基於龜殼魔術矩陣的隱寫技術及其衍生的研究問題

Slides:



Advertisements
Similar presentations
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Advertisements

CHEN XIAOYU HUANG. Introduction of Steganography A group of data hiding technique,which hides data in undetectable way. Features extracted from modified.
1 影像偽裝術的最新發展 張真誠 逢甲大學 講座教授 中正大學 榮譽教授 清華大學 合聘教授 Watermarking 2. Image authentication 3. Secret sharing 4. Visual cryptography 5. Steganography.
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
1 資訊隱藏技術之研究 The Study of Information Hiding Mechanisms 指導教授: Chang, Chin-Chen ( 張真誠 ) 研究生: Lu, Tzu-Chuen ( 呂慈純 ) Department of Computer Science and Information.
Palette Partition Based Data Hiding for Color Images Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, and Chien-Ting Huang Speaker : Yu-Chiang Li.
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
Digital Watermarking and Its Applications
Advisor: Chang, Chin-Chen Student: Chen, Chang-Chu
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
影像偽裝術 Dr. Chin-Chen Chang
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
(k, n)-Image Reversible Data Hiding
Information Hiding Technology: Current Research and Future Trend
Data Mining and Its Applications to Image Processing
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
Chapter 3 向量量化編碼法.
Advisor: Chin-Chen Chang1, 2 Student: Yi-Hui Chen2
Advisor: Chin-Chen Chang1, 2
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Information Steganography Using Magic Matrix
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Source :Journal of visual Communication and Image Representation
Chair Professor Chin-Chen Chang Feng Chia University
Advisor: Chin-Chen Chang1, 2 Student: Wen-Chuan Wu2
指導教授: Chang, Chin-Chen (張真誠)
A Data Hiding Scheme Based Upon Block Truncation Coding
第七章 資訊隱藏 張真誠 國立中正大學資訊工程研究所.
Hiding Data in a Color Palette Image with Hybrid Strategies
A Study of Digital Image Coding and Retrieving Techniques
Embedding Secrets Using Magic Matrices
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
A Restricted Region-based Data-hiding Scheme
Source: Information Sciences, 2018, accpeted.
Some Novel Steganographic Methods for Digital Images
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding Scheme Using Two Steganographic Images
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Information Steganography Using Magic Matrix
Data hiding based Hamming code
Dynamic embedding strategy of VQ-based information hiding approach
Chair Professor Chin-Chen Chang Feng Chia University
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Hiding Information in VQ Index Tables with Reversibility
Information Hiding and Its Applications
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
High Capacity Data Hiding for Grayscale Images
Chair Professor Chin-Chen Chang Feng Chia University
Chair Professor Chin-Chen Chang Feng Chia University
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
De-clustering and Its Application to Steganography
A Data Hiding Scheme Based Upon Block Truncation Coding
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Information Hiding Techniques Using Magic Matrix
Recent Developments in Information Hiding
Steganographic Systems for Secret Messages
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

基於龜殼魔術矩陣的隱寫技術及其衍生的研究問題 Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University National Chung Cheng University Feng Chia University http://msn.iecs.fcu.edu.tw/~ccc

Introduction Information Hiding Hiding system Stego image Cover image 1 0 1 0 1 0 0 1 0 1 1 1 1 0 0 Secret message

Introduction (Cont.) Cover Carriers Image Video Sound Text

A Simple Steganography Scheme (120,155,…,80) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 (90,135,…,120) (100,125,…,150) … Index table Original Image (49,117,…,25) (50,42,…,98) (20,65,…,110) Codebook

Previous Work of Steganography on VQ To find the closest pairs

d(CW0, CW8) > TH d(CW13, CW14) > TH Unused CW0, CW8, CW13, CW14

Encode Index Table CW0, CW8, CW13, CW14 Unused Index Table Original Image Index Table Unused CW0, CW8, CW13, CW14

A secret message: 1 0 1 0 1 0 0 1 0 1 1 1 1 0 0 1 1 1 1 1 1 1 1 Index Table Secret bits CW1, CW2, CW4, CW5 CW6, CW7 CW11, CW3 CW15, CW10 CW12, CW9 1

A secret message: 1 0 1 0 1 0 0 1 0 1 1 1 1 0 0 1 1 1 1 1 1 1 1 Index Table Secret bits CW1, CW2, CW4, CW5 CW6, CW7 CW11, CW3 CW15, CW10 CW12, CW9 1

A secret message: 1 0 1 0 1 0 0 1 0 1 1 1 1 0 0 1 1 1 1 1 1 1 1 Index Table Secret bits

