A Data Hiding Scheme Based Upon Block Truncation Coding

Slides:



Advertisements
Similar presentations
A Secret Information Hiding Scheme Based on Switching Tree Coding Speaker: Chin-Chen Chang.
Advertisements

CSE 589 Applied Algorithms Spring 1999 Image Compression Vector Quantization Nearest Neighbor Search.
Fast vector quantization image coding by mean value predictive algorithm Authors: Yung-Gi Wu, Kuo-Lun Fan Source: Journal of Electronic Imaging 13(2),
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
1 An Efficient VQ-based Data Hiding Scheme Using Voronoi Clustering Authors:Ming-Ni Wu, Puu-An Juang, and Yu-Chiang Li.
Date: Advisor: Jian-Jung Ding Reporter: Hsin-Hui Chen.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
1 資訊隱藏技術之研究 The Study of Information Hiding Mechanisms 指導教授: Chang, Chin-Chen ( 張真誠 ) 研究生: Lu, Tzu-Chuen ( 呂慈純 ) Department of Computer Science and Information.
Palette Partition Based Data Hiding for Color Images Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, and Chien-Ting Huang Speaker : Yu-Chiang Li.
A Fast LBG Codebook Training Algorithm for Vector Quantization Presented by 蔡進義.
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
Advisor: Chang, Chin-Chen Student: Chen, Chang-Chu
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
影像偽裝術 Dr. Chin-Chen Chang
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
An Image Database Retrieval Scheme Based Upon Multivariate Analysis and Data Mining Presented by C.C. Chang Dept. of Computer Science and Information.
A Secret Information Hiding Scheme Based on Switching Tree Coding
Data Mining and Its Applications to Image Processing
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
Chapter 3 向量量化編碼法.
A New Image Compression Scheme Based on Locally Adaptive Coding
Advisor: Chin-Chen Chang1, 2 Student: Yi-Hui Chen2
Reversible Data Hiding in JPEG Images using Ordered Embedding
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Information Steganography Using Magic Matrix
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Source :Journal of visual Communication and Image Representation
Chair Professor Chin-Chen Chang Feng Chia University
High-capacity image hiding scheme based on vector quantization
Advisor: Chin-Chen Chang1, 2 Student: Wen-Chuan Wu2
指導教授: Chang, Chin-Chen (張真誠)
第七章 資訊隱藏 張真誠 國立中正大學資訊工程研究所.
Hiding Data in a Color Palette Image with Hybrid Strategies
A Study of Digital Image Coding and Retrieving Techniques
Embedding Secrets Using Magic Matrices
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
An Innovative Steganographic Scheme Based on Vector Quantization
A Restricted Region-based Data-hiding Scheme
An Innovative Steganographic Scheme Based on Vector Quantization
第 四 章 VQ 加速運算與編碼表壓縮 4-.
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding Scheme Using Two Steganographic Images
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
Density-Based Image Vector Quantization Using a Genetic Algorithm
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Information Steganography Using Magic Matrix
Dynamic embedding strategy of VQ-based information hiding approach
Chair Professor Chin-Chen Chang Feng Chia University
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Hiding Information in VQ Index Tables with Reversibility
Information Hiding and Its Applications
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Zhe-Ming Lu, Chun-He Liu, Dian-Guo Xu, Sheng-He Sun,
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
A Virtual Image Cryptosystem Based upon Vector Quantization
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
De-clustering and Its Application to Steganography
A Data Hiding Scheme Based Upon Block Truncation Coding
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Predictive Grayscale Image Coding Scheme Using VQ and BTC
資訊偽裝術 張真誠 講座教授 多媒體暨網路安全實驗室
Information Hiding Techniques Using Magic Matrix
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Steganographic Systems for Secret Messages
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
A Restricted Region-based Data-hiding Scheme
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

A Data Hiding Scheme Based Upon Block Truncation Coding Chin-Chen Chang Computer Science and Information Engineering National Chung Cheng University April, 2004

Outline Review some data hiding schemes Introduction to data hiding Review some data hiding schemes LSB-Based data hiding scheme VQ-Based data hiding scheme BTC-based oriented data hiding scheme Experiments and conclusions

Introduction C.C. Chang Extract hidden data Prof. Chin-Chen Chang National Chung Cheng University C.C. Chang

Cover Carriers Image Video Sound Text

Requirements Imperceptibility Capacity Security Embedding image should not appear any artificial effect Capacity Maximize the embedding payloads Security Secret messages can not be extracted by the illegal users

LSB-Based Data Hiding Scheme MSB: Most significant bit LSB: Least significant bit MSB LSB 8 7 6 5 4 3 2 1 8 bits/pixel Example: color 1 =128 Original pixel value Similar 1 1 1 1 =135 Processed pixel value

VQ-Based Data Hiding Scheme

Vector Quantization (VQ) VQ is a block-based lossy image compression method Definition of vector quantization (VQ): , where Y is a finite subset of Rk. VQ is composed of the following three parts: Codebook generation process, Encoding process, and Decoding process.

