Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp.941-953, 2012 Chin-Feng.

Slides:



Advertisements
Similar presentations
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
Advertisements

1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan.
A reversible data hiding method by histogram shifting in high quality medical images Author: Li-Chin Huang, Lin-Yu Tseng, Min-Shiang Hwang Source: The.
多媒體網路安全實驗室 Source:International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH- MSP),2010 Sixth. Authors:Hsiang-Cheh.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Piyu Tsia,Yu-Chen Hu,Hsiu-Lien Yen Signal Processing 日期 :1 月 4 號 報告者 : 許睿中.
Reversible data hiding based on histogram shifting scheme Reporter: Date: Wan-Yu Lu 2012/12/13.
Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Improved PVO-based reversible data hiding Source: Digital Signal Processing, 2014 Authors: Fei Peng, Xiaolong Li,ng Reporter: Min-Hao Wu.
Reversible Image Watermarking Using Interpolation Technique Source: IEEE Transcation on Information Forensics and Security, Vol. 5, No. 1, March 2010 Authors:
Reversible medical image watermarking based on wavelet histogram shifting Source: Authors: Reporter: Date: The Imaging Science Journal, Vol. 59, No. 1,
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
1 資訊隱藏技術之研究 The Study of Information Hiding Mechanisms 指導教授: Chang, Chin-Chen ( 張真誠 ) 研究生: Lu, Tzu-Chuen ( 呂慈純 ) Department of Computer Science and Information.
Palette Partition Based Data Hiding for Color Images Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, and Chien-Ting Huang Speaker : Yu-Chiang Li.
A lossless data hiding scheme based on three- pixel block differences Ching-Chiuan Lin and Nien-Lin Hsueh Pattern Recognition, Vol. 41(4), April 2008 Pages.
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
1 Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems Adviser: Chih-Hung Lin Speaker : Chia-Wei Chang Date:2009/10/06.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
人力資源報告 Image and Signal Processing 1 Steganography Using Sudoku Revisited Wien Hong, Tung-Shou Chen, Chih-Wei Shiu Department of Information Management,
1 Security of fragile watermarking scheme for image authentication Authors: K. C. Liao, W. B. Lee, and C. W. Liao Source: The Imaging Science Journal,
(k, n)-Image Reversible Data Hiding
Palette Partition Based Data Hiding for Color Images
Information Hiding Technology: Current Research and Future Trend
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Source: IEEE Transactions on Circuits and Systems for Video Technology Vol.26.
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
Reversible Data Hiding in JPEG Images using Ordered Embedding
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Source :Journal of visual Communication and Image Representation
Mean value based reversible data hiding in encrypted images
Hiding Data in a Color Palette Image with Hybrid Strategies
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
Source: Information Sciences, 2018, accpeted.
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source : Signal Processing, vol. 126, pp ,  November 2016
Some Novel Steganographic Methods for Digital Images
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding Scheme Using Two Steganographic Images
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Source: Signal Processing: Image Communication 64 (2018) 78-88
Source: Signal Processing, Vol. 125, pp , August 2016.
A reversible and secure patient information hiding system for IoT driven e-health Source : International Journal of Information Management, Available online.
Source : Journal of Visual Communication and Image Representation, vol
Data hiding method using image interpolation
Information Hiding and Its Applications
Source : Journal of Visual Communication and Image Representation, vol
Sourse: Multimedia Tools and Applications, 2018, pp 1–17
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Data hiding method using image interpolation
Partial reversible data hiding scheme using (7, 4) hamming code
New Framework for Reversible Data Hiding in Encrypted Domain
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection Source: Multimedia.
Source: IEICE-Transactions on Info and Systems
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Reversible data hiding in encrypted binary images by pixel prediction
Presentation transcript:

Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng Lee and Hsing-Ling Chen Wan-Yu Lu 2012/12/19

2 Outline Introduction Related work – Tseng and Hsiehs’ scheme The proposed scheme – Embedding phase – Extraction and recovery phase Experimental results Conclusions

3 Introduction Data hiding is referred to as a process to hide some information data into cover media. The data hiding schemes can be generally classified into two categories: - Irreversible data hiding - Reversible data hiding Reversible data hiding schemes can be classified into two categories: - Difference expansion scheme (DE-based) - Histogram-based

4 Introduction Embedding Cover image Stego-image Extraction Secret message Reversible data hiding

Related work – Tseng and Hsiehs’ scheme (1/10) Related work – Tseng and Hsiehs’ scheme (1/10) Pre-processing: LKLeft-side scan sequenceRight-side scan sequence Overhead [27] H.W. Tseng, C.P. Hsieh, Prediction-based reversible data hiding, Information Sciences 179 (2009) 2460–2469

Related work – Tseng and Hsiehs’ scheme (2/10) Related work – Tseng and Hsiehs’ scheme (2/10) Pixel value prediction: Cover image Embed T=

