A steganographic method for digital images using side match

Slides:



Advertisements
Similar presentations
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
Advertisements

1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Piyu Tsia,Yu-Chen Hu,Hsiu-Lien Yen Signal Processing 日期 :1 月 4 號 報告者 : 許睿中.
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
1 Hiding Data in Images by Simple LSB Substitution Source: Pattern Recognition, Vol. 37, pp , 2004 Authors: Chi-Kwong Chan and L.M. Cheng Speaker:
1 A Combined Approach to Integrity Protection and Verification of Palette Images Using Fragile Watermarks and Digital Signatures Source: IEICE TRANS. On.
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
Improvements to the JPEG-LS prediction scheme Authors: S. Bedi, E. A. Edirisinghe, and G. Grecos Source : Image and Vision Computing. Vol. 22, No. 1, 2004,
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
1 A Color Image Hidden in a Grey-Level Image IS&T Third European Conference on Colour in Graphics, Imaging, and Vision, CGIV’2006, pp. 226–231, (Leeds,
1 Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems Adviser: Chih-Hung Lin Speaker : Chia-Wei Chang Date:2009/10/06.
1 Block Truncation Coding Using Pattern Fitting Source: Pattern Recognition, vol.37, 2004, pp Authors: Bibhas Chandra Dhara, Bhabatosh Chanda.
1 LSB Matching Revisited Source: IEEE Signal Processing Letters (Accepted for future publication) Authors: Jarno Mielikainen Speaker: Chia-Chun Wu ( 吳佳駿.
人力資源報告 Image and Signal Processing 1 Steganography Using Sudoku Revisited Wien Hong, Tung-Shou Chen, Chih-Wei Shiu Department of Information Management,
1 Security of fragile watermarking scheme for image authentication Authors: K. C. Liao, W. B. Lee, and C. W. Liao Source: The Imaging Science Journal,
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
Advisor: Chang, Chin-Chen Student: Chen, Chang-Chu
Source: IEEE Signal Processing Letters (Accepted)2016
A Secret Information Hiding Scheme Based on Switching Tree Coding
Source: The Journal of Systems and Software, Volume 67, Issue 2, pp ,
Advisor: Chin-Chen Chang1, 2 Student: Yi-Hui Chen2
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Chair Professor Chin-Chen Chang Feng Chia University
High-capacity image hiding scheme based on vector quantization
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images Source: Symmetry, vol. 8, no. 6, June.
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
A Color Image Hidden in a
Hiding Data in a Color Palette Image with Hybrid Strategies
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
A Restricted Region-based Data-hiding Scheme
Source : Signal Processing, vol. 126, pp ,  November 2016
Reversible Data Hiding Scheme Using Two Steganographic Images
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
Data hiding based Hamming code
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Data hiding method using image interpolation
Dynamic embedding strategy of VQ-based information hiding approach
Information Hiding and Its Applications
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
Chair Professor Chin-Chen Chang Feng Chia University
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Data hiding method using image interpolation
Chair Professor Chin-Chen Chang Feng Chia University
Source: Pattern Recognition Letters 29 (2008)
Partial reversible data hiding scheme using (7, 4) hamming code
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
On SVD-based watermarking algorithm
Source: IEICE-Transactions on Info and Systems
De-clustering and Its Application to Steganography
An Iterative Method for Lossless Data Embedding in BMP Images
A Data Hiding Scheme Based Upon Block Truncation Coding
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
LSB matching revisited
Steganographic Systems for Secret Messages
Lossless Data Hiding in the Spatial Domain for High Quality Images
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
A Restricted Region-based Data-hiding Scheme
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Adopting secret sharing for reversible data hiding in encrypted images
Reversible data hiding in encrypted binary images by pixel prediction
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

A steganographic method for digital images using side match Source: Pattern Recognition Letters, Volume: 25, Issue: 12, Sep., 2004, pp. 1431-1437 Author: Chin-Chen Chang and Hsien-Wen Tseng Speaker: Na-I Wu (吳男益)

Outline Introductions The Proposed Scheme The Experimental Results Conclusions

Introduction Edge areas: Hide more secret data Smooth areas: Hide less secret data Side Match Two-sided three-sided

The Proposed Scheme Two-sided match steganography Pu: The pixel value say, gu Px: The pixel value say, gx PL: The pixel value say, gl d = (gu +gl) / 2 – gx If (d is -1, 0, 1) one bit hide into Px by LSB end Ex: gu=100, gx=101, gu=100,d=(100+100)/2-101=-1 So, gx=1100101, if secret data is “1” No Modify if secret data is “0” 1100100(2)=100(10)

Two-sided match steganography Embedding Algorithm d = (gu +gl) / 2 – gx 14 = (40 +82) / 2 – 47 計算要藏幾個bit 3 = log2 |14| 要藏3 bits101。 n = log2 |d| n: 要藏的bit數。 (1)將n轉換成十進制b (2)計算新的差值 d’=2n+b, if d > 1 d’=-(2n+b), if d<1 13=23+5, if d > 1 重新調整gx值 gx=(gu +gl)/2 – d’ 48 = (40 +82) / 2 – 13

Two-sided match steganography Extracting Algorithm d= (40+82)/2-48=13 40 48 82 3 = log2 |13| 表示有藏3 bits 13 – 23 = 5 5 = 101(2)

Three-sided match steganography d = (gu +gl+gr) / 3 – gx g’x = (gu +gl+gr) / 3 – d’

Four-sided match steganography d = (gu +gl+gr+gb) / 4 – gx g’x = (gu +gl+gr+gb) / 4 – d’

The Experimental Results Methods Lenna Baboon Capacity PSNR 2-sided 389,004 41.22 660,725 33.53 3-sided 267,242 45.03 483,758 34.93 4-sided 164,538 48.18 298,413 38.56

Conclusions An efficient steganographic method to embed secret information into images without producing perceptible distortions. There is no need of referencing the original image when extracting the secret data The pixels in edge areas may hide more secret data than smooth ares.