Information Hiding Technology: Current Research and Future Trend

Slides:



Advertisements
Similar presentations
1 影像偽裝術的最新發展 張真誠 逢甲大學 講座教授 中正大學 榮譽教授 清華大學 合聘教授 Watermarking 2. Image authentication 3. Secret sharing 4. Visual cryptography 5. Steganography.
Advertisements

1 視覺密碼學 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University ( 清華大學 ) National Chung Cheng University ( 中正大學 ) Feng Chia University (
Digital Watermarking Parag Agarwal
利用網路聊天室傳送機密訊息 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
1 資訊隱藏技術之研究 The Study of Information Hiding Mechanisms 指導教授: Chang, Chin-Chen ( 張真誠 ) 研究生: Lu, Tzu-Chuen ( 呂慈純 ) Department of Computer Science and Information.
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
Digital Watermarking and Its Applications
Advisor: Chang, Chin-Chen Student: Chen, Chang-Chu
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
基於龜殼魔術矩陣的隱寫技術及其衍生的研究問題
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
(k, n)-Image Reversible Data Hiding
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Pat P. W. Chan,  Michael R. Lyu, Roland T. Chin*
Visual Secret Sharing Chair Professor Chin-Chen Chang (張真誠)
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
The Recent Developments in Visual Cryptography
Embedding Secret Messages in Texts
Reversible Data Hiding in JPEG Images using Ordered Embedding
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Recent Developments on Multimedia and Secure Networking Technologies
Information Steganography Using Magic Matrix
Chair Professor Chin-Chen Chang Feng Chia University
Chair Professor Chin-Chen Chang Feng Chia University
Advisor: Chin-Chen Chang1, 2 Student: Wen-Chuan Wu2
指導教授: Chang, Chin-Chen (張真誠)
Chair Professor Chin-Chen Chang Feng Chia University
A Data Hiding Scheme Based Upon Block Truncation Coding
The Recent Developments in Visual Secret Sharing
Hiding Data in a Color Palette Image with Hybrid Strategies
A Study of Digital Image Coding and Retrieving Techniques
Parag Agarwal Digital Watermarking Parag Agarwal
Embedding Secrets Using Magic Matrices
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
A Restricted Region-based Data-hiding Scheme
The New Developments in Visual Cryptography
Some Novel Steganographic Methods for Digital Images
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding Scheme Using Two Steganographic Images
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Information Steganography Using Magic Matrix
Dynamic embedding strategy of VQ-based information hiding approach
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Hiding Information in VQ Index Tables with Reversibility
Information Hiding and Its Applications
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
High Capacity Data Hiding for Grayscale Images
Chair Professor Chin-Chen Chang Feng Chia University
Recent Developments on Multimedia and Secure Networking Technologies
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Chair Professor Chin-Chen Chang Feng Chia University
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
De-clustering and Its Application to Steganography
A Data Hiding Scheme Based Upon Block Truncation Coding
Information Hiding Techniques Using Magic Matrix
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Recent Developments in Information Hiding
My Research Projects Chair Professor Chin-Chen Chang (張真誠)
Steganographic Systems for Secret Messages
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Information Hiding Technology: Current Research and Future Trend Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University (清華大學) National Chung Cheng University (中正大學) Feng Chia University (逢甲大學) http://msn.iecs.fcu.edu.tw/~ccc

Watermarking Image authentication Secret sharing Visual cryptography Steganography Future Trend

Watermarking Visible watermarking Easy to embed Clear to see watermark

Watermarking (Cont.) Invisible watermarking Requirements: Good visual quality of watermarked image Robustness Watermarking Original image Watermarked image Watermark

Image authentication Requirements: Detect the tampered area Try to restore the tampered area Image Tampered image Detected image Restored image

Secret sharing Classification: Meaningless shadows Meaningful shadows

Secret sharing (Cont.) Sharing Shadow size: 256  256 Reconstructing Image size: 512  512 Reconstructing (2,4)-threshold secret sharing scheme PSNR=24 dB

Secret sharing (Cont.) Reconstructing Secret image Hiding Stego-image Reconstructed secret image Secret image Stego-image (2, n)-threshold secret sharing scheme Stego-image

Visual cryptography Stacking Shadow 1 Shadow 2 Secret

Visual cryptography (Cont.) Stacking Shadow 1 Shadow 2 Secret

Visual cryptography (Cont.) Rotating 40o Stacking Stacking Share 1 Share 2 Secret 1 “VISUAL” Secret 2 “SECRET”

Steganography The targets Restoration Frequency domain (e.g. DCT, DWT, DFT) Spatial domain (e.g. pixel values) Compression domain (e.g. VQ) Text Restoration Irreversible Reversible

Steganography (Cont.) Image Hiding system Stego image Cover image Secret message Stego image 1 0 1 0 1 0 0 1 0 1 1 1 1 0 0

