1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.

Slides:



Advertisements
Similar presentations
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Advertisements

Reversible Data Hiding Based on Two-Dimensional Prediction Errors
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan.
A reversible data hiding method by histogram shifting in high quality medical images Author: Li-Chin Huang, Lin-Yu Tseng, Min-Shiang Hwang Source: The.
Reversible watermarking Wu Dan Introduction Difference expansion Histogram bin shifting.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Piyu Tsia,Yu-Chen Hu,Hsiu-Lien Yen Signal Processing 日期 :1 月 4 號 報告者 : 許睿中.
Reversible data hiding based on histogram shifting scheme Reporter: Date: Wan-Yu Lu 2012/12/13.
Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
Reversible watermarking Wu Dan Introduction What?
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
Reversible Date Hiding Based on Histogram Modification of pixel Differences IEEE Transactions on circuits and systems for video technology, VOL. 19, NO.
1 Adaptive Data Hiding in Palette images by Color Ordering and Mapping With Security Protection Authors: Chih-Hsuan Tzeng, Zhi-Fang Yang, and Wen-Hsiang.
1 Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform Source : IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 13, NO. 8,
A lossless data hiding scheme based on three- pixel block differences Ching-Chiuan Lin and Nien-Lin Hsueh Pattern Recognition, Vol. 41(4), April 2008 Pages.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
1 Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems Adviser: Chih-Hung Lin Speaker : Chia-Wei Chang Date:2009/10/06.
多媒體網路安全實驗室 Source: IEICE Trans. Fundamentals, Vol. E90-A, No. 4, April 2007, pp Authors:Hong Lin Jin, Masaaki Fujiyoshi, Hitoshi Kiya Speaker:Cheng.
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
人力資源報告 Image and Signal Processing 1 Steganography Using Sudoku Revisited Wien Hong, Tung-Shou Chen, Chih-Wei Shiu Department of Information Management,
1 Security of fragile watermarking scheme for image authentication Authors: K. C. Liao, W. B. Lee, and C. W. Liao Source: The Imaging Science Journal,
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
Advisor: Chang, Chin-Chen Student: Chen, Chang-Chu
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
(k, n)-Image Reversible Data Hiding
Image camouflage by reversible image transformation
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Source :Journal of visual Communication and Image Representation
Reversible data hiding scheme based on significant-bit-difference expansion Sourse: IET Image Processing ( Volume: 11, Issue: 11, ), Pages 1002.
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images Source: Symmetry, vol. 8, no. 6, June.
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
An efficient reversible data hiding method for AMBTC compressed images
Source: Information Sciences, 2018, accpeted.
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source : Signal Processing, vol. 126, pp ,  November 2016
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding
Reversible Data Hiding Scheme Using Two Steganographic Images
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Source:. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL
Source: Signal Processing, Vol. 125, pp , August 2016.
A reversible and secure patient information hiding system for IoT driven e-health Source : International Journal of Information Management, Available online.
Reversible Data Hiding in JPEG Images
Source : Journal of Visual Communication and Image Representation, vol
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Dynamic embedding strategy of VQ-based information hiding approach
Source : Journal of Visual Communication and Image Representation, vol
Partial reversible data hiding scheme using (7, 4) hamming code
Chair Professor Chin-Chen Chang Feng Chia University
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Data hiding method using image interpolation
Chair Professor Chin-Chen Chang Feng Chia University
Partial reversible data hiding scheme using (7, 4) hamming code
New Framework for Reversible Data Hiding in Encrypted Domain
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
Source: IEICE-Transactions on Info and Systems
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Dynamic improved pixel value ordering reversible data hiding
Lossless Data Hiding in the Spatial Domain for High Quality Images
Presentation transcript:

1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected Proof, Available online 3 June 2009 Authors: Wien Hong, Tung-Shou Chen, and Chih-Wei Shiu Presenter: Chia-Chun Wu Date: September 4, 2009

2 OUTLINE INTRODUCTION RELATED WORKS PROPOSED SCHEME EXPERIMENTAL RESULTS CONCLUSIONS

3 要解決的問題 此篇論文主要是利用相鄰像素值非常相近 的特性,以周圍相鄰的像素值來對要進行 隱藏的像素值先進行預測的動作,並計算 預測值跟實際值的差值,接著結合 Ni 等人提 出來的直方圖無失真資料隱藏的方法,藉 由調整預測誤差值來達到達到高容量、低 失真的無失真資料隱藏的目的。

4 INTRODUCTION (1/3) Reversible data hiding (Lossless Data Hiding) Modification of Prediction Errors (MPE) Cover Image Secret Data Lossless Embedding Stego-image Lossless Exaction Lossless Cover Image Secret Data

5 INTRODUCTION (2/3) Reversible data hiding (Lossless Data Hiding) Application: –medical images, military photos, law enforcement Challenges: –Capacity –Quality

6 INTRODUCTION (3/3) Reversible data hiding schemes: –Difference expansion Reversible data embedding using a difference expansion, Jun Tian, IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 890 – 896, Aug Reversible watermark using the difference expansion of a generalized integer transform, Alattar, A.M. IEEE Transactions on Image Processing, vol. 13, no. 8, pp , Aug Adaptive lossless steganographic scheme with centralized difference expansion, C.C. Lee, H.C. Wu, C.S. Tsai, and Y.P. Chu, Pattern Recognition, vol. 41, no. 6, pp , 2008 –Histogram modification Reversible data hiding, Z. Ni, Y.Q. Shi, N. Ansari, and W. Su, IEEE Transactions on Circuits and Systems for Video Technology, vol.16, no.3, pp. 354 – 362, March 2006 Hiding Data Reversibly in an Image via Increasing Differences between Two Neighboring Pixels, C.C. Lin and N.L. Hsueh, IEICE Transactions on Information and Systems, vol. E90–D, no.12, Dec A lossless data hiding scheme based on three-pixel block differences, C.C. Lin and N.L. Hsueh, Pattern Recognition vol. 41, no. 4, pp – 1425, April 2008

