2003/04/291 Hiding data in images by optimal moderately- significant-bit replacement Wang, Ran-Zan, Lin, Chi-Fang, and Lin, Ja-Chen, IEE Electronics Letters,

Slides:



Advertisements
Similar presentations
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
Advertisements

1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Recover the tampered image based on VQ indexing Source: Signal Processing, Volume 90, Issue 1, Jan. 2010, pp Authors: Chun-Wei Yang and Jau-Ji.
1 Hiding Data in Images by Simple LSB Substitution Source: Pattern Recognition, Vol. 37, pp , 2004 Authors: Chi-Kwong Chan and L.M. Cheng Speaker:
Data hiding in Least Significant Bit (LSB) Speaker: Feng Jen-Bang ( 馮振邦 )
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Data Hiding in a Kind of PDF Texts for Secret Communication Authors : S.P. Zhong, X.Q. Cheng, and T.R. Chen Source : International Journal of Network Security,
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
Phen-Lan Lin, Chung-Kai Hsieh, and Po-Whei Huang
1 Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems Adviser: Chih-Hung Lin Speaker : Chia-Wei Chang Date:2009/10/06.
多媒體網路安全實驗室 Source: IEICE Trans. Fundamentals, Vol. E90-A, No. 4, April 2007, pp Authors:Hong Lin Jin, Masaaki Fujiyoshi, Hitoshi Kiya Speaker:Cheng.
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
A Novel Full-Search Vector Quantization Algorithm Based on the Law of Cosines Author:Jarno Mielikainen, Student Member, IEEE Source:IEEE SIGNAL.
Advisor: Chang, Chin-Chen Student: Chen, Chang-Chu
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
Palette Partition Based Data Hiding for Color Images
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
Reporter :Liang, Min-Chen Date :2003/04/15
Source: The Journal of Systems and Software, Volume 67, Issue 2, pp ,
Advisor: Chin-Chen Chang1, 2 Student: Yi-Hui Chen2
Advisor: Chin-Chen Chang1, 2
An Overview of Digital Watermarking & Data Hiding Techniques for Secure Transmission of Medical Images K. ANUSUDHA Assistant Professor Department of Electronics.
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Reversible data hiding scheme based on significant-bit-difference expansion Sourse: IET Image Processing ( Volume: 11, Issue: 11, ), Pages 1002.
High-capacity image hiding scheme based on vector quantization
A Data Hiding Scheme Based Upon Block Truncation Coding
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images Source: Symmetry, vol. 8, no. 6, June.
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Hiding Data in a Color Palette Image with Hybrid Strategies
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
A Restricted Region-based Data-hiding Scheme
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
A reversible and secure patient information hiding system for IoT driven e-health Source : International Journal of Information Management, Available online.
Color Image Retrieval based on Primitives of Color Moments
Dynamic embedding strategy of VQ-based information hiding approach
Reporter :Liang, Min-Chen Date :2003/05/06
Hung, K. -L. and Chang, C. -C. , IEE Image and Signal Processing, vol
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
High Capacity Data Hiding for Grayscale Images
A Data-Hiding Technique with Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
Chair Professor Chin-Chen Chang Feng Chia University
Zhe-Ming Lu, Chun-He Liu, Dian-Guo Xu, Sheng-He Sun,
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Reporter :Liang, Min-Chen Date :2003/05/06
Reporter :Liang, Min-Chen Date :2003/05/06
A new chaotic algorithm for image encryption
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Hung, K. -L. and Chang, C. -C. , IEE Image and Signal Processing, vol
EarthTour Presentations
Chair Professor Chin-Chen Chang Feng Chia University
Source: Pattern Recognition Letters 29 (2008)
A Data-Hiding Technique With Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images Source: Symmetry, Vol. 10, No. 8, pp. 318.
An imperceptible spatial domain color image watermarking scheme
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Source : Digital Signal Processing. Vol. 73, pp , Feb
Improvements of Image Sharing with Steganography and Authentication
LSB matching revisited
Lossless Data Hiding in the Spatial Domain for High Quality Images
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Reversible data hiding in encrypted binary images by pixel prediction
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

2003/04/291 Hiding data in images by optimal moderately- significant-bit replacement Wang, Ran-Zan, Lin, Chi-Fang, and Lin, Ja-Chen, IEE Electronics Letters, VOL. 36, NO. 25, 7th December 2000, pp Adviser : Dr. Chang, Chin-Chen Reporter : Chi, Kang-Liang Date : 2003/04/29

2003/04/292 Outline Introduction Proposed data hiding scheme Experimental results Conclusions

2003/04/293 Introduction

2003/04/294 Proposed data hiding scheme important imagehost image

2003/04/295 Proposed data hiding scheme Definition : Pixel at location of important image is transposed to a new location by the following equation : mod where, for and are constants.

2003/04/296 Proposed data hiding scheme Let mod where gcd(5,16)=1, gcd(3,16)=1, and gcd(5,3)= The location of important image The location of perturbed image

2003/04/297 Proposed data hiding scheme perturbed image

2003/04/298 Proposed data hiding scheme 10= = MSB(the fifth bit) residual image

2003/04/299 Proposed data hiding scheme Both the perturbed image and the residual image are divided into non-overlapping blocks of size 4*1. perturbed image ={1111,1001,0101,0000)} residual image ={1110,0010,1000,1111}

2003/04/2910 Proposed data hiding scheme Genetic algorithm (GA) Given a chromosome G={0000,0001, …,1111}, two of the 16 genes of G are selected randomly and replaced by each other. Assume we get the best replacement : {1111}  {1100}, {1001}  {0001} {0101}  {1101}, {0000}  {1111}

2003/04/2911 Proposed data hiding scheme temporal imageoptimal substitution image =23

2003/04/2912 Proposed data hiding scheme 23=31-8 and 7 4 then is added to =43-8, 3<4, and the fourth bit of 35 is 0, then the fourth bit of 35 is changed to 1, and 51-3=48.

2003/04/2913 Proposed data hiding scheme 108=100+8, 4 4, and the fourth bit of 108 is not equal to 1, do nothing. 221=213+8, 5 4, and the fourth bit of 221 is equal to 1, then the fourth bit of 221 is changed to 0, and the value is add is added to =162+8, 2<4,then 170-2=168.

2003/04/2914 Proposed data hiding scheme resulting image

2003/04/2915 Experimental results host image important image simple replacement method ( dB ) proposed method ( dB )

2003/04/2916 Conclusions With careful design, such as the use of optimal substitution process and local pixel adjustment, MSB can still be used as an alternative choice for the storage and transmission of important data. Improved methods 1. Chan, Chi-Kwong, and Cheng, L.M., “ Improved hiding data in images by optimal moderately- significant-bit replacement ”, IEE Electronic Letters, Vol.37, No.16, 2nd August 2001, pp

2003/04/2917 Conclusions 2. Chang, Chin-Chen, Hu, Yu-Chen, and Lin, Min- Hui, ” A Fast and Secure Image Hiding Scheme Based on LSB Substitution ”,International Journal of Pattern Recognition and Artificial Intelligence, Vol.16, No.4, 2002, pp