Phen-Lan Lin, Chung-Kai Hsieh, and Po-Whei Huang

Slides:



Advertisements
Similar presentations
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
Advertisements

1 Self-Recovery Fragile Watermarking Scheme with Variable Watermark Payload Fan Chen, Hong-Jie He, Yaoran Huo, Hongxia Wang Southwest Jiaotong University,
Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery Source: Pattern Recognition, Vol. 41, Issue 2,
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan.
A reversible data hiding method by histogram shifting in high quality medical images Author: Li-Chin Huang, Lin-Yu Tseng, Min-Shiang Hwang Source: The.
多媒體網路安全實驗室 Source:International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH- MSP),2010 Sixth. Authors:Hsiang-Cheh.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Reversible data hiding based on histogram shifting scheme Reporter: Date: Wan-Yu Lu 2012/12/13.
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
Recover the tampered image based on VQ indexing Source: Signal Processing, Volume 90, Issue 1, Jan. 2010, pp Authors: Chun-Wei Yang and Jau-Ji.
Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References.
DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999.
1 Hiding Data in Images by Simple LSB Substitution Source: Pattern Recognition, Vol. 37, pp , 2004 Authors: Chi-Kwong Chan and L.M. Cheng Speaker:
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Watermarking Text Document Images Using Edge Direction Histograms Young-Won Kim and Il-Seok Oh Pattern Recognition Letters, Vol. 25, 2004, pp – 1251.
Lossless Watermarking for Image Authentication: A New Framework and an Implementation IEEE TRANSACTIONS ON IMAGE PROCESSING APRIL 2006 C.M.Chen.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Reversible watermarking Wu Dan Introduction What?
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
1 Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform Source : IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 13, NO. 8,
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Data Hiding in a Kind of PDF Texts for Secret Communication Authors : S.P. Zhong, X.Q. Cheng, and T.R. Chen Source : International Journal of Network Security,
Palette Partition Based Data Hiding for Color Images Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, and Chien-Ting Huang Speaker : Yu-Chiang Li.
1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp Xinpeng Zhang.
A lossless data hiding scheme based on three- pixel block differences Ching-Chiuan Lin and Nien-Lin Hsueh Pattern Recognition, Vol. 41(4), April 2008 Pages.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
Der-Chyuan Lou and Jiang-Lung Liu,
2003/04/291 Hiding data in images by optimal moderately- significant-bit replacement Wang, Ran-Zan, Lin, Chi-Fang, and Lin, Ja-Chen, IEE Electronics Letters,
Reversible Data Hiding in JPEG Images using Ordered Embedding
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Source: Pattern Recognition, Vol. 38, Issue 11, December 2005, pp
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Some Novel Steganographic Methods for Digital Images
Reversible Data Hiding Scheme Using Two Steganographic Images
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Information Hiding and Its Applications
Partial reversible data hiding scheme using (7, 4) hamming code
A new chaotic algorithm for image encryption
Digital Watermarking for Image Authentication with Localization
Partial reversible data hiding scheme using (7, 4) hamming code
New Framework for Reversible Data Hiding in Encrypted Domain
Novel Multiple Spatial Watermarking Technique in Color Images
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Blind Reversible Authentication Based on PEE and CS Reconstruction
Secret image sharing with steganography and authentication
Ming-Shi Wang *, Wei-Che Chen 11 November 2006 present: 沈雅楓
Hidden Digital Watermarks in Images
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Authors: J.J. Murillo-Fuentes
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Source : Digital Signal Processing. Vol. 73, pp , Feb
Improvements of Image Sharing with Steganography and Authentication
Lossless Data Hiding in the Spatial Domain for High Quality Images
A Quadratic-Residue-based Fragile Watermarking Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Phen-Lan Lin, Chung-Kai Hsieh, and Po-Whei Huang A Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery Phen-Lan Lin, Chung-Kai Hsieh, and Po-Whei Huang Pattern Recognition Vol. 38, Issue 11, December 2005, pp. 2519-2529

Outline Introduction The Proposed Method Experimental Results Watermark Embedding Hierarchical Tamper Detection Tampered Image Recovery Experimental Results Conclusions Comments

