High-capacity image hiding scheme based on vector quantization

Slides:



Advertisements
Similar presentations
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
Advertisements

A Secret Information Hiding Scheme Based on Switching Tree Coding Speaker: Chin-Chen Chang.
Fast vector quantization image coding by mean value predictive algorithm Authors: Yung-Gi Wu, Kuo-Lun Fan Source: Journal of Electronic Imaging 13(2),
1 An Efficient VQ-based Data Hiding Scheme Using Voronoi Clustering Authors:Ming-Ni Wu, Puu-An Juang, and Yu-Chiang Li.
Date: Advisor: Jian-Jung Ding Reporter: Hsin-Hui Chen.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Palette Partition Based Data Hiding for Color Images Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, and Chien-Ting Huang Speaker : Yu-Chiang Li.
A Fast LBG Codebook Training Algorithm for Vector Quantization Presented by 蔡進義.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Advisor: Chang, Chin-Chen Student: Chen, Chang-Chu
Palette Partition Based Data Hiding for Color Images
A Secret Information Hiding Scheme Based on Switching Tree Coding
Source: The Journal of Systems and Software, Volume 67, Issue 2, pp ,
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
Chapter 3 向量量化編碼法.
2003/04/291 Hiding data in images by optimal moderately- significant-bit replacement Wang, Ran-Zan, Lin, Chi-Fang, and Lin, Ja-Chen, IEE Electronics Letters,
Source : Signal Processing, Volume 133, April 2017, Pages
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Information Steganography Using Magic Matrix
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Source :Journal of visual Communication and Image Representation
Chair Professor Chin-Chen Chang Feng Chia University
指導教授: Chang, Chin-Chen (張真誠)
A Data Hiding Scheme Based Upon Block Truncation Coding
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images Source: Symmetry, vol. 8, no. 6, June.
第七章 資訊隱藏 張真誠 國立中正大學資訊工程研究所.
Hiding Data in a Color Palette Image with Hybrid Strategies
A Study of Digital Image Coding and Retrieving Techniques
Embedding Secrets Using Magic Matrices
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
An Innovative Steganographic Scheme Based on Vector Quantization
A Restricted Region-based Data-hiding Scheme
An efficient reversible data hiding method for AMBTC compressed images
An Innovative Steganographic Scheme Based on Vector Quantization
Reversible Data Hiding Scheme Using Two Steganographic Images
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
Information Steganography Using Magic Matrix
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Dynamic embedding strategy of VQ-based information hiding approach
Chair Professor Chin-Chen Chang Feng Chia University
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Hiding Information in VQ Index Tables with Reversibility
Information Hiding and Its Applications
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
第 十 章 隱像術.
Data hiding method using image interpolation
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
A Virtual Image Cryptosystem Based upon Vector Quantization
EarthTour Presentations
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
Partial reversible data hiding scheme using (7, 4) hamming code
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
De-clustering and Its Application to Steganography
A New Method for Tamper Detection and Recovery
A Data Hiding Scheme Based Upon Block Truncation Coding
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Predictive Grayscale Image Coding Scheme Using VQ and BTC
資訊偽裝術 張真誠 講座教授 多媒體暨網路安全實驗室
Information Hiding Techniques Using Magic Matrix
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Steganographic Systems for Secret Messages
A Restricted Region-based Data-hiding Scheme
Adopting secret sharing for reversible data hiding in encrypted images
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

High-capacity image hiding scheme based on vector quantization Authors: Yu-Chen Hu Source: Pattern Recognition, Volume 39, Issue 9, September 2006 speaker: Kuo Hua Wang Date: 2006/8/24

Outline Introduction The virtual image cryptosystem The proposed scheme Results Conclusions

Introduction Two categories of Image hiding schemes -spatial domain -frequency domain The proposed scheme -LSB technique are employed to cut down the storage cost of indices -Improve the image quality of the stego-image

Virtual image cryptosystem(1) H: host image S: secret image K: H,S partitioned into blocks of k pixels : G,D: Two randomly generated vectors of k-dimensions r: The number of bits use to hide secret image

Virtual image cryptosystem(2) The set of image vectors in H’ is reordered according to the projected values to form the codebook of codewords. After the codebook is generated, the secret image S is now compressed by VQ to generated the indices of the closest codewords in the codebook.

The proposed scheme(1) w,h: Host image H and secret images are w × h pixels. sno: Total number of secret images Nc: The size of the VQ codebook k: Vector dimension rs,pk: Two random seeds sk: Secret key RANG: Searching range : Displacement threshold

The proposed scheme(2) embed four secret images of512 × 512 pixels into the host image of the same size, 128 codewords is used and each codeword is of 16 pixels. (4×512×512×log2 128)/(16×512× 511)=2. LBG algorithm is used to design the codebook of Nc codewords with the codebook initialization by the randomly selected codewords in the training vectors with random seed rs.

The proposed scheme(3) Index compression technique DES G1: If the same index can be found in its neighbor in the specific range (RANG) G2: If I(x)is quite close to its previous index I(x-1) but not the same. G3: Others

The proposed scheme(4) To hide the encrypted secret data into the remaining (h−1) rows of the host image, we need to determine the hiding capacity table (HCT). Two basic rules are used to determine the entries in HCT. First, ECIT should be fairly embedded into each host pixel. Second, the complex pixels should embed more secret bits than that of smooth pixels. The ADD value assigned to each AAD entry is ranged from 1 to rmax A pseudo random number generator with random seed pk is used to generate a serial of random numbers that are used to determine the positions of the pixels that will sequentially be used to embed the encrypted secret data.

The proposed scheme(5)

The proposed scheme(6) Suppose we want to embed the secret data into the selected pixel h(i, j ) with value 127. Let HCT(i, j ) = 2 and the 2-bit secret data s(i, j) equals (00)

Results(1)

Results(2)

Results(3)

Results(3)

Conclusions Improved hiding capacity Two random seeds rs and pk and the secret key sk are used in the proposed scheme The image qualities of the secret images and the stego-images are good for practical applications.