A Color Image Hiding Scheme Based on SMVQ and Modulo Operator

Slides:



Advertisements
Similar presentations
A Secret Information Hiding Scheme Based on Switching Tree Coding Speaker: Chin-Chen Chang.
Advertisements

Side match vector quantization. 2 preface To compress image, using VQ, usual method is to encode blocks indepentently. However, there are many interblock.
Fast vector quantization image coding by mean value predictive algorithm Authors: Yung-Gi Wu, Kuo-Lun Fan Source: Journal of Electronic Imaging 13(2),
1 An Efficient VQ-based Data Hiding Scheme Using Voronoi Clustering Authors:Ming-Ni Wu, Puu-An Juang, and Yu-Chiang Li.
Date: Advisor: Jian-Jung Ding Reporter: Hsin-Hui Chen.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
1 資訊隱藏技術之研究 The Study of Information Hiding Mechanisms 指導教授: Chang, Chin-Chen ( 張真誠 ) 研究生: Lu, Tzu-Chuen ( 呂慈純 ) Department of Computer Science and Information.
Palette Partition Based Data Hiding for Color Images Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, and Chien-Ting Huang Speaker : Yu-Chiang Li.
A Fast LBG Codebook Training Algorithm for Vector Quantization Presented by 蔡進義.
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
Advisor: Chang, Chin-Chen Student: Chen, Chang-Chu
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
影像偽裝術 Dr. Chin-Chen Chang
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Palette Partition Based Data Hiding for Color Images
A Secret Information Hiding Scheme Based on Switching Tree Coding
Data Mining and Its Applications to Image Processing
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
Chapter 3 向量量化編碼法.
A New Image Compression Scheme Based on Locally Adaptive Coding
Reversible Data Hiding in JPEG Images using Ordered Embedding
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Information Steganography Using Magic Matrix
Chair Professor Chin-Chen Chang Feng Chia University
Source :Journal of visual Communication and Image Representation
Chair Professor Chin-Chen Chang Feng Chia University
High-capacity image hiding scheme based on vector quantization
Advisor: Chin-Chen Chang1, 2 Student: Wen-Chuan Wu2
指導教授: Chang, Chin-Chen (張真誠)
A Data Hiding Scheme Based Upon Block Truncation Coding
第七章 資訊隱藏 張真誠 國立中正大學資訊工程研究所.
A Color Image Hidden in a
Hiding Data in a Color Palette Image with Hybrid Strategies
A Study of Digital Image Coding and Retrieving Techniques
Embedding Secrets Using Magic Matrices
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
第 四 章 VQ 加速運算與編碼表壓縮 4-.
Reversible Data Hiding Scheme Using Two Steganographic Images
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Information Steganography Using Magic Matrix
Chapter 7 漸進式影像傳輸.
Dynamic embedding strategy of VQ-based information hiding approach
Chair Professor Chin-Chen Chang Feng Chia University
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Hiding Information in VQ Index Tables with Reversibility
Information Hiding and Its Applications
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
High Capacity Data Hiding for Grayscale Images
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
EarthTour Presentations
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
De-clustering and Its Application to Steganography
A New Method for Tamper Detection and Recovery
A Data Hiding Scheme Based Upon Block Truncation Coding
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Predictive Grayscale Image Coding Scheme Using VQ and BTC
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
資訊偽裝術 張真誠 講座教授 多媒體暨網路安全實驗室
Information Hiding Techniques Using Magic Matrix
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Steganographic Systems for Secret Messages
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
A New Image Compression Scheme Based on Locally Adaptive Coding
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

A Color Image Hiding Scheme Based on SMVQ and Modulo Operator Authors: Chi-Shiang Chan and Chin-Chen Chang Speaker: Chin-Chen Chang

Outline 1. Introduction-VQ 2. Related work-SMVQ 、CSMVQ 3. The proposed method 4. Experimental results 5. Conclusions

Introduction - Vector Quantization (VQ)

2.Related Work (1/3) -SMVQ There are two kinds of blocks in the image: seed blocks and residual blocks. The blocks in the first row and first column are set as seed blocks. On the other hand, the other blocks, called residual blocks, are encoded by using a predictive method.

