Huijuan Yang, Alex C. Kot, IEEE Fellow IEEE Transactions on Multimedia, Vol. 9, No. 3, Apr. 2007 Multimedia Security Final Project R97922062 葉容瑜 R97922003.

Slides:



Advertisements
Similar presentations
Watermarking 3D Objects for Verification Boon-Lock Yeo Minerva M. Yeung.
Advertisements

A reversible data hiding method by histogram shifting in high quality medical images Author: Li-Chin Huang, Lin-Yu Tseng, Min-Shiang Hwang Source: The.
Chinese University of Hong Kong Department of Information Engineering A Capacity Estimate Technique for JPEG-to-JPEG Image Watermarking Peter Hon Wah Wong.
Watermarking For Image Authentication Presented by San-Hao Wang.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
A Review on: Spread Spectrum Watermarking Techniques
1 Template-Based Classification Method for Chinese Character Recognition Presenter: Tienwei Tsai Department of Informaiton Management, Chihlee Institute.
ECE738 Advanced Image Processing Data Hiding (2 of 3) Curtsey of Professor Min Wu Electrical & Computer Engineering Univ. of Maryland, College Park.
Digital Watermarking With Phase Dispersion Algorithm Team 1 Final Presentation SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu,
A public fragile watermarking scheme for 3D model authentication Chang-Min Chou, Din-Chang Tseng Computer-Aided Design Vol. 38 (Nov. 2006) 1154–1165 Reporter:
Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.
Recover the tampered image based on VQ indexing Source: Signal Processing, Volume 90, Issue 1, Jan. 2010, pp Authors: Chun-Wei Yang and Jau-Ji.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Multiple Image Watermarking Applied to Health Information Management
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
Watermarking Text Document Images Using Edge Direction Histograms Young-Won Kim and Il-Seok Oh Pattern Recognition Letters, Vol. 25, 2004, pp – 1251.
Lossless Watermarking for Image Authentication: A New Framework and an Implementation IEEE TRANSACTIONS ON IMAGE PROCESSING APRIL 2006 C.M.Chen.
Data Hiding in Image and Video Part I: Fundamental Issues and Solutions ECE 738 Class Presentation By Tanaphol Thaipanich
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
A Novel steganographic method for JPEG images by Vasiliy Sachnev - Introduction  JPEG compression  Steganography - Block based steganography method (F5)
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
Duy & Piotr. How to reconstruct a high quality image with the least amount of samples per pixel the least amount of resources And preserving the image.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
Data Hiding in Image and Video: Part II—Designs and Applications Min Wu, Heather Yu, and Bede Liu.
1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp Xinpeng Zhang.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
 Forensics of image re-sampling (such as image resizing) is an important issue,which can be used for tampering detection, steganography, etc.  Most of.
Virtual Examples for Text Classification with Support Vector Machines Manabu Sassano Proceedings of the 2003 Conference on Emprical Methods in Natural.
Wonjun Kim and Changick Kim, Member, IEEE
Distance-Reciprocal Distortion Measure for Binary Document Images IEEE Signal Processing Letters, vol.11,No.2, Feb
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
1 Security of fragile watermarking scheme for image authentication Authors: K. C. Liao, W. B. Lee, and C. W. Liao Source: The Imaging Science Journal,
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
An improved SVD-based watermarking scheme using human visual characteristics Chih-Chin Lai Department of Electrical Engineering, National University of.
Watermarking Scheme Capable of Resisting Sensitivity Attack
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
影像偽裝術 Dr. Chin-Chen Chang
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
Der-Chyuan Lou and Jiang-Lung Liu,
Presented by :Yuting Bao
Watermarking for Image Authentication ( Fragile Watermarking )
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Data Hiding in Binary Image for Authentication and Annotation Min Wu and Bede Liu, IEEE Trans. on Multimedia, August.2004 Multimedia Security.
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
A User Attention Based Visible Watermarking Scheme
QR Code Authentication with Embedded Message Authentication Code
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Reversible Data Hiding
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
A Block Based MAP Segmentation for Image Compression
High Capacity Data Hiding for Grayscale Images
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Digital Watermarking for Image Authentication with Localization
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
Hiding Multiple Watermarks in Transparencies of Visual Cryptography
New Framework for Reversible Data Hiding in Encrypted Domain
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Data Hiding Scheme Based Upon Block Truncation Coding
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
A Quadratic-Residue-based Fragile Watermarking Scheme
Presentation transcript:

