Recover the tampered image based on VQ indexing Source: Signal Processing, Volume 90, Issue 1, Jan. 2010, pp. 331-343 Authors: Chun-Wei Yang and Jau-Ji.

Slides:



Advertisements
Similar presentations
H IGH CAPACITY WATERMARKING H YPERSPECTRAL I MAGES AUTHENTICATION Mehdi Fallahpour Jordi Serra-Ruiz David Megías.
Advertisements

1 Self-Recovery Fragile Watermarking Scheme with Variable Watermark Payload Fan Chen, Hong-Jie He, Yaoran Huo, Hongxia Wang Southwest Jiaotong University,
Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery Source: Pattern Recognition, Vol. 41, Issue 2,
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Fifth International Conference on Information
Interword Distance Changes Represented by Sine Waves for Watermarking Text Images Author: Ding Huang Supervisor: Prof. Hong Yan.
1 An ID-based multisignature scheme without reblocking and predetermined signing order Chin-Chen Chang, Iuon-Chang Lin, and Kwok-Yan Lam Computer Standards.
Huijuan Yang, Alex C. Kot, IEEE Fellow IEEE Transactions on Multimedia, Vol. 9, No. 3, Apr Multimedia Security Final Project R 葉容瑜 R
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
Watermarking Text Document Images Using Edge Direction Histograms Young-Won Kim and Il-Seok Oh Pattern Recognition Letters, Vol. 25, 2004, pp – 1251.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
International Journal of Smart Home Vol.7, No.5 (2013), pp Digital Watermarking for Image Tamper Detection.
Phen-Lan Lin, Chung-Kai Hsieh, and Po-Whei Huang
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
1 Security of fragile watermarking scheme for image authentication Authors: K. C. Liao, W. B. Lee, and C. W. Liao Source: The Imaging Science Journal,
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
(k, n)-Image Reversible Data Hiding
Der-Chyuan Lou and Jiang-Lung Liu,
Advisor: Chin-Chen Chang1, 2 Student: Yi-Hui Chen2
2003/04/291 Hiding data in images by optimal moderately- significant-bit replacement Wang, Ran-Zan, Lin, Chi-Fang, and Lin, Ja-Chen, IEE Electronics Letters,
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Source :Journal of visual Communication and Image Representation
Chair Professor Chin-Chen Chang Feng Chia University
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
A Data Hiding Scheme Based Upon Block Truncation Coding
A Digital Watermarking Scheme Based on Singular Value Decomposition
A Digital Watermarking Scheme Based on Singular Value Decomposition
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images Source: Symmetry, vol. 8, no. 6, June.
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
Source: Pattern Recognition, Vol. 38, Issue 11, December 2005, pp
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Reversible Data Hiding Scheme Using Two Steganographic Images
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Source: Signal Processing, Vol. 125, pp , August 2016.
Dynamic embedding strategy of VQ-based information hiding approach
Source: Pattern Recognition Letters, Article In Press, 2007
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Partial reversible data hiding scheme using (7, 4) hamming code
Zhe-Ming Lu, Chun-He Liu, Dian-Guo Xu, Sheng-He Sun,
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Digital Watermarking for Image Authentication with Localization
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
Partial reversible data hiding scheme using (7, 4) hamming code
Novel Multiple Spatial Watermarking Technique in Color Images
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Blind Reversible Authentication Based on PEE and CS Reconstruction
Secret image sharing with steganography and authentication
Ming-Shi Wang *, Wei-Che Chen 11 November 2006 present: 沈雅楓
Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images Source: Symmetry, Vol. 10, No. 8, pp. 318.
An imperceptible spatial domain color image watermarking scheme
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Predictive Grayscale Image Coding Scheme Using VQ and BTC
Source : Digital Signal Processing. Vol. 73, pp , Feb
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
A Quadratic-Residue-based Fragile Watermarking Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Recover the tampered image based on VQ indexing Source: Signal Processing, Volume 90, Issue 1, Jan. 2010, pp Authors: Chun-Wei Yang and Jau-Ji Shen Reporter: Te-Yu Chen( 陳德祐 )

Outline Introduction The Proposed Scheme  VQ Index Embedding and Watermark Embedding  Wong et al.’s Watermarking Schemes for Authentication and Ownership Verification  Watermark Extraction and Image recovery Experimental Results Conclusions & Comments 2

Watermarking Data Image Authentication with Tamper Detection and Recovery Public channel Embedding Yes OK No Original image Watermarked image Received image Recovered image Tamper recovery 3

