ECE643 Course Project, Fall 2008 11/21/20081 Optimum histogram pair based image lossless data embedding By G. Xuan, Y. Q. Shi, etc. Summarized By: Zhi.

Slides:



Advertisements
Similar presentations
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Advertisements

Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Fast Algorithms For Hierarchical Range Histogram Constructions
Digital Image Processing
Grey Level Enhancement Contrast stretching Linear mapping Non-linear mapping Efficient implementation of mapping algorithms Design of classes to support.
A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan.
Reversible watermarking Wu Dan Introduction Difference expansion Histogram bin shifting.
Chapter 4: Image Enhancement
Reversible Data Hiding ECE643 Digital Image Processing (I) Course Project Professor: Yun Q. Shi Su Yu 12/02/2011.
Reversible data hiding based on histogram shifting scheme Reporter: Date: Wan-Yu Lu 2012/12/13.
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Methods of Image Compression by PHL Transform Dziech, Andrzej Slusarczyk, Przemyslaw Tibken, Bernd Journal of Intelligent and Robotic Systems Volume: 39,
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Adam Day.  Applications  Classification  Common watermarking methods  Types of verification/detection  Implementing watermarking using wavelets.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
Reversible Color Image Watermarking in YCoCg-R Color Space Aniket Roy under the supervision of Dr. Rajat Subhra Chakraborty.
Reversible medical image watermarking based on wavelet histogram shifting Source: Authors: Reporter: Date: The Imaging Science Journal, Vol. 59, No. 1,
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Multiple Image Watermarking Applied to Health Information Management
Optimal Histogram-pair and Prediction-error Based Image Reversible Data Hiding 1 Computer Science, Tongji University, Shanghai, China 2 ECE, New Jersey.
Lossless Watermarking for Image Authentication: A New Framework and an Implementation IEEE TRANSACTIONS ON IMAGE PROCESSING APRIL 2006 C.M.Chen.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
Reversible watermarking Wu Dan Introduction What?
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
Sampling Design and Analysis MTH 494 Lecture-22 Ossam Chohan Assistant Professor CIIT Abbottabad.
Data Hiding in Image and Video: Part II—Designs and Applications Min Wu, Heather Yu, and Bede Liu.
A lossless data hiding scheme based on three- pixel block differences Ching-Chiuan Lin and Nien-Lin Hsueh Pattern Recognition, Vol. 41(4), April 2008 Pages.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Content Based Color Image Retrieval vi Wavelet Transformations Information Retrieval Class Presentation May 2, 2012 Author: Mrs. Y.M. Latha Presenter:
1 Reversible and lossless data hiding in the integer wavelet transform domain (Review) Authors: S. Yousefi, H. R. Rabiee, E. Yousefi, and M. Ghanbari Speaker:
1 Robust and transparent watermarking scheme for colour images Speaker : Po-Hung Lai Adviser : Chih-Hung Lin Date :
3-D WAVELET BASED VIDEO CODER By Nazia Assad Vyshali S.Kumar Supervisor Dr. Rajeev Srivastava.
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
Lossless Compression-Statistical Model Lossless Compression One important to note about entropy is that, unlike the thermodynamic measure of entropy,
Presenting: Yossi Salomon Noa Reiter Guides: Dr. Ofer Hadar Mr. Ehud Gonen.
Source: IEEE Signal Processing Letters (Accepted)2016
(k, n)-Image Reversible Data Hiding
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Source: IEEE Transactions on Circuits and Systems for Video Technology Vol.26.
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
High Capacity Data Embedding in JPEG Bit Streams Using Visual Models
Reversible Data Hiding in JPEG Images using Ordered Embedding
Increasing Watermarking Robustness using Turbo Codes
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
Yongjian Hu, Member, IEEE, Heung-Kyu Lee, Kaiying Chen, and Jianwei Li
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
Reduction of blocking artifacts in DCT-coded images
Reversible Data Hiding
Reversible Data Hiding Scheme Using Two Steganographic Images
Grey Level Enhancement
Source: IEEE Access, Vol. 6, Dec. 2017, pp
Reversible Data Hiding in JPEG Images
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Data hiding method using image interpolation
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
New Framework for Reversible Data Hiding in Encrypted Domain
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
An Iterative Method for Lossless Data Embedding in BMP Images
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Adopting secret sharing for reversible data hiding in encrypted images
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

ECE643 Course Project, Fall /21/20081 Optimum histogram pair based image lossless data embedding By G. Xuan, Y. Q. Shi, etc. Summarized By: Zhi Yong Li Date: 11/22/2008

ECE643 Course Project, Fall /21/ Outline Previous work Overview Theorem Algorithm Experiment results Conclusion Comments Acknowledgement

ECE643 Course Project, Fall /21/ Previous work Prior this paper, people such as “Xuan” and Dr. Shi has utilized the thresholding method, IWT, histogram modification for the data embedding Into the images, but never reached optimized measures talked about in This paper. Same process as in the left side, after IWT, in most case, histogram will be modified, data was added in HH, HL, LH region with a not optimized threshold.

