Reversible Image Watermarking Using Interpolation Technique Source: IEEE Transcation on Information Forensics and Security, Vol. 5, No. 1, March 2010 Authors:

Slides:



Advertisements
Similar presentations
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Advertisements

Reversible Data Hiding Based on Two-Dimensional Prediction Errors
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan.
Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:
1 Hiding Data in Images by Simple LSB Substitution Source: Pattern Recognition, Vol. 37, pp , 2004 Authors: Chi-Kwong Chan and L.M. Cheng Speaker:
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
Reversible Color Image Watermarking in YCoCg-R Color Space Aniket Roy under the supervision of Dr. Rajat Subhra Chakraborty.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
Palette Partition Based Data Hiding for Color Images Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, and Chien-Ting Huang Speaker : Yu-Chiang Li.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
1 Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems Adviser: Chih-Hung Lin Speaker : Chia-Wei Chang Date:2009/10/06.
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
1 Security of fragile watermarking scheme for image authentication Authors: K. C. Liao, W. B. Lee, and C. W. Liao Source: The Imaging Science Journal,
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
Source: IEEE Signal Processing Letters (Accepted)2016
(k, n)-Image Reversible Data Hiding
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Source: IEEE Transactions on Circuits and Systems for Video Technology Vol.26.
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
Reversible Data Hiding in JPEG Images using Ordered Embedding
Reversible data hiding scheme based on significant-bit-difference expansion Sourse: IET Image Processing ( Volume: 11, Issue: 11, ), Pages 1002.
Mean value based reversible data hiding in encrypted images
A Data Hiding Scheme Based Upon Block Truncation Coding
Separable and error-free reversible data hiding in encrypted images
Hiding Data in a Color Palette Image with Hybrid Strategies
Yongjian Hu, Member, IEEE, Heung-Kyu Lee, Kaiying Chen, and Jianwei Li
A Restricted Region-based Data-hiding Scheme
Source: Information Sciences, 2018, accpeted.
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Improved joint reversible data hiding in encrypted images
Reversible Data Hiding
Reversible Data Hiding Scheme Using Two Steganographic Images
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Source: Signal Processing: Image Communication 64 (2018) 78-88
Source: IEEE Access, Vol. 6, Dec. 2017, pp
A reversible and secure patient information hiding system for IoT driven e-health Source : International Journal of Information Management, Available online.
Source : Journal of Visual Communication and Image Representation, vol
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Data hiding method using image interpolation
Dynamic embedding strategy of VQ-based information hiding approach
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Source : Journal of Visual Communication and Image Representation, vol
Partial reversible data hiding scheme using (7, 4) hamming code
High-fidelity reversible data hiding based on pixel-value-ordering and pairwise prediction-error expansion Source: Journal of Visual Communication and.
High Capacity Data Hiding for Grayscale Images
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Data hiding method using image interpolation
Partial reversible data hiding scheme using (7, 4) hamming code
New Framework for Reversible Data Hiding in Encrypted Domain
Novel Multiple Spatial Watermarking Technique in Color Images
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
An Algorithm for Removable Visible Watermarking
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection Source: Multimedia.
Source: IEICE-Transactions on Info and Systems
Source: Signal Processing Volume 111 June 2015, Pages
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Source : Digital Signal Processing. Vol. 73, pp , Feb
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Reversible data hiding in encrypted binary images by pixel prediction
Presentation transcript:

Reversible Image Watermarking Using Interpolation Technique Source: IEEE Transcation on Information Forensics and Security, Vol. 5, No. 1, March 2010 Authors: Lixin Luo, Zhenyong Chen, Ming Chen, Xiao Zeng and Zhang Xiong Speaker: Hon- Hang Chang Date:

Outline  Introduction  Proposed Method  Experiment Results  Conclusions 2

Introduction 3 Embed Cover image Watermark Watermarked image Watermark Cover image Watermarked image Extract

Proposed Method(Cont.) 4 LSB replacement LM, LN RM, RN Boundary Map Overhead  LSB replacement of the overhead information Marginal area of cover-image Cover image

●○●○●○● ○○○○○○○ ●○●○●○● ○○○○○○○ ●○●○●○● ○○○○○○○ ●○●○●○● Proposed Method(Con.t) 5  Interpolation in Non-Sample pixels ● Sample pixel ○ Non-Sample pixel ●○●○●○● ○○○○○○○ ●○●○●○● ○○○○○○○ ●○●○●○● ○○○○○○○ ●○●○●○● ●○●○●○● ○○○○○○○ ●○●○●○● ○○○○○○○ ●○●○●○● ○○○○○○○ ●○●○●○● ●○●○●○● ○○○○○○○ ●○●○●○● ○○○○○○○ ●○●○●○● ○○○○○○○ ●○●○●○● ●○●○●○● ○○○○○○○ ●○●○●○● ○○○○○○○ ●○●○●○● ○○○○○○○ ●○●○●○● Cover image X ○ The Non-Sample pixel after predicting 1-Level 2-Level

