Source : Signal Processing, Volume 133, April 2017, Pages

Slides:



Advertisements
Similar presentations
Watermarking For Image Authentication Presented by San-Hao Wang.
Advertisements

JPEG Still Image Data Compression Standard
Case Study ARM Platform-based JPEG Codec HW/SW Co-design
Low Complexity Scalable DCT Image Compression IEEE International Conference on Image Processing 2000 Philips Research Laboratories, Eindhoven, Netherlands.
Department of Computer Engineering University of California at Santa Cruz Data Compression (2) Hai Tao.
Introduction to JPEG Alireza Shafaei ( ) Fall 2005.
DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999.
JPEG. The JPEG Standard JPEG is an image compression standard which was accepted as an international standard in  Developed by the Joint Photographic.
Hardware/Software Codesign Case Study : JPEG Compression.
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
JPEG - JPEG2000 Isabelle Marque JPEGJPEG2000. JPEG Joint Photographic Experts Group Committe created in 1986 by: International Organization for Standardization.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
JPEG.
CS654: Digital Image Analysis
Page 11/28/2016 CSE 40373/60373: Multimedia Systems Quantization  F(u, v) represents a DCT coefficient, Q(u, v) is a “quantization matrix” entry, and.
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
JPEG. Introduction JPEG (Joint Photographic Experts Group) Basic Concept Data compression is performed in the frequency domain. Low frequency components.
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
Implementing JPEG Encoder for FPGA ECE 734 PROJECT Deepak Agarwal.
Tamal Bose, Digital Signal and Image Processing © 2004 by John Wiley & Sons, Inc. All rights reserved. Figure 11-1 (p. 624) (a) Image coder; (b) image.
JPEG Compression What is JPEG? Motivation
IMAGE PROCESSING IMAGE COMPRESSION
Source: IEEE Signal Processing Letters (Accepted)2016
Chapter 9 Image Compression Standards
A Secret Information Hiding Scheme Based on Switching Tree Coding
Source: The Journal of Systems and Software, Volume 67, Issue 2, pp ,
Discrete Cosine Transform
JPEG.
Image Compression Standards (JPEG)
Lossy Compression of DNA Microarray Images
Reversible Data Hiding in JPEG Images using Ordered Embedding
CMPT 365 Multimedia Systems
Watermarking for Image Authentication ( Fragile Watermarking )
CIS679: MPEG MPEG.
Source :Journal of visual Communication and Image Representation
High-capacity image hiding scheme based on vector quantization
CIS679: JPEG (more) Review of JPEG More about JPEG Lab project.
JPEG Pasi Fränti
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
Separable and error-free reversible data hiding in encrypted images
Yongjian Hu, Member, IEEE, Heung-Kyu Lee, Kaiying Chen, and Jianwei Li
JPEG Still Image Data Compression Standard
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
The JPEG Standard.
An efficient reversible data hiding method for AMBTC compressed images
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Source: Signal Processing: Image Communication 64 (2018) 78-88
Reversible Data Hiding in JPEG Images
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Dynamic embedding strategy of VQ-based information hiding approach
Information Hiding and Its Applications
Digital Steganography Utilizing Features of JPEG Images
Partial reversible data hiding scheme using (7, 4) hamming code
Zhe-Ming Lu, Chun-He Liu, Dian-Guo Xu, Sheng-He Sun,
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
Partial reversible data hiding scheme using (7, 4) hamming code
New Framework for Reversible Data Hiding in Encrypted Domain
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Blind Reversible Authentication Based on PEE and CS Reconstruction
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Hidden Digital Watermarks in Images
Sourse: Information Sciences, Vol. 494, pp , August 2019
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Adopting secret sharing for reversible data hiding in encrypted images
Reversible data hiding in encrypted binary images by pixel prediction
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

A separable reversible data hiding scheme for encrypted JPEG bitstreams Source : Signal Processing, Volume 133, April 2017, Pages 135-143 Authors : Jen-Chun Chang, Yi-Zhi Lu, Hsin-Lung Wu Speaker : Si-Liang He Date : 2017/12/21

