Data Hiding Using Binocular Fusion of Stereo Pairs N. Y. Bai 白 乃 元 Department of Applied Mathematics National Sun Yat-Sen University Kaohsiung, Taiwan.

Slides:



Advertisements
Similar presentations
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Advertisements

A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan.
A reversible data hiding method by histogram shifting in high quality medical images Author: Li-Chin Huang, Lin-Yu Tseng, Min-Shiang Hwang Source: The.
Reversible Data Hiding ECE643 Digital Image Processing (I) Course Project Professor: Yun Q. Shi Su Yu 12/02/2011.
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Improved PVO-based reversible data hiding Source: Digital Signal Processing, 2014 Authors: Fei Peng, Xiaolong Li,ng Reporter: Min-Hao Wu.
N-Secure Fingerprinting for Copyright Protection of Multimedia
Computer Vision Spring ,-685 Instructor: S. Narasimhan Wean 5403 T-R 3:00pm – 4:20pm Lecture #15.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
CS654: Digital Image Analysis Lecture 8: Stereo Imaging.
Reversible watermarking Wu Dan Introduction What?
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Multiple-description iterative coding image watermarking Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 20, No. 4, pp , 2010.
Palette Partition Based Data Hiding for Color Images Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, and Chien-Ting Huang Speaker : Yu-Chiang Li.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
A lossless data hiding scheme based on three- pixel block differences Ching-Chiuan Lin and Nien-Lin Hsueh Pattern Recognition, Vol. 41(4), April 2008 Pages.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
1 Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems Adviser: Chih-Hung Lin Speaker : Chia-Wei Chang Date:2009/10/06.
多媒體網路安全實驗室 Source: IEICE Trans. Fundamentals, Vol. E90-A, No. 4, April 2007, pp Authors:Hong Lin Jin, Masaaki Fujiyoshi, Hitoshi Kiya Speaker:Cheng.
1 An LSB Substitution base Information Hiding Technique 國立彰化師範大學 資訊工程學系教授兼系主任 蕭如淵 (Ju-Yuan Hsiao) 中華民國九十四年十二月十六日.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
Media Processor Lab. Media Processor Lab. Trellis-based Parallel Stereo Matching Media Processor Lab. Sejong univ.
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
影像偽裝術 Dr. Chin-Chen Chang
(k, n)-Image Reversible Data Hiding
Data Compression.
Source: The Journal of Systems and Software, Volume 67, Issue 2, pp ,
DONE BY S.MURALIRAJAN M.NIRMAL
Reversible Data Hiding in JPEG Images using Ordered Embedding
Affiliation of presenter
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
A Data Hiding Scheme Based Upon Block Truncation Coding
第七章 資訊隱藏 張真誠 國立中正大學資訊工程研究所.
Hiding Data in a Color Palette Image with Hybrid Strategies
Yongjian Hu, Member, IEEE, Heung-Kyu Lee, Kaiying Chen, and Jianwei Li
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
A Restricted Region-based Data-hiding Scheme
Image Coding and Compression
Source : Signal Processing, vol. 126, pp ,  November 2016
Reversible Data Hiding
Reversible Data Hiding Scheme Using Two Steganographic Images
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Data hiding method using image interpolation
Dynamic embedding strategy of VQ-based information hiding approach
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Information Hiding and Its Applications
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
High Capacity Data Hiding for Grayscale Images
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
EarthTour Presentations
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
Novel Multiple Spatial Watermarking Technique in Color Images
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Information Protection and Recovery with Reversible Data Hiding
An Iterative Method for Lossless Data Embedding in BMP Images
A Data Hiding Scheme Based Upon Block Truncation Coding
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
資訊偽裝術 張真誠 講座教授 多媒體暨網路安全實驗室
Authors: J.J. Murillo-Fuentes
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Department of Computer Science, University of Central Florida ,Orlando
Lossless Data Hiding in the Spatial Domain for High Quality Images
A Restricted Region-based Data-hiding Scheme
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

Data Hiding Using Binocular Fusion of Stereo Pairs N. Y. Bai 白 乃 元 Department of Applied Mathematics National Sun Yat-Sen University Kaohsiung, Taiwan 80424

Outlines l Data hiding l Stereograms l Data Hiding Using Binocular Fusion l Experimental Results l Conclusions

Introduction Host image Counterfeit image Hiding image l Data hiding: Embed data into digital media

l Advantages: 1.Protect contents from illegal copy 2.Unauthorized distribution 3.Tampering

l Traditional techniques: 1.Replacing the least-significant bit (Adelson 90) 2.Substituting high-spatial frequency (Bender 96) 3.Using word shifting, line shifting (Bender 96)

Stereograms Perspective projectionStereograms

△ BAC △ EDC

Calculating the (depth) coordinate, we must know : difference between the corresponding image coordinates baseline length focal length

Data Hiding Using Binocular Fusion by Stereo Pairs l Motivation: By the resemblance of the left and right stereo images encountered in the stereographic projection setup l Linear transformation  real time implementation l Lossless algorithm l Adjustable data hiding capacity and PSNR

Original imageMove right one pixel

Encoding The store value and hide to image

Decoding The data hidden can be retrieved losslessly if above equation is satisfied

l Unique subsequence:Continuous pixel values is unique among all possible subsequences formed l Store the value of focal length to lower bits of pixels of the unique subsequence

Experimental Results Images:  Original host images, Lena and F16  Embedding images, baboo and pepper

Lena: 128 x 128 x 8 bits baboo: 80 x 80 x 8 bits pepper: 80 x 80 x 8 bits

F16 : 128 x 128 x 8 bits

Data hiding capacity, PSNR between the host and counterfeit images

Conclusions l Require only linear stereographic transformation  real-time data hiding and extraction feasible l Data hiding capacity and the PSNR between the stereo pairs can be adjusted to meet the demands of specific application needs