Huijuan Yang, Alex C. Kot, IEEE Fellow IEEE Transactions on Multimedia, Vol. 9, No. 3, Apr Multimedia Security Final Project R 葉容瑜 R 程瀚平

 Introduction  Proposed Method  The Authentication Mechanism  Experimental Results  Conclusions

Introduction(1/3)  Digital documents Ex. certificates, digital books, fax, personal documents  How to ensure the authenticity and integrity of digital documents, as well as detection of tampering and forgery, become a serious concern  Powerful image editing software  Data hiding for binary images authentication has been a promising approach to alleviate these concerns

Introduction(2/3)  Data hiding on binary images can be done the lower level: flipping pixels from black to white and vice versa the higher level: modifying width of strokes and spacings between characters and words  In this paper, our focus is on data hiding for binary images in lower level for the purpose of image authentication

Introduction(3/3)  Define a “connectivity-preserving” criterion to assess the “flippability” of a pixel  Connectivity among pixels plays an important role to their visual qualities Wu et al.’s approachProposed approach Visual distortion Connectivity Smoothness 4-connectivity 8-connectivity Uneven embeddability of the image Shuffling Embeddable blocks/ Embeddable pixels (cryptographic signature)

The Main Objectives 1. Assess the “flippability” of a pixel using the connectivity- preserving criterion to achieve good visual quality of the watermarked image 2. Handle the “uneven embeddability” of the image by adaptively embedding the watermark only in those “embeddable” blocks 3. Study the invariant features in flipping pixels in binary images to achieve blind watermark extraction 4. Explore different ways of partitioning the image to achieve larger capacity 5. Investigate on how to locate the “embeddable” pixels in the watermarked image so as to incorporate cryptographic signature to achieve higher security

 Introduction  Background  Proposed Method  The Authentication Mechanism  Experimental Results  Conclusions

Background 1. How to choose suitable pixels to carry the watermark data so that the visual distortion is low 2. How to handle the “uneven embeddability” of the host image such that the “flippable” pixels can be efficiently used 3. How to utilize the invariant features in the data embedding process to extract watermark without requiring the presence of original image (blind) 4. How to increase the capacity by partitioning the image in appropriate ways 5. How to locate the “embeddable” pixels in order to incorporate cryptographic signature to ensure authenticity and integrity of the watermarked images

 Introduction  Proposed Method Flippability Decision Block Partition Embeddability Capacities Watermark Embedding and Extraction  The Authentication Mechanism  Experimental Results  Conclusions

Flippability Decision  Flippability The transitions from the pixel to its eight neighbors in a 3 * 3 block In particular, the 4- and 8-connectivity among pixels VH Transition IR Transition C Transition

VH Transition  N vw : the number of uniform white transitions along vertical and horizontal directions  N vb : the number of uniform black transitions along vertical and horizontal directions Black: 1 White: 0 N vw = 0, N vb = 2 => N vw = 0, N vb = 0 N vw = 0, N vb = 0 => N vw = 0, N vb = 0

IR Transition  N ir : the number of the interior right angle transitions Black: 1 White: 0 N ir = 0 => N ir = 1 N ir = 0 => N ir = 0

C Transition  N c : the number of transitions from the center pixel to the sharp corners Black: 1 White: 0 N c = 1 => N c = 0 N c = 0 => N c = 0

Flippability/Connectivity-Preserving Criterion  Flippable VH transition, IR transition, and C transition remain the same before and after flipping the center pixel  Flip the pixel will not Destroy the connectivity b/w pixels in the neighborhood(VH) Create extra clusters as well(IR) Destroy the 8-connectivity among pixels(C)  By satisfying the “Connectivity-Preserving” criterion, the local connectivity is preserved

Block Partition  Several different types of blocks Fixed 3*3 block (FB) Non-interlaced block (NIB) Interlaced block (IB)

Embeddability  Determined pixels Non-interlaced block scheme: all pixels except the boundary pixels Interlaced block scheme: all pixels except those lie in the sharing rows and columns  The embeddability of a block depends on the “flippability” of the determined pixels in the block

Capacities  Only one pixel is flipped in each block => The prob. of a pixel to be “flippable” in a block is independent to other pixels  Assume the probability that a pixel satisfies the “Flippability Criterion” is p FB: The prob. of each block to be “embeddable” is p NIB: The prob. is 1 – (1-p)^(n-2) 2 IB: The prob. is 1 – (1-p)^(n-2) 2  A larger block size definitely will increase the prob.for a block to be “embeddable”, however, the total number of blocks will be decreased => Decrease the capacities