Related work – Tseng and Hsiehs’ scheme (3/10) Related work – Tseng and Hsiehs’ scheme (3/10) Embedding - Case 1 : Cover image T= W=0 W=1

Related work – Tseng and Hsiehs’ scheme (4/10) Related work – Tseng and Hsiehs’ scheme (4/10) Embedding - Case 2 : Cover image T=

Related work – Tseng and Hsiehs’ scheme (5/10) Related work – Tseng and Hsiehs’ scheme (5/10) Embedding - Case 3 : Cover image T=

Related work – Tseng and Hsiehs’ scheme (6/10) Related work – Tseng and Hsiehs’ scheme (6/10) Extracting: Watermarked image T=

11 Related work – Tseng and Hsiehs’ scheme (7/10) Related work – Tseng and Hsiehs’ scheme (7/10) Extracting - Case 1 : Watermarked image T=

12 Related work – Tseng and Hsiehs’ scheme (8/10) Related work – Tseng and Hsiehs’ scheme (8/10) Extracting - Case 2 : Watermarked image T=

13 Related work – Tseng and Hsiehs’ scheme (9/10) Related work – Tseng and Hsiehs’ scheme (9/10) Extracting - Case 3 : Watermarked image T=

14 Related work – Tseng and Hsiehs’ scheme (10/10) Related work – Tseng and Hsiehs’ scheme (10/10) Post-processing : Watermarked image T= LKLeft-side scan sequenceRight-side scan sequence Overhead Cover image

15 The proposed scheme(1/11) Related work v.s Proposed scheme : Tseng and Hsieh’s scheme Proposed scheme Prediction value (P) = ( )/2 =

The proposed scheme(2/11) Pre-processing: Cover image Cover image

17 The proposed scheme(3/11) Embedding phase: Cover image T=0 S= Rule 1: d ≦ T

18 The proposed scheme(4/11) Embedding phase: Cover image T=0 S=1 Rule 2: d > T

19 The proposed scheme(5/11) Embedding phase: Cover image T=0 S=1 Rule 2: d > T

20 The proposed scheme(6/11) Embedding phase: Cover image T=0 S=1 Rule 2: d > T 0

21 The proposed scheme(7/11) Extraction and recovery phase: Stego-image T=0 Rule 2: d’ > 2 x T + 1

22 The proposed scheme(8/11) Extraction and recovery phase : Stego-image T=0 Rule 2: d’ > 2 x T + 1

23 The proposed scheme(9/11) Extraction and recovery phase : Stego-image T=0 Rule 2: d’ > 2 x T + 1

24 The proposed scheme(10/11) Extraction and recovery phase : Stego-image T= Rule 1: d’ ≦ 2 x T + 1

The proposed scheme(11/11) Post-processing: Stego-image Cover image

26 Experimental results (1/14) Amount of overhead information associated with different thresholds

27 Experimental results (2/14) Embedding rate versus image quality of all tested images with various thresholds. Embedding rate

28 Experimental results (3/14) Embedding rate versus image quality of all tested images with various thresholds. Image quality

29 Experimental results (4/14) Histograms of prediction-errors for test images “Lena” and “Baboon” obtained using Tseng and Hsieh’s scheme (T = 5).

30 Experimental results (5/14) Histograms of prediction-errors for test images “Lena” and “Baboon” obtained using the proposed scheme (T = 5).

31 Experimental results (6/14) dB and 0.99 bpp dB and 0.71 bpp 48.6 dB and 0.2 bpp 47.9 dB and 0.06 bpp

32 Comparisons of embedding rates (bpp) of proposed scheme and that of Tseng and Hsieh. Experimental results (7/14)

33 Comparisons of image quality (dB) of Tseng and Hsieh’s and the proposed schemes with the same embedding capacity. Experimental results (8/14)

34 Experimental results (9/14) Comparisons of embedding rates (bpp) of proposed scheme and that of Tseng and Hsieh at difference thresholds.

35 Experimental results (10/14) Comparisons of image quality (dB) of Tseng and Hsieh’s and the proposed schemes with the same embedding capacity.

36 Experimental results (11/14) (a)MR_liver_t1 (b)MR_ped_chest (c)MR_sag_head Capacity versus distortion performance of proposed and other schemes for test images: (a) Lena

37 Experimental results (12/14) Capacity versus distortion performance of proposed and other schemes for test images: (b) F16

38 Experimental results (13/14) Capacity versus distortion performance of proposed and other schemes for test images: (c) Baboon

39 Experimental results (14/14) Capacity versus distortion performance of proposed and other schemes for test images: (d) Boats

40 Conclusions Flexibility and scalability. - A lower threshold yields a higher visual stego-image quality. - A higher threshold yields a higher embedding rate. To solve underflow and overflow. To Increase the embedding rate and reduce image distortion.

Thanks for your attention !