Standard VQ Compression W×H W (100, 125, …,100) H i 31 19 254 12 13 1 74 41 67 24 123 7 2 60 56 85 45 23 15 150 14 71 83 200 66 i index i Original image Index table Codebook

10

Separating the image to vectors VQ Codebook Training 1 . N-1 Training Images Training set Separating the image to vectors

VQ Codebook Training Codebook initiation Initial codebook Training set 1 . 1 . 254 255 N-1 Initial codebook Training set Codebook initiation

Training using iteration algorithm Vector Quantization (VQ) Codebook Training Index sets 1 . 1 . 254 255 (1, 2, 5, 9, 45, …) (101, 179, 201, …) (8, 27, 38, 19, 200, …) (23, 0, 67, 198, 224, …) N-1 N Codebook Ci Training set 1 . Compute mean values 254 255 Replace the old vectors New Codebook Ci+1 Training using iteration algorithm 13

Example Codebook To encode an input vector, for example, v = (150,145,121,130) (1) Compute the distance between v with all vectors in codebook d(v, cw1) = 114.2 d(v, cw2) = 188.3 d(v, cw3) = 112.3 d(v, cw4) = 124.6 d(v, cw5) = 122.3 d(v, cw6) = 235.1 d(v, cw7) = 152.5 d(v, cw8) = 63.2 (2) So, we choose cw8 to replace the input vector v. 14

LBG Algorithm

Full Search (FS) For example: Let the codebook size be 256 Image vector # of searched nodes per image vector = 256 Time consuming The closest codeword C = {c1, c2, …, cnc} 16

Euclidean Distance The dimensionality of vector = k (= w*h) An input vector x = (x1, x2, …, xk) A codeword yi = (yi1, yi2, …, yik) The Euclidean distance between x and yi

To find the closest pairs 18

d(CW0, CW8) > TH d(CW13, CW14) > TH CW1 CW11 ,CW2 ,CW3 CW4, CW5 Unused CW0, CW8, CW13, CW14 1 19

Encode Unused CW0, CW8, CW13, CW14 Index Table Index Table 20

Watermark: 1 0 1 0 1 0 0 1 0 1 1 1 1 0 0 1 1 1 1 1 1 1 1 Index Table 1 1 1 1 1 1 1 Index Table Watermark CW1, CW2, CW4, CW5 CW6, CW7 CW11, CW3 CW15, CW10 CW12, CW9 1 21

Watermark: 1 0 1 0 1 0 0 1 0 1 1 1 1 0 0 1 1 1 1 1 1 1 1 Index Table 1 1 1 1 1 1 1 Index Table Watermark CW1, CW2, CW4, CW5 CW6, CW7 CW11, CW3 CW15, CW10 CW12, CW9 1 22

Watermark: 1 0 1 0 1 0 0 1 0 1 1 1 1 0 0 1 1 1 1 1 1 1 1 Index Table 1 1 1 1 1 1 1 Index Table Watermark 23

BTC Based Data Hiding Scheme

Block Truncation Coding (BTC) BTC is a block-based lossy image compression method for gray-level images The output data of BTC for an image block contains one bitmap and two quantization levels

An Example of BTC Encoding w h 4×4 image pixels Bitmap 140 142 144 145 146 141 138 1 1 1 1 1 1 1 # of 0 is 9 # of 1 is 7, q=7 Mean value X=142.5 Variance value ρ=2.199 Original Image Two quantization levels

An Example of BTC Decoding Bitmap 1 1 141 145 1 1 Decoding 1 1 1 Reconstructed pixels

= Original pixels Processed pixels Difference 140 142 144 145 146 141 138 141 145 -1 1 -3 = - Original pixels Processed pixels Difference

Our Scheme Skip Embedding Block division (4×4 pixels) BTC Compression YES No Skip Embedding Complex block Smooth block

Why we embed secret into the smooth block? Pixels in the smooth block are close to their neighboring pixels, even though we change the bits in the bitmap, its reconstructed pixel value is still close to its original one

Our Scheme Example Bitmap T=10 (Threshold) Secret bits=1000 0101 Smooth block 1 1 1 Bitmap 1 1 1 1 1 1 1 1 1 1 T=10 (Threshold) Secret bits=1000 0101 145 141 Stego pixels

Our Scheme A larger T gets high embedding capacity, but lower image quality of the stego image and vice versa T is set to be 0, then no secret bits can be hidden T is set to be ∞, then all of the bitmap in each block will be used to embed secret, and that is the maximum embedding capacity

Experiments (a) Lena (b) Peppers (c) F-16 (d) Toys Four test images 33

Experiments Resulting of embedding capacity and image quality (PSNR) Lena Peppers F-16 Toys Embedding capacity (Kbytes) BTC 64.00 T=10 19.50 20.93 20.55 21.66 T=15 23.22 24.74 23.16 23.37 T=20 25.38 26.58 24.84 24.25 T=∞ 32.00 PSNR (dB) 33.11 33.45 32.69 32.68 32.16 32.19 32.01 31.80 31.40 31.45 31.48 30.67 30.81 30.88 31.16 24.15 24.11 22.49 21.27 34

Experiments (a) Original image (b) BTC compression (c) T=10 (d) T=15 (e) T=20 (f) T=∞ 35

Experiments (a) Original image (b) BTC compression (c) T=10 (d) T=15 (e) T=20 (f) T=∞ 36

Conclusions based upon BTC Data hiding in compression domain VQ An efficient and secure data hiding approach based upon BTC Data hiding in compression domain VQ JPEG or JPEG2000 GIF

Thank you !