1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,

Slides:



Advertisements
Similar presentations
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
Advertisements

Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery Source: Pattern Recognition, Vol. 41, Issue 2,
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A Secret Information Hiding Scheme Based on Switching Tree Coding Speaker: Chin-Chen Chang.
Vector Quantization. 2 outline Introduction Two measurement : quality of image and bit rate Advantages of Vector Quantization over Scalar Quantization.
Fast vector quantization image coding by mean value predictive algorithm Authors: Yung-Gi Wu, Kuo-Lun Fan Source: Journal of Electronic Imaging 13(2),
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
1 An Efficient VQ-based Data Hiding Scheme Using Voronoi Clustering Authors:Ming-Ni Wu, Puu-An Juang, and Yu-Chiang Li.
Palette Partition Based Data Hiding for Color Images Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, and Chien-Ting Huang Speaker : Yu-Chiang Li.
A Fast LBG Codebook Training Algorithm for Vector Quantization Presented by 蔡進義.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
Advisor: Chang, Chin-Chen Student: Chen, Chang-Chu
基於龜殼魔術矩陣的隱寫技術及其衍生的研究問題
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Palette Partition Based Data Hiding for Color Images
A Secret Information Hiding Scheme Based on Switching Tree Coding
An Information Hiding Scheme Using Sudoku
Chapter 3 向量量化編碼法.
A New Image Compression Scheme Based on Locally Adaptive Coding
Advisor: Chin-Chen Chang1, 2 Student: Yi-Hui Chen2
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Information Steganography Using Magic Matrix
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Source :Journal of visual Communication and Image Representation
Chair Professor Chin-Chen Chang Feng Chia University
High-capacity image hiding scheme based on vector quantization
Advisor: Chin-Chen Chang1, 2 Student: Wen-Chuan Wu2
指導教授: Chang, Chin-Chen (張真誠)
A Data Hiding Scheme Based Upon Block Truncation Coding
第七章 資訊隱藏 張真誠 國立中正大學資訊工程研究所.
Hiding Data in a Color Palette Image with Hybrid Strategies
A Study of Digital Image Coding and Retrieving Techniques
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
An Innovative Steganographic Scheme Based on Vector Quantization
An Innovative Steganographic Scheme Based on Vector Quantization
第 四 章 VQ 加速運算與編碼表壓縮 4-.
Reversible Data Hiding Scheme Using Two Steganographic Images
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
Density-Based Image Vector Quantization Using a Genetic Algorithm
Information Steganography Using Magic Matrix
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
Dynamic embedding strategy of VQ-based information hiding approach
Chair Professor Chin-Chen Chang Feng Chia University
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Hiding Information in VQ Index Tables with Reversibility
Information Hiding and Its Applications
High Capacity Data Hiding for Grayscale Images
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
第 十 章 隱像術.
Data hiding method using image interpolation
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
A Virtual Image Cryptosystem Based upon Vector Quantization
EarthTour Presentations
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
De-clustering and Its Application to Steganography
A Data Hiding Scheme Based Upon Block Truncation Coding
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Predictive Grayscale Image Coding Scheme Using VQ and BTC
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
資訊偽裝術 張真誠 講座教授 多媒體暨網路安全實驗室
Information Hiding Techniques Using Magic Matrix
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
A New Image Compression Scheme Based on Locally Adaptive Coding
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang, Guei-Mei Chen, and Min-Hui Lin Speaker: Chiuan-Bo Yeh ( 葉權柏 ) Date: 2004/09/15

2 Outline Introduction Vector Quantization (VQ) Search-Order Coding (SOC) The proposed scheme Experimental results Conclusions Comments

3 Introduction Host Image VQ indicesSOC indices Stego Image Secret Data VQSOCEmbed 1.Compress host image by VQ, and generate VQ indices. 2.Compress VQ indices by SOC, and generate SOC indices. 3.Use the proposed scheme to embed the secret data into SOC indices, and generate stego image.

