Reversible watermarking Wu Dan 2008.2.20. Introduction What?

Slides:



Advertisements
Similar presentations
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Advertisements

Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A Secret Information Hiding Scheme Based on Switching Tree Coding Speaker: Chin-Chen Chang.
A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan.
A reversible data hiding method by histogram shifting in high quality medical images Author: Li-Chin Huang, Lin-Yu Tseng, Min-Shiang Hwang Source: The.
Reversible watermarking Wu Dan Introduction Difference expansion Histogram bin shifting.
多媒體網路安全實驗室 Source:International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH- MSP),2010 Sixth. Authors:Hsiang-Cheh.
Reversible Data Hiding ECE643 Digital Image Processing (I) Course Project Professor: Yun Q. Shi Su Yu 12/02/2011.
Reversible data hiding based on histogram shifting scheme Reporter: Date: Wan-Yu Lu 2012/12/13.
Vishnu Vardhan Reddy Mukku Mav ID : Under the guidance of.
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Improved PVO-based reversible data hiding Source: Digital Signal Processing, 2014 Authors: Fei Peng, Xiaolong Li,ng Reporter: Min-Hao Wu.
Using quad smoothness to efficiently control capacity–distortion of reversible data hiding Chi-Nan Lin, Daniel J. Buehrer, Chin-Chen Chang, Tzu-Chuen Lu.
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
Reversible Color Image Watermarking in YCoCg-R Color Space Aniket Roy under the supervision of Dr. Rajat Subhra Chakraborty.
Reversible medical image watermarking based on wavelet histogram shifting Source: Authors: Reporter: Date: The Imaging Science Journal, Vol. 59, No. 1,
Reversible Data Embedding Using Difference Expansion IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No. 8, Aug. 2003, page(s):
Lossless Watermarking for Image Authentication: A New Framework and an Implementation IEEE TRANSACTIONS ON IMAGE PROCESSING APRIL 2006 C.M.Chen.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
ECE643 Course Project, Fall /21/20081 Optimum histogram pair based image lossless data embedding By G. Xuan, Y. Q. Shi, etc. Summarized By: Zhi.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
Reversible Date Hiding Based on Histogram Modification of pixel Differences IEEE Transactions on circuits and systems for video technology, VOL. 19, NO.
1 Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform Source : IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 13, NO. 8,
1 資訊隱藏技術之研究 The Study of Information Hiding Mechanisms 指導教授: Chang, Chin-Chen ( 張真誠 ) 研究生: Lu, Tzu-Chuen ( 呂慈純 ) Department of Computer Science and Information.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
A lossless data hiding scheme based on three- pixel block differences Ching-Chiuan Lin and Nien-Lin Hsueh Pattern Recognition, Vol. 41(4), April 2008 Pages.
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
1 Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform Source : IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 13, NO. 8,
Vishnu Vardhan Reddy Mukku Mav ID : Under the guidance of.
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
(k, n)-Image Reversible Data Hiding
Reversible Data Hiding in JPEG Images using Ordered Embedding
Source : Signal Processing, Volume 133, April 2017, Pages
Source :Journal of visual Communication and Image Representation
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
A Data Hiding Scheme Based Upon Block Truncation Coding
Yongjian Hu, Member, IEEE, Heung-Kyu Lee, Kaiying Chen, and Jianwei Li
A Restricted Region-based Data-hiding Scheme
Source: Information Sciences, 2018, accpeted.
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source : Signal Processing, vol. 126, pp ,  November 2016
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding
Reversible Data Hiding Scheme Using Two Steganographic Images
Reversible Data Hiding in JPEG Images
Source : Journal of Visual Communication and Image Representation, vol
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Dynamic embedding strategy of VQ-based information hiding approach
Information Hiding and Its Applications
Source : Journal of Visual Communication and Image Representation, vol
EarthTour Presentations
New Framework for Reversible Data Hiding in Encrypted Domain
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
Source: IEICE-Transactions on Info and Systems
An Iterative Method for Lossless Data Embedding in BMP Images
Authors: Jun Tian Speaker: J.H. Liu
A Data Hiding Scheme Based Upon Block Truncation Coding
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Hidden Digital Watermarks in Images
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
A Restricted Region-based Data-hiding Scheme
Adopting secret sharing for reversible data hiding in encrypted images
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Reversible watermarking Wu Dan

Introduction What?

