A Secret Information Hiding Scheme Based on Switching Tree Coding

Slides:



Advertisements
Similar presentations
A Secret Information Hiding Scheme Based on Switching Tree Coding Speaker: Chin-Chen Chang.
Advertisements

An Efficient and Scalable Pattern Matching Scheme for Network Security Applications Department of Computer Science and Information Engineering National.
Fast vector quantization image coding by mean value predictive algorithm Authors: Yung-Gi Wu, Kuo-Lun Fan Source: Journal of Electronic Imaging 13(2),
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
1 An Efficient VQ-based Data Hiding Scheme Using Voronoi Clustering Authors:Ming-Ni Wu, Puu-An Juang, and Yu-Chiang Li.
Date: Advisor: Jian-Jung Ding Reporter: Hsin-Hui Chen.
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
1 資訊隱藏技術之研究 The Study of Information Hiding Mechanisms 指導教授: Chang, Chin-Chen ( 張真誠 ) 研究生: Lu, Tzu-Chuen ( 呂慈純 ) Department of Computer Science and Information.
Palette Partition Based Data Hiding for Color Images Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, and Chien-Ting Huang Speaker : Yu-Chiang Li.
Efficient Huffman Decoding Aggarwal, M. and Narayan, A., International Conference on Image Processing, vol. 1, pp. 936 – 939, 2000 Presenter :Yu-Cheng.
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
Advisor: Chang, Chin-Chen Student: Chen, Chang-Chu
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
影像偽裝術 Dr. Chin-Chen Chang
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
A steganographic method for digital images using side match
Data Mining and Its Applications to Image Processing
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
A New Image Compression Scheme Based on Locally Adaptive Coding
Advisor: Chin-Chen Chang1, 2 Student: Yi-Hui Chen2
Reversible Data Hiding in JPEG Images using Ordered Embedding
Source : Signal Processing, Volume 133, April 2017, Pages
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Information Steganography Using Magic Matrix
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Source :Journal of visual Communication and Image Representation
Chair Professor Chin-Chen Chang Feng Chia University
High-capacity image hiding scheme based on vector quantization
Advisor: Chin-Chen Chang1, 2 Student: Wen-Chuan Wu2
指導教授: Chang, Chin-Chen (張真誠)
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
A Data Hiding Scheme Based Upon Block Truncation Coding
第七章 資訊隱藏 張真誠 國立中正大學資訊工程研究所.
Hiding Data in a Color Palette Image with Hybrid Strategies
A Study of Digital Image Coding and Retrieving Techniques
Embedding Secrets Using Magic Matrices
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
An Innovative Steganographic Scheme Based on Vector Quantization
A Restricted Region-based Data-hiding Scheme
An Innovative Steganographic Scheme Based on Vector Quantization
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding Scheme Using Two Steganographic Images
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
Information Steganography Using Magic Matrix
Dynamic embedding strategy of VQ-based information hiding approach
Chair Professor Chin-Chen Chang Feng Chia University
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Hiding Information in VQ Index Tables with Reversibility
Information Hiding and Its Applications
High Capacity Data Hiding for Grayscale Images
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
A Virtual Image Cryptosystem Based upon Vector Quantization
EarthTour Presentations
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
De-clustering and Its Application to Steganography
A Data Hiding Scheme Based Upon Block Truncation Coding
Predictive Grayscale Image Coding Scheme Using VQ and BTC
資訊偽裝術 張真誠 講座教授 多媒體暨網路安全實驗室
Information Hiding Techniques Using Magic Matrix
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Steganographic Systems for Secret Messages
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
A New Image Compression Scheme Based on Locally Adaptive Coding
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

A Secret Information Hiding Scheme Based on Switching Tree Coding Speaker: Chin-Chen Chang Department of Computer Science and Information Engineering National Chung Cheng University Chiayi, Taiwan 62107, R.O.C. E-mail:ccc@cs.ccu.edu.tw URL: http://msn.iecs.fcu.edu.tw/~ccc

Outline VQ image compression Watermarking Search order coding (SOC) Switching tree coding (STC)

VQ Image Compression

VQ Compression w h Image Index table Vector Quantization Encoder

VQ Compression w h Image Index table Vector Quantization Decoder

Finds the nearest pairs

Find d(CW0, CW8) > TH d(CW13, CW14) > TH hide 1 hide 0 CW1 CW11 Unused CW0, CW8, CW13, CW14

Encode Unused CW0, CW8, CW13, CW14 Index Table Index Table

Water mark: 1 0 1 0 1 0 0 1 0 1 1 1 1 0 0 1 1 1 1 1 1 1 1 Index Table 1 1 1 1 1 1 1 Index Table Water mark CW1, CW2, CW4, CW5 CW6, CW7 CW11, CW3 CW15, CW10 CW12, CW9 hide 1 hide 0