Watermark Embedding 1. Partition the image into equal size square blocks, note that the block size does not need to be square 2. Determine the flippability of the determined pixels based on the “Flippability Criterion” 3. Once a pixel is identified as “flippable”, the block is marked as “embeddable”. The current “flippable” pixel is identified as the “embeddable” pixel, i.e., “embeddable” location of the block 4. Proceed to the next block 5. Repeat steps 2 to 4 until all the blocks are processed 6. Embed the watermark in the “embeddable” blocks by flipping the “embeddable” pixels (if needed) to enforce the odd-even feature of the number of black or white pixels in the block

 Embeddable pixels = flippable pixels  Flipping a pixel in a block may affect the “flippability” of the pixels in the same block but not the pixels in its neighboring blocks  The “embeddability” of a block is invariant in the watermark embedding process The “flippability” of a pixel is invariant in the watermark embedding process A “flippable” pixel which is identified as “embeddable” is still “flippable,” hence an “embeddable” block remains “embeddable”  The watermark can be extracted blindly from the “embeddable” blocks by computing the odd-even feature of the number of black or white pixels

 Introduction  Proposed Method  The Authentication Mechanism Locate “Embeddable” Pixels Criterion Authentication Process The Verification Process  Experimental Results  Conclusions

Locate “Embeddable” Pixels Criterion  The odd-even enforcement is employed for the watermark embedding Vulnerable to the “parity attack” Ex: an adversary can carefully flip two pixels in the same block while keeping the odd-even feature of the block unchanged.

Locate “Embeddable” Pixels Criterion  p-4 condition Flipping the pixel that does not change the “flippability” of its previous four (p-4) neighbors that lie in the same 3 x 3 block  d-2 condition Flipping the pixel that does not affect the “embeddability” of those d-2 pixels (determined pixel) that have already been processed in the same block

Locate “Embeddable” Pixels Criterion

Authentication Process

The Verification Process

 Introduction  Proposed Method  The Authentication Mechanism  Experimental Results Capacity and Visibility Test Locating Embeddable Pixels Criterion and Authentication Mechanism Comparisons  Conclusions

Capacity and Visibility

(a)The original text image of size 336 x 336 (Chinese) (d) Hide 482 bits by FB 3 x 3 (e) Hide 733 bits by NIB 4 x 4 (f) Hide 1261 bits by IB 4 x 4

Capacity and Visibility (b) The original text image of size 336 x 336 (English) (g) Hide 447 bits by FB 3 x 3 (h) Hide 672 bits by NIB 4 x 4 (i) Hide 1237 bits by IB 4 x 4

Capacity and Visibility (b) The original text image of size 336 x 336 (Handwritten) (g) Hide 313 bits by FB 3 x 3 (h) Hide 554 bits by NIB 4 x 4 (i) Hide 972 bits by IB 4 x 4

Capacity and Visibility  Evaluate the visual distortion caused by flipping pixels The visual distortion table proposed by Wu et al. is employed. M. Wu and B. Liu, “Data hiding In binary images for authentication and annotation,” IEEE Trans. Multimedia, vol. 6, no. 4, pp. 528–538, Aug

Capacity and Visibility  Distortion score (DS)  Total distortion (TD)  Average per pixel distortion (APPD)

Capacity and Visibility

Test Locating Embeddable Pixels Criterion and Authentication Mechanism (a)The original image of size 920 x 230 (b) Hide 1056 bits by proposed algorithm with FB 3 x 3 (c) The watermarked image that is tampered (d) The original logo image (e) The reconstructed logo image when no tampering occurs (f) The reconstructed logo image when the watermarked image has been tampered

Comparisons (a)Original image of size 173 x 115 (b) The proposed method (c) Wu et al. method (d) Tseng et al. (e) Lu et al. (f) Yang & Kot 111 bits 180 bits 260 bits

 Introduction  Proposed Method  The Authentication Mechanism  Experimental Results  Conclusions

Conclusions  A novel blind data hiding scheme for binary images authentication based on connectivity- preserving A window of 3 x 3 is employed to access the “flippablility” of a pixel in a block  Different types and sizes of block can be chosen cater for different applications  The proposed scheme can be applied to a wide variety of binary image authentication