Introduction Why? Military data Medical data How? Data compression

Difference expansion Histogram bin shifting

Reversible Data Embedding using a Difference Expansion Jun Tian IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL.13 NO.8 AUGUST 2003

How to measure a reversible data embedding algorithm? Payload capacity (bpp) Visual quality (PSNR) Complexity

A simple example of the difference expansion x=206, y=201; b=1. l: the integer average h: difference DE: difference expansion The new values:

Reversible data embedding Reversible integer transform The inverse transform: To prevent the overflow and underflow :

Expandable and changeable difference values Expandable: (for both b=1,0) Changeable: (for both b=0,1)

By definition, we can find that: If h is changeable, h ’ is still changeable. If h is expandable, h is changeable. After the DE, the expanded difference value h ’ is changeable. if h=0 or -1, the conditions on expandable and changeable are equivalent.

Data embedding algorithm : 1. The original image is grouped into pairs of pixels values. Then compute the difference values h. 2. Create four disjoint sets of difference values: EZ, EN, CN, and NC EZ: contains all expandable h=0 and expandable h=-1. EN: contains all expandable h EZ

CN: contains all changeable NC: contains all non-changeable h. 3. Create a location map of selected expandable difference values.

4. Collect original LSBs of difference values in EN2 and CN. However for those h=1 or h=-2 in EN2 and CN, their LSBs will be not collected. 5. The location map will be losslessly compressed. The compressed bit stream is denoted as L. Embed L, the original LSBs C, and a payload P. 6. Apply the inverse integer transform to obtain the embedded image.

Discussions: Capacity: Threshold:

The scanning order: Non-changeable: Scanning order :

Non-changeable:

decoding : 1. Calculate the difference values h. 2. Create two disjoint sets of difference values: CH and NC changeable and non-changeable 3. Collect LSBs of all difference values in CH, and form a binary bit stream B. 4. Decode the location map from B, and restore the original values of differences as follows:

Experimental results:

Alattar Jun Tian Chin-chen Chang Dinu Coltuc

Reversible data hiding Zhicheng Ni, Yun-Qing,Nirwan Ansari, and Wei Su IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, March 2006

Algorithm Zero point and peak point

Embedding: Generate the histogram H(x). In the histogram, find the zero point H(a) and peak point H(b). If H(b)>0,record the coordinate of those pixels. Assume a<b. Scan the image. If x ∈ (a,b),x+1; leaving the value a+1 empty. If w=0, a=a; if w=1,a=a+1.

Pure payload: C=H(a) - H(b) Multiple pairs of Maximum and minimum points:

Extraction algorithm: ( Assume the zero point and peak points are a,b ) Scan the image in the same order as in the embedding procedure. If the value is a+1,w=1; if the value is a, w=0. Scan the image again, if the grayscale value x ∈ (a,b], x-1. If the overhead information found in the extracted data, set the pixel grayscale value as b.

Lower bound of the PSNR of a Marked image The total embedding time is just 100ms.

Experimental results

Discussion: 1) How to get the peak point and zero point for verifier? 2) How to use the a and a+1?

Reversible watermark using the difference expansion of a generalized integer transform Adnan M.Alattar, Member, IEEE, IEEE TRANSACTIONS ON IMAGE PROCESSING, AUGUST 2004

Generalized difference expansion Vector: Reversible integer transform:

return

A difference expansion oriented data hiding scheme for restoring the original host images Chin-Chen Chang, Tzu-Chuen Lu The Journal of systems and software, May 2006

return

Very Fat Watermarking by Reversible Contrast Mapping Dinu Coltuc and Jean-Marc Chassery IEE SIGNAL PROCESSING LETTERS, APRIL 2007

Reversible contrast mapping:

Dc: the domain without the odd pixels pairs. Embedding: 1 partition the entire image into pairs. 2 for each pair: a) if (x,y) is even pixel pair, set the LSB x ’ to 1, the LSB of y ’ is the watermark. b) if (x,y) ∈ Dc, set the LSB of x to 0, and the LSB of y is the watermark. c) if (x,y) Dc, set the LSB of x to 0, and save the ture value. return