Water mark: 1 0 1 0 1 0 0 1 0 1 1 1 1 0 0 1 1 1 1 1 1 1 1 Index Table 1 1 1 1 1 1 1 Index Table Water mark CW1, CW2, CW4, CW5 CW6, CW7 CW11, CW3 CW15, CW10 CW12, CW9 hide 1 hide 0

Water mark: 1 0 1 0 1 0 0 1 0 1 1 1 1 0 0 1 1 1 1 1 1 1 1 Index Table 1 1 1 1 1 1 1 Index Table Water mark

Search-Order Coding (SOC)

An example for indices of VQ

Search-Order Coding (SOC) Searched point Non-searched point

Search-Order Coding (SOC) Indicator The compressing steps 31 207 211 8 7 35 P1 = 1 00011111 P2 = 1 11001111 P3 = 0 00 … P6 = 0 10 Compression codes = 100011111 111001111 000 …

Information hiding on the SOC codes The proposed scheme: - Information hiding: to embed secret data into host image - Steganography : to embed secret data into host image and the interceptors will not notice the existence of secret data - Based on SOC

Information hiding on the SOC codes Main idea: Ex. receiver receives the compression codes : 010101101110110110011000011 SOC OIV (original index value) OIV SOC SOC It means that the embedded secret data is “01100” if SOC is represented to hide “0” and OIV is represented to hide “1”.

Information hiding on the SOC codes Method: ex. A 3*3 index table: 1 2 3 18 21 31 30 29 32 If the secret data is “111110100”, then the hiding position of each bit will be in the raster scan order.

Information hiding on the SOC codes Defined: “0”  embedded into SOC and “1”  embedded into OIV. Embedding phase: SOC ====> there is nothing that needs to change for its compression codes hide “0” SOC ====> translate SOC into OIV (give up SOC coding and keep the OIV) hide “1” OIV ====> there is nothing that needs to change hide “1” OIV ====> translate OIV into SOC ex. hide “0” 11 (SOC) + OIV

Information hiding on the SOC codes compression codes are still OIV: 100010010 Ex. translate SOC into OIV : 000 => 100011110 translate OIV into SOC : 100100000 => 01100100000

Information hiding on the SOC codes Cost table (bits):

Information hiding on the SOC codes Security: For enhancing the security of our method, the position in the index table for hiding each bit of secret data can be determined by using pseudo random number generator, and the secret data can be encrypted by using traditional cryptography system such as DES or RSA in advance.

Experimental results

Experimental results

Experimental results

Experimental results

Switching tree coding (STC)

Switching-tree coding (STC) Sheu proposed the STC algorithm in 1999 Re-encode the index table U L the current index

Switching-tree coding (STC) If P = 7, then P = U P’ = ‘11’ If P = 10, then P = L P’ = ‘10’

If P = 14, then P = A in index (3) P’ = ‘01’ || index (3) = ‘0100011’ If P = 17, then P’ = ‘00’ || (17) = ‘0000010001’ n=5

Information Hiding on the STC codes (IHSTC)

Information Hiding on the STC codes (IHSTC) Watermark: 0 1 0 0 1 1 0 0 0 1 1 0 1 0 … Index table

Information Hiding on the STC codes (IHSTC) Watermark: 0 1 0 0 1 1 0 0 0 1 1 0 1 0 … P’ = ‘00’||(10) ‘00’||(25) ‘00’||(21) … ‘00’||(17)

Information Hiding on the STC codes (IHSTC) Watermark: 0 1 0 0 1 1 0 0 0 1 1 0 1 0 … ‘10’ P’ = ‘00’||(10) ‘00’||(25) ‘00’||(21) … ‘00’||(17)

Information Hiding on the STC codes (IHSTC) Watermark: 0 1 0 0 1 1 0 0 0 1 1 0 1 0 … ‘10’ P’ = ‘00’||(10) ‘00’||(25) ‘00’||(21) … ‘00’||(17) ‘10’ ‘00’||(128) …

Information Hiding on the STC codes (IHSTC) Watermark: 0 1 0 0 1 1 0 0 0 1 1 0 1 0 … ‘11’ P’ = ‘00’||(10) ‘00’||(25) ‘00’||(21) … ‘00’||(17) ‘10’ ‘00’||(128) … ‘10’

Three binary connection tree

Three binary connection tree If U-length > L-length Tree B If U-length < L-length Tree C Otherwise Tree A Tree B Tree C

Experiment results Image size = 512*512, n = 3 and |H| = 1024 NSTC: 在 image 中,可藏入之點 |H|: Secret Information 之長度 Difference: 藏入前與藏入後image bit 數的差異

Experiment results Image size = 512*512, n = 3 and |H| = 2048 Image size = 512*512, n = 3 and |H| = NSTC

Image size = 512*512, n = 5 and |H| = 1024 Image size = 512*512, n = 5 and |H| = NSTC

Conclusions A novel information-hiding scheme based on a switching-tree coding The IHSTC system can hide a huge amount of information in the index table Only a few extra bits are needed to record the corresponding information The average time needed to hide an information character is 0.077 seconds IHSTC -- an efficient and effective scheme for hiding secret information