WatermarkingWorking DomainSpatialFrequencyRobustnessRobustSemi-FragileFragilePerceptionVisibleInvisible Necessary Data for Extraction Blind (Public) Semi-Blind (Semi- Public) Non-Blind (Private) 4

Requirements Ability of tamper detection Ability of tamper recovery Image quality Resistant to known attacks  Tamper watermarked image without being detected Counterfeit attack  Collage attack  VQ attack Blind attack Cropping  Trace out the mapping correlation of blocks The four-scanning attack(brute-force/dictionary attack) 5

Literature 1.A Hierarchical Digital Watermarking Method for Image Tamper Detection and RecoveryA Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery  Phen-Lan Lin, Chung-Kai Hsieh, and Po-Whei Huang, Pattern Recognition, Vol. 38, Issue 11, A Majority-voting Based Watermarking Scheme for Color Image Tamper Detection and RecoveryA Majority-voting Based Watermarking Scheme for Color Image Tamper Detection and Recovery  Ming-Shi Wang and Wei-Che Chen, Computer Standards & Interfaces, 29, pp , Dual Watermark for Tamper Detection and RecoveryDual Watermark for Tamper Detection and Recovery  Tien-You Lee and Shinfeng D. Lin, Pattern Recognition, 41(11), pp , Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recoveryFour-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery  Chin-Chen Chang,Yi-Hsuan Fan, and Wei-Liang Tai, Pattern Recognition, Vol. 41, Issue 2, Feb. 2008, pp Watermarking for tamper detection and recovery  Youngran Park, Hyunho Kang, Kazuhiko Yamahuchi, and Kingo Kobayashi, IEICE Electronics Express, 5(17), pp , Recover the tampered image based on VQ indexing  Chun-Wei Yang and Jau-Ji Shen, Signal Processing, 90(1), 2010, pp

Comparisons 7

Watermarking 1n32 1 n 32 8

The Proposed Scheme~ Embedding 9 Recovery Information Recovery Information Verification Information Verification Information

Recovery information ~VQ Encoding Index Table Original Image Codebook ‧ 168 ‧ 255 (150,135,…,128) … (20,65,…,110) (90,135,…,120) (120,155,…,80) (50,42,…,98) (49,117,…,25) (100,125,…,150) …

Verification information ~ Wong’s watermarking scheme(Embedding) 12

Image block H r = H(256, 256, 1016, 1, 130, 50, 120, 80) = … F r = H r ⊕ Br = 1101 ⊕ 0100 = 1001 P r = E k’ (F r ) = E k’ (1001) = 0011 Watermarked block Wong’s watermarking scheme~ Embedding 13 NCHU Original Image M o : the image width (256) N o : the image height (256) I o : the image ID (1015) r: the block index (1) the r-th image block after setting LSB1 to 0 (130, 50, 120, 80) Watermarked Image

The Proposed Scheme~ Tamper detection and recovery 14 Detection Recovery

Wong’s watermarking scheme~ Detection 15

16 10

Recovery information ~VQ Recovery Recovered Image Codebook ‧ 168 ‧ 255 (150,135,…,128) … (20,65,…,110) (90,135,…,120) (120,155,…,80) (50,42,…,98) (49,117,…,25) (100,125,…,150) … 17

Original Tampered (56% cropped) Lee and Lin’s scheme PSNR=26.75dB The proposed scheme PSNR=29.33dB Experimental Results Image size: 256×256 pixels CB size: 256 code words Code word:4×4 pixels IT can be embedded into O four times 18 CB size: 256×4×4×256 bits

Tampered Recovered Tampered Recovered PSNR=31.70dB31.72dB30.91dB31.69dB PSNR=31.28dB31.99dB30.33dB31.72dB 19

35.24 dB dB dB Tamped Image Tamper detected images The recovered images 20

49%61%65%70% 75%80%85%90% 29.83dB 29.16dB 28.62dB 27.66dB 26.30dB 24.41dB 22.59dB 20.12dB 21

Conclusions An image tamper detection and recovery scheme integrating Wong’s watermarking scheme and VQ is proposed. The number of times of embedding the recovery info. into the image is adjustable. The quality of the recovered image is high. Resistant against the known attacks. (Wong et al.’s scheme is adopted) 22

Comments Owing to the use of a public key cryptographic system, the block size should be large enough for the security concern(1024bits). However, the larger the block size is, the less precision of error detection will be. Owing to the use of a public key cryptographic system, the computational cost is high. Additional cost: code book(4×4 ×256×256 bits) 23