Introduction Watermarking Method for Image Tamper Detection and Recovery

Block mapping sequence generation algorithm (4 ×4 pixels/block) 1-1 mapping : X ' = [ f ( X ) = ( k × X ) mod N ] + 1, X , X ' are the block number (∈ [0, N− 1 ]) k is a secret key, (a prime and ∈ Z − {N 's factors }) N is the total number of blocks in the image The original block The mapping of blocks X '=13× X mod 64 +1 4

Watermark Embedding (1/2) avg_As=(I1+I2+I3+I4)/4 1 2 9 10 3 4 11 12 5 6 13 14 7 8 15 16 a1 a2 a3 a4 a5 a6 a7 a8 r avg_Bs=(I1+I2+I3+I4)/4 Block A 1 2 9 10 3 4 11 12 5 6 13 14 7 8 15 16 avg_B=(I1+I2+…+I16)/16 Block B

Watermark Embedding (2/2) Block A num: # of 1s in the 6 MSBs of avg_Bs 69 78 82 97 35 46 210 102 51 33 73 44 173 83 145 126 avg_As=(69+78+35+46)/4=57=(00111001)2 r = 001110 Block B 104 22 99 207 39 55 61 132 42 66 3 23 227 198 145 164 avg_Bs=(104+20+36+52)/4=53=(00110101)2 avg_B=(104+20+96+204+…+164)/16=97 v=0, p=1 104 104 Set 2LSBs to 0 1 1 22 22 104 20 96 204 36 52 60 132 40 64 224 196 144 164 39 39 55 54

Hierarchical Tamper Detection (1/3) Level 1: for each sub-block B's of 2×2 pixels within block B' , verify v and p avg_B’s=(104+20+36+52)/4=53=00110101 104 22 99 207 39 55 61 132 42 66 3 23 227 198 145 164 avg_B’=(104+20+96+204+…+164)/16=97 v'=0, p'=1 if v' is not equal to v OR if p' is not equal to p  This sub-Block is marked erroneous 1 1 v=0, p=1 After Level 1 detection, each sub-block is marked valid of erroneous

Hierarchical Tamper Detection (2/3) Level 2: For each block of size 4 × 4 pixels, mark this block erroneous if any of its sub-block is marked erroneous; otherwise, mark it valid. 104 22 99 207 39 55 61 132 42 66 3 23 227 198 145 164 104 22 99 207 39 55 61 132 42 66 3 23 227 198 145 164 After Level 2 detection, each block is marked valid of erroneous Level 3: For each valid block of size 4×4 pixels, mark the block erroneous if there are five or more erroneous blocks in its 3×3 block-neighborhood, Error B Most surrounding blocks of some valid block are erroneous, this block hardly remains valid.

Hierarchical Tamper Detection (3/3) Level 4: only required for resisting against VQ attack, assume mapping sequence: B C 104 20 99 207 39 54 61 132 42 66 3 23 227 198 145 164 1 valid Block C r = 001110(00) = 56 = avg_Cs 69 78 82 97 35 46 210 102 51 33 73 44 173 83 145 126 avg_B’s=(68+76+32+44)/4=55 valid 57=00111001=00111000=56 avg_B’s  avg_Cs Block B’

Tampered Image Recovery Mapping sequence: A  B 104 20 99 207 39 54 61 132 42 66 3 23 227 198 145 164 1 valid Block B r = 001110(00) = 56 56 82 97 210 102 51 33 73 44 173 83 145 126 69 78 82 97 35 46 210 102 51 33 73 44 173 83 145 126 erroneous Tamped Block A Recovered Block A

Experimental Results (1/7)

Experimental Results (2/7)

Experimental Results (3/7) M1: Covering the whole image with leaf patterns, as depicted in Fig. 8(b). M2: Covering the whole image with another image, as depicted in Fig. 8(c). M3: Covering the whole image with fruit patterns, as depicted in Fig. 8(d). M4: Spreading plenty of mist to the whole image, as depicted in Fig. 8(e).

Experimental Results (4/7)

Experimental Results (5/7)

Experimental Results (6/7)

Experimental Results (7/7)

Conclusions A hierarchical digital watermarking scheme for image tamper detection and restoration is proposed. The proposed method uses parity check and intensity comparison with 3-Level detection for tamper detection. The proposed method uses 2-LSBs of each pixel to restore the check bits and restore information.

Comments Level 4 detection resists against VQ attack (collage attack) Something is wrong with Level 4 detection Reversible watermarking such as DE or histogram shifting is not suitable for tamper detection and recovery, this is because the bit-rate is low. …