Kim et al.’s Method : 9 1 2 3 4 5 6 7 8 …

Kim et al.’s Method (Embedding) 5 8 3 4 7 6 1 2 : 9 1 2 3 4 5 6 7 8 Cover Image Cover Image 6 9 7 3 8 1 2 5 4 … Stego Image Stego Image

Kim et al.’s Method (Embedding) 6 9 7 3 8 1 2 5 4 : 9 1 2 3 4 5 6 7 8 Stego Image Stego Image …

Zhang and Wang’s Method (Embedding) Extracting function: 8 7 9 4 79 54 55 11 20 21 12 24 10 Secret data: 1000 1011… p2 255 1 2 3 4 1 2 3 4 1 : : : : : : : : : : : : : 10002 1 35 … 11 2 3 4 1 2 3 4 1 2 3 2 … 10 1 2 3 4 1 2 3 4 1 Cover image … 9 3 4 1 2 3 4 1 2 3 4 3 … 8 1 2 3 4 1 2 3 4 1 2 1 … 7 4 1 2 3 4 1 2 3 4 4 … 6 2 3 4 1 2 3 4 1 2 3 2 … 5 1 2 3 4 1 2 3 4 1 7 10 4 … 4 3 4 1 2 3 4 1 2 3 4 3 … 3 1 2 3 4 1 2 3 4 1 2 1 … 2 4 1 2 3 4 1 2 3 4 4 … 1 2 3 4 1 2 3 4 1 2 3 2 … 1 2 3 4 1 2 3 4 1 Stego image 1 2 3 4 5 6 7 8 9 10 11 … 255 p1 Magic Matrix

Zhang and Wang’s Method (Extracting) p2 7 10 4 255 1 2 3 4 1 2 3 4 1 : : : : : : : : : : : : : … 11 2 3 4 1 2 3 4 1 2 3 2 … 10 1 2 3 4 1 2 3 4 1 … 9 3 4 1 2 3 4 1 2 3 4 3 … 8 1 2 3 4 1 2 3 4 1 2 1 Stego image … 7 4 1 2 3 4 1 2 3 4 4 … 6 2 3 4 1 2 3 4 1 2 3 2 … 5 1 2 3 4 1 2 3 4 1 … 4 3 4 1 2 3 4 1 2 3 4 3 … 3 1 2 3 4 1 2 3 4 1 2 1 … 2 4 1 2 3 4 1 2 3 4 4 1 35 … 1 2 3 4 1 2 3 4 1 2 3 2 … 1 2 3 4 1 2 3 4 1 p1 1 2 3 4 5 6 7 8 9 10 11 … 255 Extracted secret data: 10002 Magic Matrix

Sudoku A logic-based number placement puzzle

Sudoku (Cont.) Property A Sudoku grid contains nine 3 × 3 matrices, each contains different digits from 1 to 9. Each row and each column of a Sudoku grid also contain different digits from 1 to 9. Possible solutions: 6,670,903,752,021,072,936,960 (i.e. ≈ 6.671×1021)

The Proposed Method - 1 Reference Matrix M 6 5 1 7 4 8 2 3 9 5 4 6 3 7 6 3 7 1 2 8 Reference Matrix M

The Proposed Method (Embedding) (Cont.) 8 7 11 12 79 54 55 20 21 24 10 9 Secret data: 011 001 10… 279 Cover Image 9 7 Stego Image d( , ) = d((8,4) , (8,7)) = d( , ) = d((9,7) , (8,7)) = d( , ) = d((6,8) , (8,7)) = min.

The Proposed Method (Embedding) (Cont.) 8 7 11 12 79 54 55 20 21 24 10 9 Secret data: 011 001 10… 279 Cover Image d( , ) = 9 7 14 min. Stego Image

The Proposed Method (Extracting) (Cont.) 9 7 14 Stego Image Extracted data: 279 = 011 0012

Turtle Shell Based Matrix Proposed Scheme [1/8] The Core of our method… Turtle Shell Based Matrix In the following presentation, I will illustrate the detailed steps of our method. Here we begin with the core of our method, the turtle shell based matrix. The turtle shell based matrix is the matrix that every single turtle shell includes consecutive integers from 0 to 7. So how can we construct this matrix?

Proposed Scheme [2/8] 2 3 ( 7 1 2 3 4 5 2 ( 4 5 6 7 1 2 3 3 ( 1 2 3 4 1 2 3 4 5 2 ( 4 5 6 7 1 2 3 3 ( 1 2 3 4 5 6 7 2 ( 1 2 3 4 5 6 First, like this, we draw a turtle shell with the number between 0 and 7 on it. So what we are going to do now, is to continuously write down 0 to 7 in every row. And according to this turtle shell we’ve constructed, we found that the difference between the bottom row and the upper row is 2, and the next difference is 3, then it is 2 again. So we apply this rule, alternately add 2 and 3 to every row, to complete the entire matrix.