4 Vector Quantization(1/2) Divided into blocks of the same size Encoded by the closest codeword in the codebook 01…i…01…i… i Record the VQ index

5 Vector Quantization(2/2) Block Codebook CW1 CW2 CW3 CW4 Vector v = (18,45,43,72) Compute the square of the Euclidean Distance 4 d(v,CW i ) = ∥ v - CW i ∥ 2 = ∑ (v j – CW ij ) 2 j=1 d(v,CW1) = = 1672 d(v,CW2) = = 6430 d(v,CW3) = = 7195 d(v,CW4) = = 1116 Min Choice CW4 into VQ indices.

6 Search-Order Coding(1/2) To increase the compression rate of the VQ indices of an image. There is usually a high correlation between the neighboring blocks

7 Search-Order Coding(2/2) Define indicator 0 search order codes (SOC) 1 original index values (OIV) If one of the SPs matches 0 11 indicator SOC If none of the SPs matches indicator OIV

8 The proposed scheme(1/3) Receiver determines that each bit of secret data is ‘‘ 0 ’’ or ‘‘ 1 ’’ according to whether the received compression code is SOC or OIV. Ex. Receive The secret data is The largest size of secret data can be the number of the blocks.

9 The proposed scheme(2/3) In the hiding process, there are four categories taken into consideration. Indicator Secret data 1 1 There is nothing needing to be changed. 0 1 Preserve the OIV compression code instead of the SOC one. The compression rate will decrease. 0 0 There is nothing needing to be changed. 1 0 A translation technique of translating OIV into SOC is performed. The compression rate will decrease.

10 The proposed scheme(3/3) 18 (OIV) 21 (OIV) 31 (OIV) 30 (OIV) 30 (SOC) 31 (SOC) 29 (OIV) 30 (SOC) 32 (OIV) A 3 · 3 index table for showing the original coding results of the SOC algorithm. The hiding position of each bit of the secret bit string ‘‘ ’’ in the raster scan order. [(1,1),1] OIV 1 Nothing to be changed [(2,2),1] SOC 1 OIV instead of SOC [(2,3),0] SOC 0 Nothing to be changed [(3,3),0] OIV 0 SOC instead of OIV Status Secret Data

11 Experimental results(1/2) Table 1 The amount of increasing bits for hiding data in the compression codes Code category in the results of the original SOC coding method Code category in the results of our information hiding OIV SOC OIV 0 n SOC log 2 N c – n 0 Table 2 Bit rate for embedding different sized secret binary image ‘‘ Lena ’’ into six host images The size of secret Airplane Boat Girl Lena Peppers Toys data (bits)

12 Experimental results(2/2) Table 3 Bit rates of the SOC scheme and our information hiding method with secret binary image ‘‘ Barbara ’’ of 1024 bits Methods Images Airplane Boat Girl Lena Peppers Toys SOC (Hsieh and Tsai, 1996) OIV represents to hide ‘‘ 1 ’’ OIV represents to hide ‘‘ 0 ’’ Table 4 Bit rates of the SOC scheme and our information hiding method with secret binary image ‘‘ Lena ’’ of 1024 bits Methods Images Airplane Boat Girl Lena Peppers Toys SOC (Hsieh and Tsai, 1996) OIV represents to hide ‘‘ 1 ’’ OIV represents to hide ‘‘ 0 ’’

13 Conclusions The first scheme that embeds the secret data into the compression codes of the VQ indices directly. Embedding the secret data will not incur any distortion. Receive both the compressed image and the embedded data almost at the same time.

14 Comments Find a function f such that f( indicators ) = secret data Ex. Increase distortion, and increase compression rate. 18 (OIV) 21 (OIV) 31 (OIV) 30 (OIV) 30 (SOC) 31 (SOC) 29 (OIV) 30 (SOC) 32 (OIV) indicators secret data f( ) =