1 Adaptive Data Hiding in Palette images by Color Ordering and Mapping With Security Protection Authors: Chih-Hsuan Tzeng, Zhi-Fang Yang, and Wen-Hsiang.

Slides:



Advertisements
Similar presentations
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
Advertisements

Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
1 A Combined Approach to Integrity Protection and Verification of Palette Images Using Fragile Watermarks and Digital Signatures Source: IEICE TRANS. On.
Improvement of Multi-bit Information Embedding Algorithm for Palette-Based Images Anu Aryal, Kazuma Motegi, Shoko Imaizumi and Naokazu Aoki Division of.
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
A Novel steganographic method for JPEG images by Vasiliy Sachnev - Introduction  JPEG compression  Steganography - Block based steganography method (F5)
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
A New Approach to Image Authentication Using Chaotic Map and Sudoku Puzzle 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia.
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
1 A Steganographic Scheme for Secure Communications Based on the Chaos and Eular Theorem Der-Chyuan Lou and Chia-Hung Sung IEEE Transactions on Multimedia,
Data Hiding in a Kind of PDF Texts for Secret Communication Authors : S.P. Zhong, X.Q. Cheng, and T.R. Chen Source : International Journal of Network Security,
Palette Partition Based Data Hiding for Color Images Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, and Chien-Ting Huang Speaker : Yu-Chiang Li.
A lossless data hiding scheme based on three- pixel block differences Ching-Chiuan Lin and Nien-Lin Hsueh Pattern Recognition, Vol. 41(4), April 2008 Pages.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Key Establishment Scheme against Storage-Bounded Adversaries in Wireless Sensor Networks Authors: Shi-Chun Tsai, Wen-Guey Tzeng, and Kun-Yi Zhou Source:
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
1 A Color Image Hidden in a Grey-Level Image IS&T Third European Conference on Colour in Graphics, Imaging, and Vision, CGIV’2006, pp. 226–231, (Leeds,
1 Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems Adviser: Chih-Hung Lin Speaker : Chia-Wei Chang Date:2009/10/06.
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
影像偽裝術 Dr. Chin-Chen Chang
Palette Partition Based Data Hiding for Color Images
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
Advisor: Chin-Chen Chang1, 2 Student: Yi-Hui Chen2
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Chair Professor Chin-Chen Chang Feng Chia University
Chair Professor Chin-Chen Chang Feng Chia University
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images Source: Symmetry, vol. 8, no. 6, June.
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
A Color Image Hidden in a
Hiding Data in a Color Palette Image with Hybrid Strategies
A Study of Digital Image Coding and Retrieving Techniques
A Restricted Region-based Data-hiding Scheme
Reversible Data Hiding Scheme Using Two Steganographic Images
A reversible and secure patient information hiding system for IoT driven e-health Source : International Journal of Information Management, Available online.
Data hiding method using image interpolation
Dynamic embedding strategy of VQ-based information hiding approach
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Digital Steganography Utilizing Features of JPEG Images
High Capacity Data Hiding for Grayscale Images
Chair Professor Chin-Chen Chang Feng Chia University
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Digital Watermarking for Image Authentication with Localization
Data hiding method using image interpolation
EarthTour Presentations
Chair Professor Chin-Chen Chang Feng Chia University
New Framework for Reversible Data Hiding in Encrypted Domain
Novel Multiple Spatial Watermarking Technique in Color Images
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Source: IEICE-Transactions on Info and Systems
Secret image sharing with steganography and authentication
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Sourse: Information Sciences, Vol. 494, pp , August 2019
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
LSB matching revisited
Sourse: arXiv preprint, arXiv: , 2018 (Submit to IEEE Trans
Lossless Data Hiding in the Spatial Domain for High Quality Images
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
Reversible data hiding in encrypted binary images by pixel prediction
Presentation transcript:

1 Adaptive Data Hiding in Palette images by Color Ordering and Mapping With Security Protection Authors: Chih-Hsuan Tzeng, Zhi-Fang Yang, and Wen-Hsiang Tsai Source: IEEE Transactions On Communications, Vol. 52, No. 5, May 2004, pp Adviser : Wen-Chung Kuo Jiin -Chiou Cheng Repoter : Wei-De Hsu

2 Outline Introduction The proposed method –Color-ordering relationship –Color-mapping function –Data-embedding process –Data-extraction process Experimental results Conclusions

3 Introduction Gifshuffle –The idea is to permute the colors in the palette of an image in a specific order in accordance with the secret data. (256!) indexescolors Ex: 4! [6] M. Kwan. (1998) GIF Colormap Steganography. [Online]. Available:

4 Introduction (a) The original image. (b) Replacement by the closet color. (c) Replacement by the neighboring color. Three colors c 1, c 2, c 3, with RGB values (0, 174, 239), (57, 181, 74), and (236, 0, 140) are contained in the sample images. [12] J. Fridrich and R. Du, “Secure steganographic methods for palette images,” in Proc. 3 rd Int. Workshop Information Hiding, Dresden, Germany, 1999, pp. 47–60.

5 Color-ordering relationship c1c1 c2c2 c3c3 c4c4

6 Proposed data-embedding process

7 Proposed data-embedding process Non-embeddable

8 Proposed data-embedding process embeddable

9 Color-mapping function c1c1 c2c2 c3c3 c4c4

10 Color-mapping function Hiding 0Hiding 1

11 Data-extraction process

12 Experimental results bits/44.8dB

13 Experimental results 2003 bits/43.7dB

14 Experimental results

15 Conclusions The experimental results show that secret data can be embedded and extracted successfully without producing visual artifacts in the cover image. A good balance between stego-image quality and data-embedding capacity can be achieved.