Proposed Scheme [3/8] 255 … 9 8 7 6 5 4 3 2 1 6 7 1 2 3 4 5 2 3 ( Pixel b 2 ( 3 As we can see: digits on every turtle shell include 0 to 7. To me, I think it is simple but fabulous. And on vertical and horizontal axis are values of a pixel pair, where values are from 0 to 255. What does this mean and how does this matrix work? Let’s see the following examples. 1 2 3 4 5 6 7 8 9 … 255 Pixel a

Proposed Scheme [4/8] 9 8 7 6 5 4 3 2 1 6 7 1 2 3 4 5 4 3 4 1 9 7 71 80 55 2 12 30 21 64 73 28 95 91 76 83 23 202 42 19 3 57 11 234 39 27 40 18 215 89 255 107 59 16 99 200 185 97 243 25 101 235 79 33 198 211 3 4 3 5 4 Pixel b Here we’ve got an original image, which we called a cover image. And we’ve got a secret as well. And the turtle shell based matrix must be prepared. We show the image in the pixel form. And divide this binary secret into 3 bits patterns. As a result, the secret can be expressed in decimal form where every digit is between 0 and 7. We can find out the purpose in the next step. To embed the secret into pixels, for a start, we take the 1st pixel pair in the image. And match these two pixels in coordinates respectively. Then we can map a point on the matrix. As we can see, the point is on the back of a turtle shell. So now we define this as the 1st situation. The embedding procedure is quite easy. Find the secret digit within this turtle shell and refer back to the coordinates. And then change our pixel values into this coordinates. So the secret is successfully embedded into pixels by modifying them very slightly. No matter how it changed, it still within a turtle shell. And now we can understand why we want our secret becoming numbers between 0 and 7. Because every turtle shell only includes the number between 0 and 7. 110 010 000 111 1 2 3 4 5 6 7 8 9 6 2 7 Pixel a

Proposed Scheme [5/8] 9 8 7 6 5 4 3 2 1 6 7 1 2 3 4 5 4 1 9 7 71 80 55 2 12 30 21 64 73 28 95 91 76 83 23 202 42 19 3 57 11 234 39 27 40 18 215 89 255 107 59 16 99 200 185 97 243 25 101 235 79 33 198 211 3 5 3 5 3 6 4 Pixel b But now you might notice a problem: how about the points on the edge of the turtle shells? Like this example, we can see that actually the point is at the intersection of three different turtle shells. So this time, we find out the secret digits within all these three turtle shells. And choose the nearest one, because we do care about the image quality. To find the nearest one, means to minimize the image distortion. 110 010 000 111 1 2 3 4 5 6 7 8 9 6 2 7 Pixel a

Proposed Scheme [6/8] 9 8 7 6 5 4 3 2 1 6 7 1 2 3 4 5 4 1 9 7 71 80 55 2 12 30 21 64 73 28 95 91 76 83 23 202 42 19 3 57 11 234 39 27 40 18 215 89 255 107 59 16 99 200 185 97 243 25 101 235 79 33 198 211 3 6 4 4 4 5 Pixel b How about the point on this side? In fact, this is the totally same situation. It’s just a matter of perspective. When the related turtle shells come out, it become the same situation. 110 010 000 111 1 2 3 4 5 6 7 8 9 6 2 7 Pixel a

Proposed Scheme [7/8] 9 8 7 6 5 4 3 2 1 6 7 1 2 3 4 5 4 9 7 71 80 55 2 12 30 21 64 73 28 95 91 76 83 23 202 42 19 3 57 11 234 39 27 40 18 215 89 255 107 59 16 99 200 185 97 243 25 101 235 79 33 198 211 3 6 4 5 2 1 1 Pixel b Through all efforts, there is still a tiny flaw in this scheme. That is, how to deal with the points on the edge of the matrix. They do not be involved in any turtle shells. Well… if we take a detailed observation on the matrix, we can discover another interesting feature of the matrix. That is, wherever we draw a 3 by 3 block, we find the numbers between 0 and 7 are all within it. Then apparently, as what we did before, find the secret digit within the block. 110 010 000 111 1 2 3 4 5 6 7 8 9 6 2 7 Pixel a

Proposed Scheme [8/8] 9 8 7 6 5 4 3 2 1 6 7 1 2 3 4 5 4 9 7 71 80 55 2 12 30 21 64 73 28 95 91 76 83 23 202 42 19 3 57 11 234 39 27 40 18 215 89 255 107 59 16 99 200 185 97 243 25 101 235 79 33 198 211 3 6 4 5 2 Pixel b For the extracting phrase, I think it is much easier than the embedding procedures. Whatever the embedding strategies had been used, in the extracting phrase, we just easily extract the secret by drawing out pixel pairs sequentially. And use them to map the secret in our matrix. 110 010 000 111 1 2 3 4 5 6 7 8 9 6 2 7 Pixel a

Experimental Results [1/3] Here comes our experimental results. These pictures above are generally used in many related research. After using our scheme to hide secret into these images, they still remain the high qualities.