Outline Introduction Proposed scheme Experimental results Conclusions

JPEG compression 1/4 Procedure of JPEG compression

JPEG compression 2/4 DCT Original Image 52 55 61 66 70 64 73 63 59 90 109 85 69 72 62 68 113 144 104 58 71 122 154 106 67 126 88 79 65 60 77 75 83 87 76 78 94 -415 -30 -61 27 56 -20 -2 4 -22 10 13 -7 -9 5 -47 7 77 -25 -29 -6 -49 12 34 -15 -10 6 2 -13 -4 -3 3 -8 1 -1   DCT Original Image

JPEG compression 3/4 DC(direct current ) The others are AC(alternating current ) 26 2 3 -1 1 DC: differential pulse code modulation (DPCM) Quantification JPEG file Entropy encoding AC: Run Length Coding (RLC) Quantization table

QF = 10 QF = 50

JPEG compression 4/4 AC coefficients : {0, 2, -1,0, 0, 0, 3, 0, 1, ...... } ZRV(zero-run-value)(R,V): {(1, 2), (0, -1), (3, 3), (1,1), …} RSV (Run/Size and Value) Denote as [(RL, BL), A]: {[(1, 2), 10], [(0, 1), 0], [(11, 2), 11], [(1, 1), 1], …} RL : Binary representation of number of zero BL : Bit length of the binary representation of non-zero value A : Binary representation of non-zero value

Proposed scheme - flow chart

Proposed scheme - 1/6 Generate a pseudo-random permutation block (1, 1) → (1, 2) → (2, 1) → (2, 2) → (1, 1)

Proposed scheme - 2/6 Zig-zag order {-3, -2, 2, 3}

Proposed scheme - 3/6 G 2 = (-3, 2, -2, 3, 2, -2, -3, 3, -2, -2, 2, 3, 2, 2, 3, 2, -2, 2, 2, 2, 2, -2, 2, 2, 2) 𝐺 2 = (11, 00, 10, 01, 00, 10, 11, 01, 10, 10, 00, 01, 00, 00, 01, 00, 10, 00, 00, 00, 00, 10, 00, 00, 00) LSB( 𝐺 2 ) = (1, 0, 0, 1, 0, 0, 1, 1, 0, 0, 0, 1, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0) k = 6, n = 25 𝑓 𝐶 (LSB( 𝐺 2 ) ) = (0, 1, 1, 0, 0, 0, 0, 1, 0, 0, 0, 1, 1, 1, 0, 1, 1, 0, 0, 0, 0, 0, 0)

Proposed scheme - 4/6 𝑓 𝐶 (LSB( 𝐺 2 ) ) = (0, 1, 1, 0, 0, 0, 0, 1, 0, 0, 0, 1, 1, 1, 0, 1, 1, 0, 0, 0, 0, 0, 0)

Proposed scheme - 5/6 LSB( 𝐺 2 ) = (1, 0, 0, 1, 0, 0, 1, 1, 0, 0, 0, 1, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0) 𝑓 𝐶 (LSB( 𝐺 2 ) ) = (0, 1, 1, 0, 0, 0, 0, 1, 0, 0, 0, 1, 1, 1, 0, 1, 1, 0, 0, 0, 0, 0, 0) LSB( 𝐺 2 ′ ) = (0, 1, 1, 0, 0, 0, 0, 1, 0, 0, 0, 1, 1, 1, 0, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0) 𝐺 2 ′ = (10, 01, 11, 00, 00, 10, 10, 01, 10, 10, 00, 01, 01, 01, 00, 01, 11, 00, 00, 00, 00, 10, 00, 00, 00) (-2, 3, -3, 2, 2, -2, -2, 3, -2, -2, 2, 3, 3, 3, 2, 3, -3, 2, 2, 2, 2, -2, 2, 2, 2)

Proposed scheme - 6/6 embedding & extraction LSB( 𝐺 2 ′ ) = (0, 1, 1, 0, 0, 0, 0, 1, 0, 0, 0, 1, 1, 1, 0, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0) = 5 → k = 6 = 18 recovery (0, 0, 1, 0, 0, 0, 1, 1, 1, 0, 1, 1, 0, 0, 0, 0, 0, 0) (110111000100)2 = t LSB( 𝐺 2 ) = (1, 0, 0, 1, 0, 0, 1, 1, 0, 0, 0, 1, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0)

Experimental results

Conclusions Proposed a lossless compression algorithm. Decryption and extraction can be separable.