Presentation is loading. Please wait.

Presentation is loading. Please wait.

An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection Source: Multimedia.

Similar presentations


Presentation on theme: "An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection Source: Multimedia."— Presentation transcript:

1 An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection Source: Multimedia Tools and Applications, 2017, 76(7): Authors: Lee C F, Weng C Y, Chen K C Speaker :Xiaozhu Xie Date : /12/28

2 Outline Related work Exploiting Modification Direction (EMD)
reduplicated exploiting modification direction (REMD) Proposed scheme Experimental results Conclusions I would like to present in these five parts.

3 Related work--EMD(1/3) Extracting function: Secret data: 1000 1011… p2
8 7 9 4 79 54 55 11 20 21 12 24 10 Secret data: … p2 255 1 2 3 4 1 2 3 4 1 : : : : : : : : : : : : : 10002 1 35 11 2 3 4 1 2 3 4 1 2 3 2 10 1 2 3 4 1 2 3 4 1 Cover image 9 3 4 1 2 3 4 1 2 3 4 3 8 1 2 3 4 1 2 3 4 1 2 1 7 4 1 2 3 4 1 2 3 4 4 6 2 3 4 1 2 3 4 1 2 3 2 5 1 2 3 4 1 2 3 4 1 7 10 4 4 3 4 1 2 3 4 1 2 3 4 3 3 1 2 3 4 1 2 3 4 1 2 1 2 4 1 2 3 4 1 2 3 4 4 1 2 3 4 1 2 3 4 1 2 3 2 1 2 3 4 1 2 3 4 1 Stego image 1 2 3 4 5 6 7 8 9 10 11 255 p1 Magic Matrix

4 Related work--EMD(2/3) p2 Stego image 1 35 p1
7 10 4 255 1 2 3 4 1 2 3 4 1 : : : : : : : : : : : : : 11 2 3 4 1 2 3 4 1 2 3 2 10 1 2 3 4 1 2 3 4 1 9 3 4 1 2 3 4 1 2 3 4 3 8 1 2 3 4 1 2 3 4 1 2 1 Stego image 7 4 1 2 3 4 1 2 3 4 4 6 2 3 4 1 2 3 4 1 2 3 2 5 1 2 3 4 1 2 3 4 1 4 3 4 1 2 3 4 1 2 3 4 3 3 1 2 3 4 1 2 3 4 1 2 1 2 4 1 2 3 4 1 2 3 4 4 1 35 1 2 3 4 1 2 3 4 1 2 3 2 1 2 3 4 1 2 3 4 1 p1 1 2 3 4 5 6 7 8 9 10 11 255 Extracted secret data: 10002 Magic Matrix

5 Related work-- REMD(3/3)
P=(16,15,15) 𝐺 1 =(8,7,7), I=(0,1,1) 𝐹 1 =1 𝑆 1 =1 𝐺 1 ′ =(8,7,7), I=(0,1,1) 𝐹 2 =1 𝑆 2 =4 𝐺 1 " =(8,7,8), 𝐼 ′ =(0,0,1) Lee C F, Chuang L Y, Chang C C. Hiding information employing reduplicating embedding[C]//Asia-Pacific Services Computing Conference, APSCC'08. IEEE. IEEE, 2008: 4

6 Proposed scheme(1/3)- flow chart

7 Proposed scheme(2/3)- image interpolation phase

8 Proposed scheme(3/3)- embedding phase
(159,185,188) G=(79,92,94), I=(1,1,0) Record edge information G=(77,92,94), I=(1,1,0) Embed data 𝑆 1 : 0 01 G(1)=(77,92,95), I=(1,1,0) Embed data 𝑆 2 : 6 Stego-Image (152,185,191) G(2)=(76,92,95), I’=(0,1,1)

9 Experimental results (1/8)

10 Experimental results (2/8)
10. Lee CF, Chuang LY, Chang CC (2008) Hiding information employing reduplicating embedding. Proceedings of 2008 I.E. Asia-Pacific Services Computing Conference:825–828

11 Experimental results (3/8)

12 Experimental results (4/8)

13 Experimental results (5/8)

14 Experimental results (6/8)

15 Experimental results (7/8)

16 Experimental results (8/8)

17 Conclusions Image interpolation is adopted to achieve reversibility.
Allowing flexible adjustment on data amount.

18 Thank you!


Download ppt "An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection Source: Multimedia."

Similar presentations


Ads by Google