Experimental Results [2/3] Table I. Comparisons of PSNRs and ECs of the proposed scheme and reference-table-based schemes Schemes Images EMD [9] EMD-2 [12] Proposed   PSNR EC Lena 52.12 1 50.86 1.37 49.42 1.5 Airplane 52.11 50.79 49.39 Boat 50.64 49.40 Elaine 50.67 49.41 House 50.71 Peppers 50.78 Baboon 50.69 Man 50.82 Average 50.75 PIXEL PAIR 3 4 SECRET 110 On this table, we can see: PSNR, which present the image qualities. The higher PSNR, the better image quality. And EC, which present the number of bits we can hide in each pixel. The higher, the better as well. According to the table, our scheme has the highest embedding capacity. If you ask me how this number comes out. Well… try to recall this: we took 2 pixels at a time. Then embed 3 bits in. So 3 bits divide by 2 pixels is 1.5 bits per pixel. Although we have the highest embedding capacity, we cannot remain the highest PSNR at the same time. This is a trade-off. With higher embedding capacity, comes lower image quality.  

Experimental Results [3/3] Table II. Comparisons of PSNRs between the proposed scheme and various reference-table-based schemes Schemes 1 bpp 1.5 bpp EMD [9] 52.11 n/a EMD-2 [12] 52.39 Sudoku-S [10] 48.99 44.89 Sudoku-SR [11] 50.68 48.67 HP-PVD [13] 51.08 47.83 Proposed 49.40 But what if we stand on the same starting line. Let’s take a look at the table 2. Now based on the same embedding capacity, we have the highest image qualities among all these reference-table-based schemes, no matter 1 bpp or 1.5 bpp.

Conclusions & Future Directions [1/2] 1.Simple embedding & extracting 2. Goal: Design Philosophy: So here is my conclusions for our proposed scheme and the future objective of researching. For our proposed scheme, I think the most remarkable property is that the embedding and extracting procedure are both quite simple. For the future objective of researching, well… here comes a design philosophy: with higher embedding capacity, comes lower image quality. So this will be our goal to pursue high embedding capacity; in the meantime, remain high image quality. Embedding Capacity Image Quality

Conclusions & Future Directions [2/2] 1.Reversability 2.Applications-Authentication & Watermarking 3.Optimal Substitution Table Problem (Dynamic Programming, Genetic Algorithm, PSO etc.) 4.Vector Quantization (VQ) 5.Side Match VQ 6.Generalization: Small Turtle → Big Turtle 7.Formula Derivation f(p1, p2)=k 8.Performance Evaluation 9.Steganalysis So here is my conclusions for our proposed scheme and the future objective of researching. For our proposed scheme, I think the most remarkable property is that the embedding and extracting procedure are both quite simple. For the future objective of researching, well… here comes a design philosophy: with higher embedding capacity, comes lower image quality. So this will be our goal to pursue high embedding capacity; in the meantime, remain high image quality.

Questions? Thank you! Here is my presentation for today. Are there any questions?

Appendix [1/2] peak signal-to-noise ratio embedding capacity mean square error

Appendix [2/2] [9] X. Zhang and S. Wang, “Efficient Steganographic Embedding by Exploiting Modification Direction,” IEEE Communications Letters, vol. 10, Nov. 2006, pp. 781-783. [10] C. C. Chang, Y. C. Chou, and T. D. Kieu, “An Information Hiding Scheme Using Sudoku,” in Proceedings of the Third International Conference on Innovative Computing, Information and Control, June 2008, pp.17-22. [11] W. Hong, T. S. Chen, and C. W. Shiu, “A Minimal Euclidean Distance Searching Technique for Sudoku Steganography,” in Proceedings of International Symposium on Information Science and Engineering, vol. 1, Dec. 2008, pp. 515-518. [12] H. J. Kim, C. Kim, Y., Choi, S. Wang, and X. Zhang, “Improved Modification Direction Schemes,” Computers & Mathematics with Applications, vol. 60, Apr. 2010, pp. 319-325. [13] J. Chen, “A PVD-based Data Hiding Scheme with Histogram Preserving Using Pixel Pair Matching,” Signal Processing: Image Communication, vol. 29, Mar 2014, pp. 375-384.