Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:

Slides:



Advertisements
Similar presentations
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Advertisements

CHEN XIAOYU HUANG. Introduction of Steganography A group of data hiding technique,which hides data in undetectable way. Features extracted from modified.
A Secret Information Hiding Scheme Based on Switching Tree Coding Speaker: Chin-Chen Chang.
A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan.
A reversible data hiding method by histogram shifting in high quality medical images Author: Li-Chin Huang, Lin-Yu Tseng, Min-Shiang Hwang Source: The.
New Attacks on Sari Image Authentication System Proceeding of SPIE 2004 Jinhai Wu 1, Bin B. Zhu 2, Shipeng Li, Fuzong Lin 1 State key Lab of Intelligent.
Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Chinese University of Hong Kong Department of Information Engineering A Capacity Estimate Technique for JPEG-to-JPEG Image Watermarking Peter Hon Wah Wong.
Watermarking For Image Authentication Presented by San-Hao Wang.
CS Spring 2012 CS 414 – Multimedia Systems Design Lecture 8 – JPEG Compression (Part 3) Klara Nahrstedt Spring 2012.
1 Image Compression. 2 GIF: Graphics Interchange Format Basic mode Dynamic mode A LZW method.
Klara Nahrstedt Spring 2011
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
Bit-4 of Frequency Domain-DCT Steganography Technique 1 Nedal M. S. Kafri and Hani Y. Suleiman Networked Digital Technologies, NDT '09. First International.
A Novel steganographic method for JPEG images by Vasiliy Sachnev - Introduction  JPEG compression  Steganography - Block based steganography method (F5)
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
1 An Efficient VQ-based Data Hiding Scheme Using Voronoi Clustering Authors:Ming-Ni Wu, Puu-An Juang, and Yu-Chiang Li.
ECE643 Course Project, Fall /21/20081 Optimum histogram pair based image lossless data embedding By G. Xuan, Y. Q. Shi, etc. Summarized By: Zhi.
Introduction to Steganalysis Schemes Multimedia Security.
CS Spring 2014 CS 414 – Multimedia Systems Design Lecture 10 – Compression Basics and JPEG Compression (Part 4) Klara Nahrstedt Spring 2014.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
Multiple-description iterative coding image watermarking Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 20, No. 4, pp , 2010.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Palette Partition Based Data Hiding for Color Images Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, and Chien-Ting Huang Speaker : Yu-Chiang Li.
A lossless data hiding scheme based on three- pixel block differences Ching-Chiuan Lin and Nien-Lin Hsueh Pattern Recognition, Vol. 41(4), April 2008 Pages.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
JPEG Image Compression Standard Introduction Lossless and Lossy Coding Schemes JPEG Standard Details Summary.
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
STATISTIC & INFORMATION THEORY (CSNB134) MODULE 11 COMPRESSION.
1 Robust and transparent watermarking scheme for colour images Speaker : Po-Hung Lai Adviser : Chih-Hung Lin Date :
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
JPEG. Introduction JPEG (Joint Photographic Experts Group) Basic Concept Data compression is performed in the frequency domain. Low frequency components.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
Presenting: Yossi Salomon Noa Reiter Guides: Dr. Ofer Hadar Mr. Ehud Gonen.
An improved SVD-based watermarking scheme using human visual characteristics Chih-Chin Lai Department of Electrical Engineering, National University of.
A Secret Information Hiding Scheme Based on Switching Tree Coding
High Capacity Data Embedding in JPEG Bit Streams Using Visual Models
Reversible Data Hiding in JPEG Images using Ordered Embedding
Source : Signal Processing, Volume 133, April 2017, Pages
Watermarking for Image Authentication ( Fragile Watermarking )
Source :Journal of visual Communication and Image Representation
Chair Professor Chin-Chen Chang Feng Chia University
High-capacity image hiding scheme based on vector quantization
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
A Study of Digital Image Coding and Retrieving Techniques
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
Reversible Data Hiding Scheme Using Two Steganographic Images
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
Reversible Data Hiding in JPEG Images
Digital Steganography Utilizing Features of JPEG Images
High Capacity Data Hiding for Grayscale Images
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Author: Minoru Kuribayashi, Hatsukazu Tanaka
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
New Framework for Reversible Data Hiding in Encrypted Domain
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Hidden Digital Watermarks in Images
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Lossless Data Hiding in the Spatial Domain for High Quality Images
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Adopting secret sharing for reversible data hiding in encrypted images
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker: Gung-Shian Lin Date:2009/12/17

2 Outline 1. Introduction 2. Related works 3. Proposed scheme 4. Experimental results 5. Conclusions

3 Introduction Lossless and reversible steganography scheme for hiding secret data in each block of quantized DCT coefficients in JPEG images.