2.Related Work (2/3) -SMVQ Find the closest codeword according to the reference vector. If the mean square error is larger than a threshold, then the codeword found is set as a seed block. That means this block has to be encoded by using the VQ method. Otherwise, the codeword found is set as a residual block.

2.Related Work (3/3) -CSMVQ Find the n closest codeword according to the reference vector to form the State Codebook. The closest codeword in the state codebook can be picked out according to the original block. If the mean square error is unacceptable, we set this block as a seed block. Otherwise, record the index in the State Codebook.

3. The proposed method(1/6) Apply the concept of CSMVQ to encode a color host image. Meanwhile, a color secret image will be embedded into the color host image.

3. The proposed method (2/6) For the reference vector, we search the sorted palette to find the most similar color pixel. Assume that the index of the most similar color pixel is i, and the size of the state palette is S. Then, we range the state palette from i- (S/2-1) to i+ (S/2).

3. The proposed method (3/6) The value i stands for the index value in the state codebook, and P is the index number of the sub-state codebook that index i belongs to. Moreover, the total number of sub-state palettes is N . If the value of the two bits in the secret bit stream is 3, then we search the third sub-state palette to find the closet codeword. If the closest color pixel is still far away from the original color pixel, we set this color pixel as a seed pixel. Otherwise, we set this color pixel as a residual pixel and record its index in the sub-state palette.

3. The proposed method -Sort Algorithm (4/6) Luminance-sorted Algorithm Red pixel value Blue pixel value Luminance value Green pixel value

3. The proposed method -Sort Algorithm (4/6) Luminance-sorted Algorithm

3. The proposed method -Sort Algorithm (5/6) PCA-sorted Algorithm

3. The proposed method (6/6) -The Extraction Procedure Secret bit stream State palette Assume that the index is i. Then, we can get the color pixel through the index i and the state palette. Moreover, the value of secret bits can be calculated by the modulo formula ( i mod N ). ( i mod N) Get a color pixel from the state palette no Compress code Seed pixel? Reconstruct a color pixel yes Get a color pixel from the palette

4. Experimental results (1/5) The color host images with size 512 × 512 Lena Pepper Baboon The color secret images with size 128 × 128 Tiffany Jet

4. Experimental results (2/5) In our procedure, the state palette is obtained by putting together continuous indices. This way, the sorting algorithm puts similar color pixels as close as possible, so that we have the biggest chance to put a suitable color pixel in the state palette. In order to show the influence different sorting algorithms have on the image quality and storage space, in our experiment, the palette was sorted by the PCA sorting technique and by the luminance value. Table 1 shows the results of partitioning the state palette into two sub-state palettes. In the tables, the PSNR values came from the original color host images and decoded color host images. In addition, the tables also show the storage space taken up by the compression code.

4. Experimental results (3/5) Table 2 shows the partitioning of the state palette into four sub-state palettes. According to the tables, the color host images with PCA-sorted palettes have better quality and do not occupy much storage space in most cases. Another difference between Table 1 and Table 2 is that the storage needed in Tables 2 is larger than that in Table 1. The reason is that the results in Table 2 came from partitioning the palette into four sub-state palettes. However, the cost to pay for this is that the probability of finding a suitable color in one sub-state palette became lower. The whole palette is searched to find the closest color and have its index recorded with eight bits. As a result, the storage needs rise up in the most cases.

4. Experimental results (4/5) -The decoded color host images The result with two sub-state palettes by PCA-sorting The result with two sub-state palettes by luminance -sorting The result with four sub-state palettes by PCA-sorting The result with four sub-state palettes by luminance -sorting

4. Experimental results (5/5) -The Reconstructed color secret image According to the experimental results, by using our mew method, we can obtain both good decoded color host image quality and good reconstructed color secret image quality.

5.Conclusions 1. A novel method to hide a color secret image 2. Good color stego-image quality and good reconstructed color secret image quality