Presentation is loading. Please wait.

Presentation is loading. Please wait.

Source:. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL

Similar presentations


Presentation on theme: "Source:. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL"— Presentation transcript:

1 Efficient Reversible Data Hiding Based on Multiple Histograms Modification
Source: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 10, NO. 9, SEPTEMBER 2015 Authors: Xiaolong Li, Weiming Zhang, Xinlu Gui, and Bin Yang Speaker: ZhaoHua Zhu Date: 12/01/2017

2 Outline Related Work Proposed Scheme Experiment Result Conclusions

3 Predict error after embedding e’
Related Work(1/9) Frame work of PEE I - I’ -2 1 6 -3 7 Cover Image I Predict Image I’ Predict error e embedding I’ + e’ -3 2 1 7 -4 8 Predict error after embedding e’ Predict error Histogram h Stego Image I’’

4 Related Work(2/9) -Prediction error
162 161  … 164 158 155 160 163 159 157 Predicted value: 162 164 161 156  … 158 160 159 163 155 157 -2 1 5  … 6 -4 -3 7 -1 4

5 Related Work(3/9) -complexity measurement
162 161  … 164 158 155 160 163 159 157 1 4  … 2 3 5

6 Related Work(4/9) -PEH (0,1) (-2,4) (1,4) (5,4) … (0,2) (6,3) (-2,5)
n = 0 (0,1) (-2,4) (1,4) (5,4)  … (0,2) (6,3) (-2,5) (-4,2) (0,0) (-3,5) (7,2) (-1,2) (0,3) (4,2) (-2,0) (-1,0) Ignore n n = 1 (e , n) n = …

7 Related Work(5/9) C-PEE -2 1 5 … 6 -4 -3 7 -1 4 -3 2 6 … 1 7 -5 -4 8
-2 1 5  … 6 -4 -3 7 -1 4 -3 2 6  … 1 7 -5 -4 8 -2 5 -1 010100…

8 Related Work(6/9) A-PEE Pick those histogram which n < T, T is threshold Supposed T = 3 (0,1) (-2,4) (1,4) (5,4)  … (0,2) (6,3) (-2,5) (-4,2) (0,0) (-3,5) (7,2) (-1,2) (0,3) (4,2) (-2,0) (-1,0) (0,1) (-2,4) (1,4) (5,4)  … (1,2) (6,3) (-2,5) (-5,2) (0,0) (-3,5) (8,2) (-2,2) (0,3) (5,2) (-3,0) (-1,0) 01010… -3 2 6  … 1 7 -5 -4 8 -2 5 -1 C-PEE

9 Related Work(7/9) C-PEE A-PEE

10 Related Work(8/9) O-PEE Set(a,b) to determine hide value -2 1 5 … 6 -4
-2 1 5  … 6 -4 -3 7 -1 4 -2 1 6  … 7 -5 -3 8 -1 5 0…. (-3,2)

11 Related Work(9/9) AO-PEE
(-2,2) T=3 (0,1) (-2,4) (1,4) (5,4)  … (0,2) (6,3) (-2,5) (-4,2) (0,0) (-3,5) (7,2) (-1,2) (0,3) (4,2) (-2,0) (-1,0) (0,1) (-2,4) (1,4) (5,4)  … (0,2) (6,3) (-2,5) (-5,2) (0,0) (-3,5) (8,2) (-1,2) (0,3) (5,2) (-3,0) (-1,0) 1…

12 Main idea of proposed method
(a0,b0) : (-2,1) (a1,b1) : (-3,2) (a2,b2) : (-4,3) (a3,b3) : (-4,3) (a4,b4) : (-∞, ∞)

13 Proposed Method(2/5) 1011 (1,1) (-2,0) (1,0) (2,0) (0,2) (-1,1) (2,1)
(-2,1) (0,0) (-3,4) (7,2) (-1,2) (0,3) (4,2) (-1,0) Nend = 8 (1,1) (-2,0) (1,0) (2,0) (0,2) (-1,1) (2,1) (-2,1) g(e) h(e)

14 Proposed Method(3/5) g(e) g’(e) embedding distortion
g(e) g’(e) embedding distortion ED = g’(-2) + g’(-3) + g’(-4) + g’(2) + g’(3) + g’(4) + g’(5) ED = g(-2) + g(-3) + g(2) + g(3) + g(4) + (g(1) + g(-1))/2 ED payload PS = g(1) + g(-1) PS

15 Proposed Method(4/5) ED PS

16 Proposed Method(5/5)——Optimize
Predicted value Complexity Measurement

17 Experiment Result(1/2) [29] W. Hong, T.-S. Chen, and C.-W. Shiu, “Reversible data hiding for high quality images using modification of prediction errors,” J. Syst. Softw., vol. 82, no. 11, pp. 1833–1842, Nov [35] G. Coatrieux, W. Pan, N. Cuppens-Boulahia, F. Cuppens, and C. Roux,“Reversible watermarking based on invariant image classification and dynamic histogram shifting,” IEEE Trans. Inf. Forensics Security, vol. 8,no. 1, pp. 111–120, Jan [40] V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y. Q. Shi, “Reversible watermarking algorithm using sorting and prediction,” IEEE Trans.Circuits Syst. Video Technol., vol. 19, no. 7, pp. 989–999, Jul [44] C. Wang, X. Li, and B. Yang, “Efficient reversible image watermarking by using dynamical prediction-error expansion,” in Proc. IEEE ICIP, Sep. 2010, pp. 3673– [48] X. Li, W. Zhang, X. Gui, and B. Yang, “A novel reversible data hiding scheme based on two-dimensional difference-histogram modification,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 7, pp. 1091–1100, Jul [49] B. Ou, X. Li, Y. Zhao, R. Ni, and Y.-Q. Shi, “Pairwise predictionerror expansion for efficient reversible data hiding,” IEEE Trans. Image Process., vol. 22, no. 12, pp. 5010–5021, Dec [55] H. J. Hwang, H. J. Kim, V. Sachnev, and S. H. Joo, “Reversible watermarking method using optimal histogram pair shifting based on prediction and sorting,” KSII Trans. Internet Inf. Syst., vol. 4, no. 4, pp. 655–670, Aug

18 Experiment Result(2/2)

19 Conclusion This method can achieve higher PSNR value than other method, but have limits in hiding capacity. I think this method can provide higher security of Image.

20 Thank You


Download ppt "Source:. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL"

Similar presentations


Ads by Google