Source : Signal Processing, vol. 150, pp ,  September 2018

Slides:



Advertisements
Similar presentations
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
Advertisements

1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan.
多媒體網路安全實驗室 Source:International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH- MSP),2010 Sixth. Authors:Hsiang-Cheh.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Reversible data hiding based on histogram shifting scheme Reporter: Date: Wan-Yu Lu 2012/12/13.
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Improved PVO-based reversible data hiding Source: Digital Signal Processing, 2014 Authors: Fei Peng, Xiaolong Li,ng Reporter: Min-Hao Wu.
Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
Reversible watermarking Wu Dan Introduction What?
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
Reversible Date Hiding Based on Histogram Modification of pixel Differences IEEE Transactions on circuits and systems for video technology, VOL. 19, NO.
A lossless data hiding scheme based on three- pixel block differences Ching-Chiuan Lin and Nien-Lin Hsueh Pattern Recognition, Vol. 41(4), April 2008 Pages.
Vishnu Vardhan Reddy Mukku Mav ID : Under the guidance of.
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
(k, n)-Image Reversible Data Hiding
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Source: IEEE Transactions on Circuits and Systems for Video Technology Vol.26.
Image camouflage by reversible image transformation
Reversible Data Hiding in JPEG Images using Ordered Embedding
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Centrality Bias Measure for High Density QR Code Module Recognition
Source :Journal of visual Communication and Image Representation
Reversible data hiding scheme based on significant-bit-difference expansion Sourse: IET Image Processing ( Volume: 11, Issue: 11, ), Pages 1002.
Mean value based reversible data hiding in encrypted images
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
Source: J. Vis. Commun. Image R. 41 (2016) 58–64
Separable and error-free reversible data hiding in encrypted images
Yongjian Hu, Member, IEEE, Heung-Kyu Lee, Kaiying Chen, and Jianwei Li
Source: Information Sciences, 2018, accpeted.
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source : Signal Processing, vol. 126, pp ,  November 2016
Skewed Histogram Shifting for Reversible Data Hiding using a Pair of Extreme Predictions Source: IEEE Transactions on Circuits and Systems for Video Technology(
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Improved joint reversible data hiding in encrypted images
Reversible Data Hiding
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Source: Signal Processing: Image Communication 64 (2018) 78-88
Source:. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL
Source: Signal Processing, Vol. 125, pp , August 2016.
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
Sourse: IEEE Transactions on Circuits and Systems for Video Technology
Reversible Data Hiding in JPEG Images
Source : Journal of Visual Communication and Image Representation, vol
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Skewed Histogram Shifting for Reversible Data Hiding using a Pair of Extreme Predictions Source: IEEE Transactions on Circuits and Systems for Video Technology(
Dynamic embedding strategy of VQ-based information hiding approach
Source : Journal of Visual Communication and Image Representation, vol
Sourse: Multimedia Tools and Applications, 2018, pp 1–17
High-fidelity reversible data hiding based on pixel-value-ordering and pairwise prediction-error expansion Source: Journal of Visual Communication and.
A new chaotic algorithm for image encryption
New Framework for Reversible Data Hiding in Encrypted Domain
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
Blind Reversible Authentication Based on PEE and CS Reconstruction
Source: IEEE Transactions on Circuits and Systems,
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Pairwise IPVO-Based Reversible Data Hiding
Sourse: Information Sciences, Vol. 494, pp , August 2019
Dynamic improved pixel value ordering reversible data hiding
Source : Digital Signal Processing. Vol. 73, pp , Feb
Sourse: arXiv preprint, arXiv: , 2018 (Submit to IEEE Trans
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
Rich QR Codes With Three-Layer Information Using Hamming Code
Adopting secret sharing for reversible data hiding in encrypted images
Reversible data hiding in encrypted binary images by pixel prediction
Presentation transcript:

A high capacity reversible data hiding scheme based on right-left shift Source : Signal Processing, vol. 150, pp. 102-115,  September 2018 Authors : Wang Weiqing , Ye Junyong , Wang Tongqing and Wang Weifu Speaker : Chia-Shuo Shih Date : 2018/08/30 1

Outline Related work Proposed method Experimental results Conclusions 2

Related work-Histogram shifting 2 3 4 5 1 Z. Ni, Y.Q. Shi, N. Ansari, W. Su Reversible data hiding IEEE Trans. Circuits Syst. Video Technol., 16 (3) (2006), pp. 354-362 3

Related work-Histogram shifting 2 3 5 6 1 4

Related work-Histogram shifting 2 3 5 6 1 2 3 5 6 4 1 s = 010111001 5

Proposed method 6

Proposed method 7 𝑍 𝑙𝑖 (i = 1,2…) 𝑍 𝑙1 = -78 , 𝑍 𝑙2 = -79, 𝑍 𝑙1 = -78 , 𝑍 𝑙2 = -79, 𝑍 𝑙3 = -80 , 𝑍 𝑙4 = -81,… p(i,j) p(i,j+1) p(i+1,j) p(i+1,j+1) 𝑍 𝑟𝑖 (i = 1,2…) 𝑍 𝑟1 = 83 , 𝑍 𝑟2 = 86, 𝑍 𝑟3 = 87 , 𝑍 𝑟4 = 88,… 7

