Download presentation
Presentation is loading. Please wait.
Published byLiliana Paskin Modified over 9 years ago
1
1 影像偽裝術的最新發展 張真誠 逢甲大學 講座教授 中正大學 榮譽教授 清華大學 合聘教授
2
2 1. Watermarking 2. Image authentication 3. Secret sharing 4. Visual cryptography 5. Steganography
3
3 Watermarking Visible watermarking Easy to embed Clear to see watermark
4
4 Watermarking (Cont.) Invisible watermarking Requirements: Good visual quality of watermarked image Robustness Watermarking Watermarked imageOriginal image Watermark
5
5 Image authentication Requirements: Detect the tampered area Try to restore the tampered area Image Tampered imageDetected imageRestored image
6
6 Secret sharing Classification: Meaningless shadows Meaningful shadows
7
7 Secret sharing (Cont.) Shadow size: 256 256 Image size: 512 512 Sharing Reconstructing PSNR=24 dB (2,4)-threshold secret sharing scheme
8
8 Secret sharing (Cont.) Secret image Stego-image Hiding Reconstructed secret image Reconstructing (2, n)-threshold secret sharing scheme Stego-image
9
9 Visual cryptography Shadow 1Shadow 2 Secret Stacking
10
10 Visual cryptography (Cont.) Shadow 1Shadow 2 Secret Stacking
11
11 Visual cryptography (Cont.) Share 1 Share 2 Secret 1 “ VISUAL ” Secret 2 “ SECRET ” Stacking Rotating 40 o
12
12 Steganography The targets Frequency domain (e.g. DCT, DWT, DFT) Spatial domain (e.g. pixel values) Compression domain (e.g. VQ) Text Restoration Irreversible Reversible
13
13 Steganography (Cont.) Cover image Hiding system Secret message Stego image 1 0 1 0 1 0 0 1 0 1 1 1 1 0 0 Image
14
14 Steganography (Cont.) Text 壞的毛病 壞毛病 山東的蘋果 山東蘋果 我的媽媽 我媽媽 主要的問題 主要問題 另外的一件事 另外一件事 其他的問題 其他問題 北京的大學 北京大學 Video Sound
15
15 Zhang and Wang ’ s Method (Embedding) 8794 79545511 20211224 1210 9 01234 0 1 2 3 4 5 6 7 0123456789 11 8 9 10 11 255 0123401 … 2340123401 40123401234 : 0 23 123401234012 340123401234 012340123401 2340123401 401234012340 23 123401234012 340123401234 012340123401 234012340123 012340123401 0 2 4 1 3 0 2 4 1 3 0 2 … … … … … … … … … … … … :::::::::::: Magic Matrix Cover image 1000 2 1 3 5 Secret data: 1000 1011… 77104 Stego image p1p1 p2p2
16
16 Zhang and Wang ’ s Method (Extracting) 01234 0 1 2 3 4 5 6 7 01234567891011 8 9 10 11 255 0123401 … 2340123401 40123401234 : 0 23 123401234012 340123401234 012340123401 2340123401 401234012340 23 123401234012 340123401234 012340123401 234012340123 012340123401 0 2 4 1 3 0 2 4 1 3 0 2 … … … … … … … … … … … … :::::::::::: Magic Matrix 77104 Stego image 1 351 35 Extracted secret data: 1000 2 p1p1 p2p2
17
17 Sudoku A logic-based number placement puzzle
18
18 Sudoku (Cont.) Property Possible solutions: 6,670,903,752,021,072,936,960 (i.e. ≈ 6.671×10 21 ) A Sudoku grid contains nine 3 × 3 matrices, each contains different digits from 1 to 9. Each row and each column of a Sudoku grid also contain different digits from 1 to 9.
19
19 Data Hiding Using Sudoku - 1 Reference Matrix M
20
20 Data Hiding Using Sudoku (Embedding) (Cont.) 871112 79545511 20211224 1210 9 97 Cover Image Stego Image Secret data: 011 001 10… 279279 d(, ) = ((8-8) 2 +(4-7) 2 ) 1/2 =3 d(, ) = ((9-8) 2 +(7-7) 2 ) 1/2 =1 d(, ) = ((6-8) 2 +(8-7) 2 ) 1/2 =2.24 min.
21
21 Data Hiding Using Sudoku (Embedding) (Cont.) 871112 79545511 20211224 1210 9 97914 Cover Image Stego Image d(, ) = ((11-11) 2 +(15-12) 2 ) 1/2 =3 d(, ) = ((15-11) 2 +(12-12) 2 ) 1/2 =4 d(, ) = ((9-11) 2 +(14-12) 2 ) 1/2 =2.83 min. 279279 Secret data: 011 001 10…
22
22 Data Hiding Using Sudoku (Extracting) (Cont.) 97914 Stego Image Extracted data: 27 9 = 011 001 2
23
23 Experimental Results
24
24 Experimental Results (Cont.) The results of visual quality and Embedding capacity comparisons Images Proposed PSNRC Baboon Barbara Boats Goldhill Jet(F16) Lena Pepper Sailboat Tiffany 44.68 44.77 44.94 44.84 45.02 44.97 44.67 45.02 1.5 Average44.881.5
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.