Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.

Slides:



Advertisements
Similar presentations
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
Advertisements

1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan.
Reversible watermarking Wu Dan Introduction Difference expansion Histogram bin shifting.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Reversible Data Hiding ECE643 Digital Image Processing (I) Course Project Professor: Yun Q. Shi Su Yu 12/02/2011.
Piyu Tsia,Yu-Chen Hu,Hsiu-Lien Yen Signal Processing 日期 :1 月 4 號 報告者 : 許睿中.
Reversible data hiding based on histogram shifting scheme Reporter: Date: Wan-Yu Lu 2012/12/13.
Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:
Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
Data hiding in Least Significant Bit (LSB) Speaker: Feng Jen-Bang ( 馮振邦 )
Reversible watermarking Wu Dan Introduction What?
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
Reversible Date Hiding Based on Histogram Modification of pixel Differences IEEE Transactions on circuits and systems for video technology, VOL. 19, NO.
A lossless data hiding scheme based on three- pixel block differences Ching-Chiuan Lin and Nien-Lin Hsueh Pattern Recognition, Vol. 41(4), April 2008 Pages.
多媒體網路安全實驗室 Source: IEICE Trans. Fundamentals, Vol. E90-A, No. 4, April 2007, pp Authors:Hong Lin Jin, Masaaki Fujiyoshi, Hitoshi Kiya Speaker:Cheng.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
(k, n)-Image Reversible Data Hiding
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
Reversible Data Hiding in JPEG Images using Ordered Embedding
Information Steganography Using Magic Matrix
Source :Journal of visual Communication and Image Representation
Reversible data hiding scheme based on significant-bit-difference expansion Sourse: IET Image Processing ( Volume: 11, Issue: 11, ), Pages 1002.
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
Yongjian Hu, Member, IEEE, Heung-Kyu Lee, Kaiying Chen, and Jianwei Li
Embedding Secrets Using Magic Matrices
Source: Information Sciences, 2018, accpeted.
Source : Signal Processing, vol. 126, pp ,  November 2016
Skewed Histogram Shifting for Reversible Data Hiding using a Pair of Extreme Predictions Source: IEEE Transactions on Circuits and Systems for Video Technology(
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding
Reversible Data Hiding Scheme Using Two Steganographic Images
Information Steganography Using Magic Matrix
Source:. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL
Source: Signal Processing, Vol. 125, pp , August 2016.
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
Source : Journal of Visual Communication and Image Representation, vol
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Data hiding method using image interpolation
Skewed Histogram Shifting for Reversible Data Hiding using a Pair of Extreme Predictions Source: IEEE Transactions on Circuits and Systems for Video Technology(
Information Hiding and Its Applications
Source : Journal of Visual Communication and Image Representation, vol
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
Chair Professor Chin-Chen Chang Feng Chia University
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Chair Professor Chin-Chen Chang Feng Chia University
Partial reversible data hiding scheme using (7, 4) hamming code
New Framework for Reversible Data Hiding in Encrypted Domain
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
Source: IEICE-Transactions on Info and Systems
De-clustering and Its Application to Steganography
Information Hiding Techniques Using Magic Matrix
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Dynamic improved pixel value ordering reversible data hiding
Steganographic Systems for Secret Messages
Lossless Data Hiding in the Spatial Domain for High Quality Images
Reversible data hiding in encrypted binary images by pixel prediction
Presentation transcript:

Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26

2 Outline ♠ Introduction ♠ Histogram shifting vs. reversible data hiding ●Three solutions ♠ Conclusions

3 Introduction ♠ Technical Steganography ●Types Loss Lossless (reversible) ●General Criteria Image quality Payload Reversibility  lossless steganography reversible data hiding

4 Histogram shifting vs. reversible data hiding  Zhicheng Ni, Yun-Qing Shi, Nirwan Ansari, and Wei Su, “Reversible data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, No. 3, 2006, pp

5 Histogram Original gray-scale image Histogram of Lena image Source: Zhicheng Ni, Yun-Qing Shi, Nirwan Ansari, and Wei Su, “Reversible Data Hiding”, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY(16:3), (P) (Z) Step 1: Generate an image histogram Ni et al.’s proposed method (1/7)

6 Step 2: To shift the pixels of histogram (1)If P>Z → To shift the range of the histogram, [Z+1, P-1], to the left-hand side by 1 unit. (2)If P<Z → To shift the range of the histogram, [P+1, Z-1], to the right-hand side by 1 unit Step 3: To hide the secret data by pixels P (1)If P>Z → To be embedded bit is “1”, the pixel value is changed to P-1. If the bit is ”0”, the pixel value remains. (2)If P<Z → To be embedded bit is “1”, the pixel value is changed to P+1. If the bit is ”0”, the pixel value remains. Ni et al.’s proposed method (2/7)

7 Original image Peak pointZero point [3+1,6-1] 4 → 5 5 → P=3, Z=6 and P<Z shift to right-hand Ni et al.’s proposed method (3/7)

Using P=3, 0 → 3 1 → 4 Secret bits: Stego-image Ni et al.’s proposed method (4/7)

→ 0 4 → 1 Stego-image P=3, Z=6 Extract Extracted secret bits: → 5 5 → 4 4 → 3 3 → 3 Recover Original image Ni et al.’s proposed method (5/7)

10 Maximum and minimum points maximum point minimum point Original image Ni et al.’s proposed method (6/7)

11 Multiple pairs Original image Example of 2 pairs. P2Z1Z2P1 Ni et al.’s proposed method (7/7)

12 ♠ Summary of Ni et al.’s scheme ●It is simple and efficient. ●The PSNR of the marked image is above 48dB. ●The pure payload is about 5k-80k bits for a 512*512 grayscale image

13 Questions: ♠ How to increase the pixel number of peak point? ●Difference image ♠ Is there any different way to generate a difference image

14  Chia-Chen Lin, Wei-Liang Tai and Chin-Chen Chang, “Multilevel reversible data hiding based on histogram modification of difference images,” Pattern Recognition, Vol. 41, Issue 12, December, 2008, pp Solution :

15 Basic idea

16 ♠ Hiding Phase Original Block |162 – 156| = 6 |161 – 159| = Message = “0110” Original Image Difference Image Peak Point Lin et al.’s proposed method

17 Lin et al.’s proposed method 1.For the first two pixels in each row 2.For any residual pixels

18 ♠ Hiding phase = = = = Original image Stego-image Difference image Lin et al.’s proposed method

19 ♠ Extracting and reversing phase Stego imageDifference image Peak Point = Original image Message = Lin et al.’s proposed method (1/2)

20 Conclusions ♠ Simple is good. ♠ Possible improvements ●Different shifting methods ●Apply different prediction algorithms

Thanks for your attention !