Proposed method 8

Proposed method 𝑡 𝑛 =2 𝑝 𝑝 (1,1) = 203+111+152 3 = 155 151 203 173 194 160 187 149 120 111 152 155 162 185 170 142 135 138 113 154 150 148 117 171 174 200 161 166 156 145 186 176 177 169 165 184 159 127 196 181 178 183 137 141 146 151 p(1,1) = 𝑝 𝑝 (1,1) = 203+111+152 3 = 155 151 203 111 152 d(1,1) = 151 – 155 = -4 𝑝 𝑝 (1,7) = 120+170+142 3 = 144 149 120 170 142 149 d(1,7) = 149 – 144 = 5 p(1,7) = 𝑝 𝑝 (5,6) = 169+181+178 3 = 176 177 169 181 178 177 d(5,6) = 177 – 176 = 1 p(5,6) = 9

Proposed method-right shift 𝑡 𝑛 =2 𝑡 𝑟𝑚 = 2* 𝑡 𝑛 + 1 = 5 d(1,1) = -4 , -4 < -2 𝑝 𝑟𝑚 ( 1, 1 ) = p( 1 , 1 ) = 151 d(1,7) = 5 5 > 2 , d(1,7) < 𝑍 𝑟1 𝑝 𝑟𝑚 ( 1, 7 ) = 149 + 5 – 0 = 154 d(5,6) = 1 -2 < 1 < 2 𝑝 𝑟𝑚 ( 5, 6 ) = 177 + 1 + 2 + 0 = 180 10

Proposed method-left shift 𝑡 𝑛 =2 𝑡 𝑟𝑚 = 2* 𝑡 𝑛 + 1 = 5 𝑡 𝑙𝑚 = 2 ∗𝑡 𝑟𝑚 =10 𝒅 𝒍 ( i , j ) = 𝒑 𝒓𝒎 ( i , j ) - 𝒑 𝒑 ( i , j ) 𝑑 𝑙 ( 1 , 1 ) = 151- 155 = -4 , -4 < -2 𝑍 𝑙1 ≤𝑑 𝑙 , 𝑝 𝑙𝑚 = 151 – 10 +0 = 141 𝑑 𝑙 (1,7) = 10 10 > 7 𝑝 𝑙𝑚 ( 1, 7 ) = 𝑝 𝑟𝑚 ( 1, 7 ) = 154 𝑑 𝑙 (5,6) = 4 -2 < 4 < 7 𝑝 𝑙𝑚 ( 5, 6 ) = 180 + 4 – 2 – 5 – 1 = 176 11

Proposed method 12 overflow and underflow: 𝑝 𝑙𝑚 (1,1) = 141 𝑝 𝑙𝑚 (1,7) = 154 𝑝 𝑙𝑚 (5,6) = 176 151 203 173 194 160 187 149 120 111 152 155 162 185 170 142 135 138 113 154 150 148 117 171 174 200 161 166 156 145 186 176 177 169 165 184 159 127 196 181 178 183 137 141 146 141 208 178 199 150 192 154 120 101 157 160 167 190 175 142 125 128 103 144 140 153 117 161 164 205 151 156 152 146 145 191 166 176 159 165 189 201 186 179 183 127 131 155 169 162 12

Proposed method 𝒅 𝒍 (5,6)=4 𝒑 𝒓𝒎 (𝟓,𝟔)=180 𝒃 𝒍 =1 13 overflow and underflow:  𝑝 𝑙𝑚 (5,6)=176 , 𝑝 𝑝 (5,6)=176 , 𝒅 𝒎 (5,6)=0 - 𝑡 𝑛 − 𝑡 𝑙𝑚 ≤ 𝑑 𝑚 (5,6) ≤ 𝑡 𝑛 + 𝑡 𝑟𝑚 -12 ≤ 0 ≤ 7 𝒅 𝒍 (5,6)=4 𝒑 𝒓𝒎 (𝟓,𝟔)=180 𝒃 𝒍 =1 13

Proposed method 𝒅 𝒍 (5,6)=4 d(5,6)=1 p(5,6)=177 𝒃 𝒓 =0 14 - 𝑡 𝑛 ≤ 𝑑 𝑚 (5,6) ≤ 𝑡 𝑛 + 𝑡 𝑟𝑚 -4 ≤ 0 ≤ 7 d(5,6)=1 p(5,6)=177 𝒃 𝒓 =0 14

Experimental results [5]IoanCatalin Dragoi, D. Coltuc,Local-prediction-based difference expansion reversible watermarking,IEEE Trans. Image Process., 23 (4) (2014), pp. 1779-1790 [14]B. Xue, X. Li, J. Wang, Z. Guo,Improved reversible data hiding based on two-dimensional difference-histogram modification,Multimed. Tools Appl. (2016), pp. 1-19 [15]Aulia Arham, H.A. Nugroho, T.B. Adji,Multiple layer data hiding scheme based on difference expansion of quad ☆Signal Process., 137 (2017), pp. 52-62 [29]J. Wang, J. Ni, X. Zhang, Y.Q. Shi,Rate and distortion optimization for reversible data hiding using multiple histogram shifting,IEEE Trans. Cybern., 47 (2) (2017), p. 315 [35]X. Zhang, Z. Qian, G. Feng, Y. Ren,Efficient reversible data hiding in encrypted images,J. Vis. Commun. Image Represent., 25 (2) (2014), pp. 322-328 15

Experimental results 16

Conclusions Right left shift The proposed method is simple and easy to implement. The proposed scheme has high EC on different images 17

-END- 18