7 RELATED WORKS (1/3) Histogram of pixel values Peak point Zero point Original image Stego image Secret data embedding unchanged Ni et al.’s method Extracting

Thodi and Rodriguez’s method Predicted value x i ’ = 2 ×  p i / 2  Prediction error e i between x i and x i ’ e i = x i – x i ’ Expanded prediction error E i = 2 × e i + s j a = 203, b = 205, c = 204, x i = 202 x i ’ = 2 ×  204 / 2  = 204 e i = x i – x i ’= -2 If secret bit s j = 1, E i = 2 × e i + s j = -3 Stego-pixel y i = x i ’ + E i. ( or y i = x i + e i + s j ) y i = (-3) =201 p i = 204 RELATED WORKS (2/3) cb axixi Embedding phase

Thodi and Rodriguez’s method Secret bit s j = LSB(y i ), s j = LSB(y i ) = LSB(201) = 1 Predicted value y i ’ = 2 ×  p i ’ / 2  Expanded prediction error E i = y i – y i ’ Prediction error e i =  E i / 2  x i = y i ’ + e i (or x i = y i – e i – s j ). y i ’ = 2 ×  204 / 2  = 204 p i ’ = 204 E i = 201 – 204 = -3 e i =  -3/ 2  = -2 x i = (-2) = 202 RELATED WORKS (3/3) Extracting phase a = 203, b = 205, c = 204, y i = 201

10 PROPOSE SCHEME (1/6) More suitable Histograms of prediction errors and histogram of pixels in the spatial domain for images Lena and Baboon.

11 Embedding phase PROPOSE SCHEME (2/6) Prediction error e i = x i – p i. cb ax

e 1 = x 1 – p 1 = 0 : embeddable e = e + 1 = 1 c ≤ min (a, b) → p 1 = 156 Secret = Original image I Stego image I’ e 2 = x 2 – p 2 = -4 : non-embeddable e 2 = e 2 – 1 = -5 p 2 = 154 p 5 = 150 e 5 = x 5 – p 5 = 7, all secret bits are embedded, set L=(2,2) PROPOSE SCHEME (3/6) stopping location L

13 Extracting phase PROPOSE SCHEME (4/6) Prediction error e i = x i – p i. cb ax

Original image IStego image I’ e 1 = x 1 ’ – p 1 ’ = 1: secret bit = 1 e = e - 1 = 0 c ≤ min (a, b) → p 1 ’ = e 2 = x 2 ’ – p 2 ’ = -5: no secret bit e = e + 1 = -4 p 2 ’ = e 3 = x 3 ’ – p 3 ’ = -1: secret bit = 0 p 3 ’ = PROPOSE SCHEME (5/6)

Original image IStego image I’ e 1 = x 1 ’ – p 4 ’ = 1: secret bit = 1 e = e - 1 = 0 c ≤ min (a, b) → p 4 ’ = e 1 = x 1 ’ – p 5 ’ = 7 L =(2,2): all embedded message has been extracted p 5 ’ = PROPOSE SCHEME (6/6)

16 EXPERIMENTAL RESULTS (1/6) Experimental results of some commonly used images

17 EXPERIMENTAL RESULTS (2/6) Comparison of PSNR with same embedding capacity

18 EXPERIMENTAL RESULTS (3/6) Experimental results for 23 natural photographic test images sized 768 × 512 (payload is measured in bits).

19 EXPERIMENTAL RESULTS (4/6) Experimental results for test images

20 Capacity versus distortion performance of various methods for test images EXPERIMENTAL RESULTS (5/6)

21 Capacity versus distortion performance of various methods for test images EXPERIMENTAL RESULTS (6/6)

22 CONCLUSIONS The embedding capacity of proposed scheme is much higher than that of Ni et al.’s method. The visual quality of the proposed method is better than that of Thodi’s method.

23 此篇論文之優缺點 優點: – 因為一般影像而言,統計完預測誤值的結果後, Peak bin 的 index 都是 0 ,因此,跟 Ni. 等人的方法比起來,此方法不 需額外記錄 Zero bin 及 Peak bin 的資訊。 –Ni. 等人的方法的方法,不論要藏入的資料量多大,整張影 像中每個像素值都會被修改變動到,此方法利用 Stopping Location L 來記錄 Secret Data 最後藏完時的座標位址,在 這座標之後的像素值就完全不做任何修改或變動,來降低 影像失真的程度。 缺點: – 跟 Ni. 等人的方法比起來,此方法要額外記錄及傳送 Stopping Location L 的資訊給接收端。

24 研究方向 本方法是藉由相鄰的 3 個像素值來進行預測的動作, 若額外多考慮相鄰 1 個像素值的情況下或是利用其它 預測的方法,也許可以提高預測的準確度,當預測的 準確度愈高的情況下, Peak bin 就愈集中在 0 的地方, 相對的最大可以隱藏的資料量就會提高 (Peak bin 的 數量決定隱藏量的大小 ) 。