ECE643 Course Project, Fall /21/ Overview The lossless data hiding scheme proposed in this paper is based on optimum histogram pairs. It is characterized by selection of optimum threshold T, most suitable embedding region R, and minimum possible amount of histogram modification G, in order to achieve highest PSNR of the marked image for a given data embedding capacity

ECE643 Course Project, Fall /21/ Theorem Principle of Histogram Pair –What is the histogram pair In order to illustrate the concept of histogram pair, we first consider a very simple case, That is, only two consecutive integers a and b assumed by X are considered, i.e. x ∈ a, b. Furthermore, let h(a) = m and h(b) = 0. We call these two points as a histogram pair, and sometimes denote it by, h = [m, 0], or simply [m, 0]. we assume m = 4. That is, X actually assumes integer value a four times, i.e., X = [a, a, a, a].

ECE643 Course Project, Fall /21/ Theorem Principle of Histogram Pair –More restrictive definition If for two consecutive non-negative integer values a and b that X can assume, we have h(a) = m and h(b) = n, where m and n are the numbers of occurrence for x = a and x = b, respectively. when a is positive integer, n = 0, we call h = [m, n] as a histogram pair. If a is a negative integer, then h = [m, n] is a histogram-pair as m = 0 and n not equal 0.

ECE643 Course Project, Fall /21/ Theorem Principle of Histogram Pair –Data embedding Suppose the to-be embedded binary sequence is D = [1, 0, 0, 1], when a>0, h(4, 0) and X = [a, a, a, a] data embedding is: X’=D+X=[a+1, a, a, a+1], X’ = [b, a, a, b], and the new histogram is h = [2, 2] when a<0, h(0, 4) and x=[b, b, b, b] data embedding is: X’=D-X=[b-1, b, b, b-1], X’ = [a, b, b, a], and the new histogram is h = [2, 2] –Embedding capacity C=4 –Hidden data extraction Also called histogram pair recovery, is the reverse process of data embedding: after extracting the data D = [1, 0, 0, 1], the histogram pair becomes [4, 0] and we can recover X = [a, a, a, a] losslessly.

ECE643 Course Project, Fall /21/ Theorem Integer Wavelets and Histogram Adjustment –Integer Wavelet Transform (IWT) In this proposed method, data is hidden into IWT coefficients of high- frequency subbands. The motivation of doing so is as follows. 1.Data embedding into high frequency subbands can lead to better imperceptibility of marked image. 2.High data embedding capacity. 3.Higher PSNR owing to the de-correlation property among the wavelet subbands in the same decomposition level than embedding into other transform coefficients such as DCT.

ECE643 Course Project, Fall /21/ Theorem Integer Wavelets and Histogram Adjustment –Histogram Modification 1.Why? To avoid underflow and/or overflow after data embedding into some IWT coefficients. 2.How? Instead of doing the histogram adjustment at the beginning no matter if necessary, do it in necessary. It is observed that it may not need to do histogram modification for some images with some payloads. When the embedding capacity increases, we may need histogram modification.

ECE643 Course Project, Fall /21/ Algorithm Thresholding Method To avoid the possible underflow and/or overflow, often only the wavelet coefficients with small absolute value are used for data embedding. This is the so-called thresholding method, which first sets the threshold T depending on the payload and embeds the data into those IWT coefficients with |x| ≤ T. It does not embed data into the wavelet coefficients with |x| > T. For all high frequency wavelet coefficients with |x| > T we simply add T or −T to x depending x is positive or negative so as to make their magnitude larger than 2T. This may lead to a lower PSNR.

ECE643 Course Project, Fall /21/ Algorithm Optimum Thresholding Method Based on Histogram Pairs It is found that for a given data embedding capacity there does exist an optimum value for T. Therefore the best threshold T for a given data embedding capacity is searched with computer program automatically and selected to achieve the highest PSNR for the marked image.

ECE643 Course Project, Fall /21/ Algorithm Optimum Thresholding Method Based on Histogram Pairs –Optimum thresholding method Divide the histogram into 3 parts: (1) the1st part where data is to be embedded; (2) the central part - no data embedded and the absolute value of coefficients is smaller than that in the 1st part; (3) the end part - no data embedded and the absolute value of coefficients is larger than that in the 1st part. The whole embedding and extraction procedure can be expressed by the formulae in following table.

ECE643 Course Project, Fall /21/ Algorithm Optimum Thresholding Method Based on Histogram Pairs –Optimum thresholding method T is the selected threshold, i.e., start position for data embedding, S is stop position, x is feature (wavelet coefficient) values before embedding, x’ is feature value after embedding, u(S) is unit step function (when S ≥ 0, u(S) = 1, when S < 0, u(S) = 0), x rounds x to the largest integer not larger than x.

ECE643 Course Project, Fall /21/ Algorithm Optimum Thresholding Method Based on Histogram Pairs –Selection of Optimum Parameters For a given required data embedding capacity, the proposed method selects the optimum parameter to achieve the highest possible PSNR. [T,G,R] = argT,G,R max (PSNR) 1.Best threshold T Threshold varies according to images. See left side Figure.