4 Introduction In 2001, Fridrich et al. proposed Invertible authentication watermark for JPEG images. In 2004, Iwata et al. proposed Digital steganography utilizing features of JPEG images.

5 Related works RGB transformation for JPEG RGB Image Transformation RGB→YCbCr Composition MCU 2-D DCT Quantization Table Runlength coding Huffman coding Huffman Table JPEG Image

6 Proposed scheme Embedding procedure R5R5 R9R9 R8R8 R7R7 R6R6 R1R1 R2R2 R4R4 R3R3 b i be the length of ceaseless zeros z i,1 represents the zero value of the lowest frequency

7 Proposed scheme R5R5 R4R4 R3R3 R2R2 R1R1 s i be the secret bit we want to embed into set R i

8 Proposed scheme The embedding strategies and elimination measures for ambiguous conditions are as follows: Case 1:If b i ≧ 2, we use the value of z i,2 to indicate the hidden secret bit in set R i (1 ≦ i ≦ 9). We modify the value of z i,2 to hide secret bit by using the Eq. where 1 or -1 is randomly selected.

9 Proposed scheme Ambiguous condition A and its remedial measure 。 1 0 x R1R1

10 Proposed scheme where 3 ≦ (j - 1) ≦ k i R2R2

11 Proposed scheme Case 2: If b i < 2 and both z i,1 and z i,2 do not exist, none secret bits can be hidden in a set R i. Two ambiguous conditions may exist, and therefore two remedial measures for eliminating them are described below.  Ambiguous condition B and its remedial measure  Ambiguous condition C and its remedial measure

12 Proposed scheme Example of embedding:assume four secret bits, 0, 0, 1 and 1

13 Proposed scheme Extracting procedure Step 1. Obtain non-overlapping 8 * 8 blocks of quantized DCT coefficients of the Y components from a JPEG stego-image after Huffman decoding and runlength decoding. Step 2. Scan each block according to a predetermined order.Step 3. For each set R i in a block, let r i,j be the highest frequency non-zero component, where 1 ≦ i ≦ 9 and 1 ≦ j ≦ k i. Step 4. Extract si from set Ri by using the following rules:Step 5. Repeat Steps 3 and 4 until all blocks are processed. RiRi r i,j = 1 or -1 r i,j does not existr i,j ≠1 or -1 r i,j+1 = 0j≦2j≦2 r i,j-1 = 0 and r i,j-2 = 0 r i,j+1 ≠0 r i,j-1 = 0 and r i,j-2 = 0 j≦2j≦2 s i =0 mark r i,j-2 as z i,2 s i does not exist s i =0 mark r i,1 as z i,2 s i does not exist s i =0 mark r i,j-2 as z i,2 s i =1 mark r i,j as z i,2

14 Proposed scheme Restoring procedure  Rule 1: If s i exists and r’ i,j+3 = 0, where 4 ≦ (j + 3) ≦ k i, then the original value of r’ i,j+2 is restored by using Eq.  Rule 2:If s i does not exist and the two highest coefficients (r’ i,1 , r’ i,2 ) of set R i equals (x, 0), where x≠0, then the original value of r’ i,1 is restored by using Eq. where 3 ≦ (j + 2) < k i.

15 Proposed scheme  Rule 3: If s i does not exist and the pair having the three highest coefficients (r’ i,1, r’ i,2, r’ i,3 ) of set R i equals (0,x,0), where x≠0, then the original value of r’ i,2 is restored by using Eq.

16 Proposed scheme

17 Proposed scheme Modifying quantization table for better image quality and hiding capacity

18 Experimental results

19 Experimental results

20 Experimental results

21 Conclusions The scheme provides stego-images with acceptable image quality and similar hiding capacity can be achieved with the Iwata et al. scheme 。 The scheme can withstand visual and statistical attacks 。