Source: The Journal of Systems and Software, Volume 67, Issue 2, pp ,

Slides:



Advertisements
Similar presentations
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
Advertisements

Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
Multiple-description iterative coding image watermarking Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 20, No. 4, pp , 2010.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
A steganographic method for digital images using side match
Fractal image compression
A New Image Compression Scheme Based on Locally Adaptive Coding
Reversible Data Hiding in JPEG Images using Ordered Embedding
Source : Signal Processing, Volume 133, April 2017, Pages
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Source :Journal of visual Communication and Image Representation
Chair Professor Chin-Chen Chang Feng Chia University
High-capacity image hiding scheme based on vector quantization
A Data Hiding Scheme Based Upon Block Truncation Coding
第七章 資訊隱藏 張真誠 國立中正大學資訊工程研究所.
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Hiding Data in a Color Palette Image with Hybrid Strategies
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
A Restricted Region-based Data-hiding Scheme
An efficient reversible data hiding method for AMBTC compressed images
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Reversible Data Hiding Scheme Using Two Steganographic Images
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Dynamic embedding strategy of VQ-based information hiding approach
Chair Professor Chin-Chen Chang Feng Chia University
DCT based simple classification scheme for fractal image compression
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Hiding Information in VQ Index Tables with Reversibility
Information Hiding and Its Applications
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
Zhe-Ming Lu, Chun-He Liu, Dian-Guo Xu, Sheng-He Sun,
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
A new chaotic algorithm for image encryption
Progressive Transmission of Two-Dimensional Gel Electrophoresis Image Based on Context Features and Bit-plane Method Source:2004 IEEE International Conference.
Data hiding method using image interpolation
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
EarthTour Presentations
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
Partial reversible data hiding scheme using (7, 4) hamming code
New Framework for Reversible Data Hiding in Encrypted Domain
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Blind Reversible Authentication Based on PEE and CS Reconstruction
A New Method for Tamper Detection and Recovery
Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images Source: Symmetry, Vol. 10, No. 8, pp. 318.
A Data Hiding Scheme Based Upon Block Truncation Coding
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
A Fast No Search Fractal Image Coding Method
Predictive Grayscale Image Coding Scheme Using VQ and BTC
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Source : Digital Signal Processing. Vol. 73, pp , Feb
Improvements of Image Sharing with Steganography and Authentication
Lossless Data Hiding in the Spatial Domain for High Quality Images
A New Image Compression Scheme Based on Locally Adaptive Coding
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Reversible data hiding in encrypted binary images by pixel prediction
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Detecting and restoring the tampered images based on iteration-free fractal compression Source: The Journal of Systems and Software, Volume 67, Issue 2, pp. 131- 140, Aug. 2003 Authors: Ching-Te Wnag, Tung-Shou Chen, Shao-Hau He Speaker: Yu-Zheng Wang Date: 2004/04/20

Outline Introduction Iteration-free fractal image coding Proposed method Experimental results Conclusions

Introduction network A key point: characteristic value An intruder damage the picture Original image tampered image restoration image A key point: characteristic value Protected image

Iteration-free fractal image coding Generate the efficient domain pool Output the header and the fractal code image F Partition into non-overlapping range block If the variance of the range block > THv Find a domain block which similar to the range block Else Code by the mean of the range block

Iteration-free fractal image coding (Generate the domain pool) image F Mean value: B=8 B I range block Rr I=512 I/B=64 D0 domain block Dd (B x B) I/B Domain pool: a set of all domain blocks. mean image M

Iteration-free fractal image coding (Encode the fractal code) B=8 B Mean value: Variance: I range block Rr I=512 image F Header information: 0 If the variance of the range block <= THv Save the mean of Rr as a fractal code

Iteration-free fractal image coding (Encode the fractal code) Header information: 1 If the variance of the range block > THv Find a domain block which similar to the range block The new affine transformation (新相仿轉換) D: all pixel values in a domain block μR: the mean of the correlative range block μD: the mean of D α : the contrast scaling; α ={n/4, n=1,2,3,…,8} μR- (α.μD): the luminance offset

Iteration-free fractal image coding (Encode the fractal code) ι : isometric transformation A fractal code contains: the isometric transformation ; the contrast scaling ; mean of the range block ; the position of domain block

Iteration-free fractal image coding (Encode the fractal code) The fractal code: (output) Header information: 0010101…1 Data information: 0010111 0100010 000 011 1000001 00110101 … mean=46 mean=69 ι :(a) α =4 mean=130 53th block 00101110 01000101 10000010

Iteration-free fractal image coding (Decode the fractal code)

Iteration-free fractal image coding (Generate the efficient domain pool) We have (I/B-B+1)*(I/B-B+1)+1 domain blocks. (I:512; B:8) (512/8-8+1)*(512/8-8+1)+1=(64-8+1)*(64-8+1)=3250 Some neighboring domain blocks are similar to each other. There are two methods to obtain the efficient domain pool: LBG algorithm block-averaging method (better performance) Ex:8-4+1=5

Iteration-free fractal image coding (Generate the efficient domain pool) Block-averaging method T’: the sampling period ND: the number of domain blocks Example: ND=225

Iteration-free fractal image coding (Generate the efficient domain pool)

Proposed method Extraction and embedding stages

Proposed method (cont.) Extract characteristic values from a specific image If the variance of the range block > THv characteristic value: isometric transformation(3 bits); the contrast scaling(3 bits); mean(7 bits); position of domain block(BitsPD= log2ND )(ND=225:8 bits) The header is recoded by 1 (1 bit) Else characteristic value: mean(7 bits); The header is recoded by 0 (1 bit); And header information has to be added to characteristic values.

Proposed method (cont.) Hiding characteristic values into the image The sequence of characteristic values: 0010010…11010100100101…1 Make three copies of the characteristic values 0010010…11010100100101…1 0010010…11010100100101…1 0010010…11010100100101…1 Permute the characteristic values using the pseudorandom number generator with a seed. (512*512=262144) {7,18901,147,…,677,…,3,…,19,…,11111} The characteristic values are embedded into the LSB. Header information data (I/B)*(I/B)-1

Proposed method (cont.) 32 135 0 01001011101101…1 : characters values {7,5,47,…,37,…,3,…,19,…,11} 32 134 10000111 image F 10000110 00100000 Protected image F 00100000

Proposed method (cont.) Detecting and restoring the tampered image

Proposed method (cont.) Extracting characteristic values Using the seed to generate a random sequence {7,18901,147,…,677,…,3,…,19,…,11111} We can extract characteristic values from LSB. {0010010…11010100100101…10000110…11010100100101…10010010…01010100100101…1 } First, getting the header information System checks the header bits whether correct by compares with the three copies. C1’:{0010010…1} C2’:{0000110…1} C3’:{0010010…0} =>0010110…1 Getting other characteristic values.

Proposed method (cont.) How to detect tampered blocks? mean ? The protected image F’ this = mean of characteristic values The detected image

Proposed method (cont.) Restoring the tampered image It uses the decoding method. It looks at the header information If the value is 0 The tampered block is restored by the mean If the value is 1 The tampered block is restored by its position in the domain pool, isometry, the mean of the range block, and the contrast scaling. The detected image

Experimental results 512 x 512 LENA An efficient domain pool mean image Protected image Tampered image Restoration image Detection image

Experimental results (cont.) 512 x 512 PEPPER An efficient domain pool Mean image Protected image Tampered image Restoration image Detection image

Conclusions This paper has proposed a detection and restoration system for tampered image based on iteration-free fractal compression. The restoration technique don’t need the source image.