●○●○●○● ○○○○○○○ ●○●○●○● ○○○○○○○ ●○●○●○● ○○○○○○○ ●○●○●○● Proposed Method(Cont.) 6  Interpolation in Sample pixels ● Sample pixel ○ Non-Sample pixel ○ The Non-Sample pixel after predicting●○●○●○●○○○○○○○ ●○○○○○● ○○○○○○○ ●○○○○○● ○○○○○○○ ●○●○●○● 3-Level

Proposed Method(Cont.) 7  Interpolation in Non-Sample pixels (1/2) S 45 = {60, 52,40} Cover image X Mean 45 =(S 45 (1)+S 45 (3))/2 =(60+40)/2 =50 Mean 135 =(S 135 (1)+S 135 (3))/2 =(30+50)/2 =40 S 135 ={30, 52,50} Interpolation X ’ u= ( Mean 45 + Mean 135 )/ 2 = (50+40)/2 = 45

Proposed Method 8  Interpolation in Non-Sample pixels (2/2) S 0 = {30, 18,40} Cover image X S 90 ={52, 18,45} Interpolation X ’ Mean 0 =(S 0 (1)+S 0 (3))/2 =(30+40)/2 =35 Mean 90 =(S 90 (1)+S 90 (3))/2 =(52+45)/2 =48.5 u= ( Mean 0 + Mean 90 )/ 2 = ( )/2 = )()( )( 35 )()( )( '   ×        ee e ee e Meanw wX    

Proposed Method 9  Interpolation in Sample pixels S 0 = {18, 40, 67} Cover image X S 90 ={47, 40, 43} Interpolation X ’ Mean 0 =(S 0 (1)+S 0 (3))/2 =(18+67)/2 =42.5 Mean 90 =(S 90 (1)+S 90 (3))/2 =(47+43)/2 =45 u= ( Mean 45 + Mean 135 )/ 2 = ( )/2 =

Proposed Method(Cont.) 10  Embedding(Non-Sample pixels) (1/2) Cover image XInterpolation X ’ RM LM RM+1 LN Difference E RN LM-1 LM RM - =

Proposed Method(Cont.) 11  Embedding(Non-Sample pixels) (2/2) Interpolation X ’ Difference E RM LM RM+1LM-1 Difference E ’ W= = Interpolation X ’ Watermarked image

Proposed Method(Cont.)  Embedding(Sample pixels) Watermarked image Interpolation X ’ 00 Difference E LNRN LMRM LMRM LM-1RM+1 - = 12

Proposed Method(Cont.)  Embedding(Sample pixels) Interpolation X ’ 00 Difference E LMRM LM-1RM+1 W= Difference E ’ Interpolation X ’ Watermarked image + = 13

Proposed Method(Cont.)  Extracting(Sample pixels) Watermarked image Interpolation X ’ Difference E ’ + = LM=-1 RM=0 LN=-2 RN=1 W 2 = Difference E = 14

Proposed Method(Cont.)  Extracting(Non-Sample pixels) Watermarked images Interpolation X ’ = - Difference E ’ = Difference E ’ Cover Image X LM=0 RM=1 LN=-3 RN=4 W 1 = W= W 1 ∥ W 2 15

 To distinguish the Boundary pixel is corresponding to genuine or pseudo Pixel in cover image: Proposed Method 16  Boundary Map (B) x=0 x ’’ =-1x ’’ =1 x=255 x ’’ =254x ’’ =256 X X Underflow Overflow Pixel in cover image: Watermarked pixel: B=…0To add ‘0’ in to the boundary map x ’’ =0x ’’ =255 x=1 x ’’ =0x ’’ =2 x=254 x ’’ =253x ’’ =255 B=…1To add ‘1’ in to the boundary map  Overflow and Underflow

Experiment Results 17 TABLE I COMPARISON RESULTS IN TERMS OF THE CAPACITY (bits) AND THE PSNR VALUE (dB) FOR LENA, BABOON, PLANE, AND SAILBOAT

Experiment Results 18 Fig. 1 Performance evaluation of multilayer embedding over standard in test image Lena

Conclusions 19  The computation cost of the proposed method scheme is small.  The proposed scheme could guarantee high image quality without sacrificing embedding capacity.