Burst Error Recovery of Images First Author: S. Talebi Second Author: F. Marvasti Affiliations: King’s College London
3D polygonal meshes watermarking using normal vector distributions Suk-Hawn Lee, Tae-su Kim, Byung-Ju Kim, Seong-Geun Kwon.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
ECE643 Course Project, Fall /21/20081 Optimum histogram pair based image lossless data embedding By G. Xuan, Y. Q. Shi, etc. Summarized By: Zhi.
Reversible watermarking Wu Dan Introduction What?
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
1 Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform Source : IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 13, NO. 8,
IEEE Transactions on Consumer Electronics, Vol. 58, No. 2, May 2012 Kyungmin Lim, Seongwan Kim, Jaeho Lee, Daehyun Pak and Sangyoun Lee, Member, IEEE 報告者:劉冠宇.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
A lossless data hiding scheme based on three- pixel block differences Ching-Chiuan Lin and Nien-Lin Hsueh Pattern Recognition, Vol. 41(4), April 2008 Pages.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
3D mesh watermarking Wu Dan Introduction Spatial domain (00 EG) Transformed domain (02 EG) K=D-A; (D ii is a degree of vertex v i, A is an.
Image Contrast Enhancement Based on a Histogram Transformation of Local Standard Deviation Dah-Chung Chang* and Wen-Rong Wu, Member, IEEE IEEE TRANSACTIONS.
1 Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform Source : IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 13, NO. 8,
Reversible Data Hiding using Histogram Shifting
An improved SVD-based watermarking scheme using human visual characteristics Chih-Chin Lai Department of Electrical Engineering, National University of.
Another Example: Circle Detection
(k, n)-Image Reversible Data Hiding
A new data transfer method via signal-rich-art code images captured by mobile devices Source: IEEE Transactions on Circuits and Systems for Video Technology,
Reversible Data Hiding in JPEG Images using Ordered Embedding
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Mean value based reversible data hiding in encrypted images
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
Yongjian Hu, Member, IEEE, Heung-Kyu Lee, Kaiying Chen, and Jianwei Li
Source: Information Sciences, 2018, accpeted.
Source : Signal Processing, vol. 126, pp ,  November 2016
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
Reversible Data Hiding in JPEG Images
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
New Framework for Reversible Data Hiding in Encrypted Domain
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Hidden Digital Watermarks in Images
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Dynamic improved pixel value ordering reversible data hiding
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
A Quadratic-Residue-based Fragile Watermarking Scheme
Adopting secret sharing for reversible data hiding in encrypted images
Presentation transcript:

Reversible watermarking Wu Dan

Introduction Difference expansion Histogram bin shifting

Expansion Embedding Techniques for Reversible Watermarking Diljith M. Thodi and Jeffrey J. Rodr í guez, IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 16, NO. 3, MARCH 2007

I alternative approaches Histogram-Based selection of locations

I alternative approaches Histogram shifting

Histogram Shifting

I alternative approaches Histogram shifting Notation and functions

II Difference-expansion based algorithms Difference expansion with histogram shifting and overflow map (DE-HS-OM) Decompose the image into differences and integer averages Determine the changeable (C) and the expandable locations (E) 2D overflow map (M) is losslessly compressed

II Difference-expansion based algorithms Difference expansion with histogram shifting and flag bits (DE-HS-FB) Many of expandable differences are capable of undergoing multiple expansion/shifting. Order of modifiability

Flag bits α β I=(255,253) l=254 h=2 Non-Embeddable I=(255,251) l=253 h=4 Non-Embeddable I=(254,250) l=252 h=4 Changeable 0 0 I=(253,251) l=252 h=2 Expandable 1 0 I=(255,252) l=253 h=3 Changeable 0 0 I=(254,253) l=253 h=1 Expandable 1 0 I=(200,210) l=205 h=(-10) Expandable 3 2 I=(100,50) l=75 h=50 Expandable 1 0 FB|LSB|Secret=01011|01|1001 Lossless compression=100100

III expansion embedding PE (prediction error expansion) based reversible watermarking PE DE +HS+ OM FB LM

III expansion embedding D1: DE with location map (Tian ’ s method). D2: DE with histogram shifting and overflow map (DE-HS-OM). D3: DE with histogram shifting and flag bits (DE-HS-FB). P1: PE expansion with location map. P2: PE expansion with histogram shifting and overflow map. P3: PE expansion with histogram shifting and flag bits.

results

Adaptive lossless steganographic scheme with centralized difference expansion Chih-Chiang Lee, Hsien-ChuWu, Chwei-Shyong Tsai, Yen-Ping Chu Pattern Recognition 41 (2008,6)

Centralized difference expansion for each component of a block, we can obtain a series of pixel values v 0, v 1, v 2,..., v k−1. Sorting these pixels in ascending order take the medium value v m as a reference value

Adaptive embedding procedure I II III IV I

II III

I II III IV 0 1 0

Adaptive extracting procedure

result

Circular Interpretation of bijective transformations in lossless watermarking for media asset management Christophe De Vleeschouwer, Jean-Fran ç ois Delaigle, and Beno î t Macq, IEEE TRANSACTIONS ON MULTIMEDIA, MARCH 2003

I Reversible embedding Patchwork algorithm 1. Each image block is equally divided into two pseudo-random sets of pixels 2. Zones A and B have close average values before embedding. 3. After embedding, depending on the bit to embed, their luminance values are incremented or decremented.

I Reversible embedding

II extraction and inversion process 1. Partition the image into blocks and zones A and B. 2. Zones A and B have close average values before embedding. 3. Histograms of each zone are mapped to the circle. For both zones, the center of mass is computed. 4. Let a be the angle between the vectors C a and C b, pointing from the circle center to each center of mass. 5. The sign of a provides the direction of rotation during the embedding process and enables bit retrieval and reversibility. 6. Once the embedded bit has been retrieved, the original block can be recovered.

III solution to the salt and pepper artifacts

Robust Lossless Image Data Hiding Designed for Semi- Fragile Image Authentication Zhicheng Ni, Yun-Qing Shi, Nirwan Ansari, and Wei Su IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, April 2008

I a novel robust lossless image data hiding algorithm A Robust Statistical Quantity Used to Embed Data 1. Consider a given 8×8 image block, we split it into two sets A and B 2. For each block, we calculate the difference value, which is defined as the arithmetic average of differences of grayscale values of pixel pairs within the block.

Differentiating Bit-Embedding Schemes Based on Different Grayscale Distributions Within a Block of Pixels

Data Extraction Data extraction is actually the reverse process of data embedding and is much simpler than data embedding. 1. For a given marked image, we first split it into nonoverlapping blocks and then calculate the difference value for each block in the same way as that used in data embedding. The main steps are described below.

2. If the absolute difference value is larger than the threshold K, the grayscale value distribution of the block is then examined. If the block is identified as Case 3 in Category 2, Case 2 in Category 3, or Case 2 in Category 4,the bit “ 0 ” is extracted, and the block remains unchanged. Otherwise, bit “ 1 ” is extracted and the difference value is shifted back towards the zero point by adding or subtracting the quantity. 3. If the absolute value of the difference value is less than the threshold K, then bit “ 0 ” is extracted, and nothing to do on the pixel grayscale value of that block. Note that by combining this step and the above step in data extraction, it is obvious that all pixel grayscale values will be the same as in the original image. 4. After data extraction, the inverse permutation and the ECC decoding are applied, respectively, so as to obtain the original information bits correctly. In this way, we can extract the original information bits and recover the original image without any distortion.

result