Steganography (Cont.) Cover Carriers Image Video Sound Text

Steganography (Cont.) Text Video Sound 壞的毛病 壞毛病 山東的蘋果 山東蘋果 我的媽媽 我媽媽 壞的毛病 壞毛病 山東的蘋果 山東蘋果 我的媽媽 我媽媽 主要的問題 主要問題 另外的一件事 另外一件事 其他的問題 其他問題 北京的大學 北京大學 Video Sound

Zhang and Wang’s Method (Embedding) 8 7 9 4 79 54 55 11 20 21 12 24 10 Secret data: 1000 1011… p2 255 1 2 3 4 1 2 3 4 1 : : : : : : : : : : : : : 10002 1 35 … 11 2 3 4 1 2 3 4 1 2 3 2 … 10 1 2 3 4 1 2 3 4 1 Cover image … 9 3 4 1 2 3 4 1 2 3 4 3 … 8 1 2 3 4 1 2 3 4 1 2 1 … 7 4 1 2 3 4 1 2 3 4 4 … 6 2 3 4 1 2 3 4 1 2 3 2 … 5 1 2 3 4 1 2 3 4 1 7 10 4 … 4 3 4 1 2 3 4 1 2 3 4 3 … 3 1 2 3 4 1 2 3 4 1 2 1 … 2 4 1 2 3 4 1 2 3 4 4 … 1 2 3 4 1 2 3 4 1 2 3 2 … 1 2 3 4 1 2 3 4 1 Stego image 1 2 3 4 5 6 7 8 9 10 11 … 255 p1 Magic Matrix

Zhang and Wang’s Method (Extracting) p2 7 10 4 255 1 2 3 4 1 2 3 4 1 : : : : : : : : : : : : : … 11 2 3 4 1 2 3 4 1 2 3 2 … 10 1 2 3 4 1 2 3 4 1 … 9 3 4 1 2 3 4 1 2 3 4 3 … 8 1 2 3 4 1 2 3 4 1 2 1 Stego image … 7 4 1 2 3 4 1 2 3 4 4 … 6 2 3 4 1 2 3 4 1 2 3 2 … 5 1 2 3 4 1 2 3 4 1 … 4 3 4 1 2 3 4 1 2 3 4 3 … 3 1 2 3 4 1 2 3 4 1 2 1 … 2 4 1 2 3 4 1 2 3 4 4 1 35 … 1 2 3 4 1 2 3 4 1 2 3 2 … 1 2 3 4 1 2 3 4 1 p1 1 2 3 4 5 6 7 8 9 10 11 … 255 Extracted secret data: 10002 Magic Matrix

Sudoku A logic-based number placement puzzle

Sudoku (Cont.) Property A Sudoku grid contains nine 3 × 3 matrices, each contains different digits from 1 to 9. Each row and each column of a Sudoku grid also contain different digits from 1 to 9. Possible solutions: 6,670,903,752,021,072,936,960 (i.e. ≈ 6.671×1021)

Data Hiding Using Sudoku - 1 Reference Matrix M

Data Hiding Using Sudoku (Embedding) (Cont.) 8 7 11 12 79 54 55 20 21 24 10 9 Secret data: 011 001 10… 279 Cover Image min. d( , ) = ((8-8)2+(4-7)2)1/2=3 d( , ) = ((9-8)2+(7-7)2)1/2=1 d( , ) = ((6-8)2+(8-7)2)1/2=2.24 9 7 Stego Image

Data Hiding Using Sudoku (Embedding) (Cont.) 8 7 11 12 79 54 55 20 21 24 10 9 Secret data: 011 001 10… 279 Cover Image d( , ) = ((11-11)2+(15-12)2)1/2=3 d( , ) = ((15-11)2+(12-12)2)1/2=4 d( , ) = ((9-11)2+(14-12)2)1/2=2.83 min. 9 7 14 Stego Image

Data Hiding Using Sudoku (Extracting) (Cont.) 9 7 14 Stego Image Extracted data: 279 = 011 0012

Experimental Results

Experimental Results (Cont.) The results of visual quality and Embedding capacity comparisons Images Proposed PSNR C Baboon Barbara Boats Goldhill Jet(F16) Lena Pepper Sailboat Tiffany 44.68 44.77 44.94 44.84 45.02 44.97 44.67 1.5 Average 44.88

Future Trends Reversible Data Hiding in Compressed Images VQ Compressed Images JPEG Images SMVQ Compressed Images

Future Trends (Cont.) Reversible Data Hiding in Encrypted Images (e) Decrypted image (right key) (d) Marked image (1.0bpp) (f) Decrypted image (wrong key)

Future Trends (Cont.) Reversible Data Hiding in Error Control Codes QR Codes (a) (b) (c)

Thanks for your listening