ECE643 Course Project, Fall /21/ Algorithm Optimum Thresholding Method Based on Histogram Pairs –Selection of Optimum Parameters 2. Adaptive modification value G The experiments have shown that only when the embedding data rate is high than certain amount it needs histogram modification (G > 0). Otherwise, there is no need for histogram modification. 3. Suitable data embedding region R In order to improve the PSNR when the payload is small (e.g., < 0.1 bpp), we choose to only embed data into the HH subband, i.e., R = HH. When the payload is large, all three high frequency subbands are used, i.e., R = HH,HL,LH.

ECE643 Course Project, Fall /21/ Algorithm Data Embedding Algorithm The high frequency subbands (HH,HL,LH) coefficients of IWT are used for data embedding in this proposed method. Assume the number of bits to be embedded is L. 4 steps as follows. (1)For a given data embedding capacity, apply our algorithm to the given image to search for an optimum threshold T. And set the P ← T, where T is a starting value for data embedding.

ECE643 Course Project, Fall /21/ Algorithm Data Embedding Algorithm (2) In the histogram of high frequency wavelet coefficients, move all the portion of histogram with the coefficient values greater than P to the right-hand side by one unit to make the histogram at P +1 equal to zero (call P +1 as a zero-point). Then embed data in this point. (3) If some of the to-be-embedded bits have not been embedded yet, let P ← (−P), and move all the histogram (less than P) to the left-hand side by 1 unit to leave a zero-point at the value (−P − 1). And embed data in this point. (4) If all the data have been embedded, then stop embedding and record the P value as the stop value, S. Otherwise, P ← (−P −1), go back to (2) to continue to embed the remaining to-be-embedded data, where S is a stop value. If the sum of histogram for x ∈ [−T,T] is equal L, the S will be zero.

ECE643 Course Project, Fall /21/ Algorithm Data Extraction Algorithm The data extraction is the reverse of data embedding.

ECE643 Course Project, Fall /21/ Algorithm Data Embedding Algorithm

ECE643 Course Project, Fall /21/ Algorithm Example T = 3, S = 2, x ∈ [−5,−4,−3,−2,−1, 0, 1, 2, 3, 4, 5, 6]. h0 = [0, 1, 2, 3, 4, 6, 3, 3, 1, 2, 0, 0], h1 = [1, 0, 2, 3, 4, 6, 3, 3, 0, 1, 0.2], D = [110001], after embedded, h2 = [1, 1, 1, 2, 4, 6, 3, 2, 1, 0, 1, 2] D=[ ],marked in solid (orange) line squares shows how the last 3 bits are embedded.

ECE643 Course Project, Fall /21/ Algorithm Example (continue) (a) original one, (b) after 3 expanding, (c) after 6-bit embedding (what marked is how the last 3 bits are embedded)

ECE643 Course Project, Fall /21/ Experiment results Experimental Results and Performance Comparison (a) Comparison on Barbara (b) Comparison on Baboon

ECE643 Course Project, Fall /21/ Experiment results Experimental Results and Performance Comparison same image with different methods, Proposed method show the better PSNR results. (a) Performance comparison on Lena (b) Comparison of multiple-time data embedding into Lena image among [2],[8] and the proposed method

ECE643 Course Project, Fall /21/ Experiment results Experimental Results and Performance Comparison GL and GR adjusted according to bpp. Proposed method shows the better result. (a) Original and marked Lena image with three different payloads by the proposed method (b) Performance on Lena image reported in “Coltuc, D.: Improved capacity reversible watermarking”

ECE643 Course Project, Fall /21/ Experiment results Comparison by Using Integer (5,3) and Haar Wavelets Integer(5.3) wavelet shows the better result.

ECE643 Course Project, Fall /21/ Conclusion Superior performance in terms of the visual quality of marked image measured by PSNR versus data embedding capacity over, to author’s best knowledge, all of the prior arts. The proposed method uses integer (5,3) and Haar wavelet transforms in our experiments show that integer (5,3) wavelet is better than that by using integer Haar wavelet transform.

ECE643 Course Project, Fall /21/ Conclusion The new method has more flexibility and simplicity in the implementation because of using adaptive histogram modification and selecting suitable region. The computational complexity, is shown affordable for possible real applications. – Specifically, for data embedding ranging from 0.01 bpp to 1.0 bpp into Lena, Barbara and Baboon, the execution time varies from 0.25 sec. to 2.68 sec. If the data embedding rate is not high, the amount of histogram modification G = 0, meaning that the histogram shrinkage is not needed, which is more simple to be implemented.

ECE643 Course Project, Fall /21/ Comments Do we need to care about the “robust” and “unambiguous” in the data hiding? Embedded data in the high frequency region is not a secure way in case the marked image might go through the low pass filter.

ECE643 Course Project, Fall /21/ Acknowledgement The Summary also referred to the following –Cox et al., “Secure spread spectrum watermarking for multimedia,” IEEE Transactions on Image Processing, 6(12): , –Fundamentals of Watermarking and Data Hiding by Perrie Moulin – Wen - Chih Hong –Integer transform by Wen - Chih Hong