Separable and error-free reversible data hiding in encrypted images

Slides:



Advertisements
Similar presentations
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Advertisements

Reversible Data Hiding Based on Two-Dimensional Prediction Errors
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:
Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
Reversible Image Watermarking Using Interpolation Technique Source: IEEE Transcation on Information Forensics and Security, Vol. 5, No. 1, March 2010 Authors:
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
Source: IEEE Signal Processing Letters (Accepted)2016
(k, n)-Image Reversible Data Hiding
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Source: IEEE Transactions on Circuits and Systems for Video Technology Vol.26.
Reversible Data Hiding in JPEG Images using Ordered Embedding
Source : Signal Processing, Volume 133, April 2017, Pages
QR Code Authentication with Embedded Message Authentication Code
Mean value based reversible data hiding in encrypted images
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
Source: J. Vis. Commun. Image R. 41 (2016) 58–64
Parag Agarwal Digital Watermarking Parag Agarwal
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
An efficient reversible data hiding method for AMBTC compressed images
Source: Information Sciences, 2018, accpeted.
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source : Signal Processing, vol. 126, pp ,  November 2016
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Improved joint reversible data hiding in encrypted images
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Source: IEEE Access, Vol. 6, Dec. 2017, pp
Source: Signal Processing, Vol. 125, pp , August 2016.
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
A reversible and secure patient information hiding system for IoT driven e-health Source : International Journal of Information Management, Available online.
Source : Journal of Visual Communication and Image Representation, vol
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Data hiding method using image interpolation
Source : Journal of Visual Communication and Image Representation, vol
Sourse: Multimedia Tools and Applications, 2018, pp 1–17
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
A Data-Hiding Technique with Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
Digital Watermarking for Image Authentication with Localization
Data hiding method using image interpolation
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
Partial reversible data hiding scheme using (7, 4) hamming code
New Framework for Reversible Data Hiding in Encrypted Domain
Novel Multiple Spatial Watermarking Technique in Color Images
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
Blind Reversible Authentication Based on PEE and CS Reconstruction
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection Source: Multimedia.
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Sourse: Information Sciences, Vol. 494, pp , August 2019
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Dynamic improved pixel value ordering reversible data hiding
Source : Digital Signal Processing. Vol. 73, pp , Feb
Sourse: arXiv preprint, arXiv: , 2018 (Submit to IEEE Trans
Lossless Data Hiding in the Spatial Domain for High Quality Images
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
A Quadratic-Residue-based Fragile Watermarking Scheme
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Adopting secret sharing for reversible data hiding in encrypted images
Reversible data hiding in encrypted binary images by pixel prediction
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Separable and error-free reversible data hiding in encrypted images Source:Signal Processing, 2016, 123:9-21. Authors: DawenXu, RangdingWang Speaker :Xiaozhu Xie Date : 2018/03/29

Outline Scenario Proposed scheme Experimental results Conclusions I would like to present in these five parts.

Scenario Embed additional messages(e.g.,labels, time stamps, category information etc.) KEMB KENC KENC [səˈnærioʊ] cloud storage is becoming more and more popular, I bet everyone here uses cloud storage more or less. However the security problem followed. For example, many photos of Hollywood actresses leaked from iCloud two years ago. So before upload the images, we would like to encrypt it. And on the server side, cloud server would like to embed some information for management, for example…. So

Proposed scheme(1/13) SP NSP

Proposed scheme(2/13)-Generation of interpolation-error SP NSP [23] L.X. Luo, Z.Y.Chen, M.Chen, Reversible image watermarking using interpolation technique, IEEE Trans.Inf.Forensics Secur.5(1)(2010) 187–193.

Proposed scheme(3/13)-Generation of interpolation-error 90 28 30 … 98 100 32 24 86 90 59 28 29 30 … 98 79 64 48 31 99 100 66 32 61 77 93 65 24 55 86 92 90 1 28 21 30 … -2 16 4 9 98 -1 100 -16 32 -31 19 11 24 -15 86 Original Image Down-sample pixels Interpolation Interpolation-errors 𝐸(𝑖,𝑗) -127 ~ +127

Proposed scheme(4/13)-Image encryption 124 1 245 34 21 … -2 23 7 65 42 -1 154 -45 230 -34 12 43 25 -32 189 SP: Bitwise XOR with random bit stream generated by 𝐾 𝑒𝑛 . NSP(𝐸(𝑖,𝑗)): As follows. The encrypted image ( 𝑇 𝑛 =−2, 𝑇 𝑝 =1) 𝐸 ′ 𝑖,𝑗 = 𝐸(𝑖,𝑗) 𝑖𝑓 𝐸(𝑖,𝑗)∈ 𝑇 𝑛 , 𝑇 𝑝 𝑚𝑜𝑑 𝐸 𝑖,𝑗 − 𝑇 𝑝 +1 + 𝑟 1 𝑖,𝑗 , 127−2 𝑇 𝑝 +1 +1 +( 𝑇 𝑝 +1) 𝑖𝑓 𝐸(𝑖,𝑗)∈ 𝑇 𝑝 +1,127−( 𝑇 𝑝 +1) −𝑚𝑜𝑑 𝑟 2 𝑖,𝑗 − 𝐸 𝑖,𝑗 − 𝑇 𝑛 −1 , 127+2 𝑇 𝑛 +( 𝑇 𝑛 −1) 𝑖𝑓 𝐸(𝑖,𝑗)∈ −127−𝑇 𝑛 , 𝑇 𝑛 −1 Random numbers: 𝑟 1 (𝑖,𝑗)∈ 0,127−2( 𝑇 𝑝 +1) , 𝑟 2 (𝑖,𝑗)∈ 0,127+ 𝑇 𝑛 +( 𝑇 𝑝 −1)

Proposed scheme(5/13)

Proposed scheme(6/13)-Data embedding 124 1 245 34 21 … -2 23 7 65 42 -1 154 -45 230 -34 12 43 25 -32 189 124 3 245 36 21 … -4 25 9 67 42 -2 154 -47 230 -36 14 1 45 27 -34 189 10010 𝑇 𝑛 =−2, 𝑇 𝑝 =1 The encrypted image The marked encrypted image 𝑤 is the to-be-embedded bit

Proposed scheme(7/13)-Data extraction and image recovery

Proposed scheme(8/13)-Scheme I (data extraction) 124 3 245 36 21 … -4 25 9 67 42 -2 154 -47 230 -36 14 1 45 27 -34 189 10010 Data extraction: 𝑤 = 𝐸 𝑖,𝑗 𝑚𝑜𝑑 2 𝐸 𝑖,𝑗 ∈ 2 𝑇 𝑛 , 2 𝑇 𝑝 +1 The marked encrypted image

Proposed scheme(9/13)-Scheme I (Image recovery) 124 3 245 36 21 … -4 25 9 67 42 -2 154 -47 230 -36 14 1 45 27 -34 189 1 36 … -2 25 9 67 -1 -47 -36 14 45 27 -34 1 21 … -2 16 4 9 -1 -16 -31 19 11 -15 𝑟 1 𝑖,𝑗 𝑟 2 𝑖,𝑗 The marked encrypted image 𝑋 𝑖,𝑗 ∈𝑆𝑃:⨁ 𝐾 𝑒𝑛 𝑋′(𝑖,𝑗)∈𝑁𝑆𝑃 : interpolation 90 59 28 29 30 … 98 79 64 48 31 99 100 66 32 61 77 93 65 24 55 86 92 𝑋 𝑖,𝑗 = 𝑋 ′ 𝑖,𝑗 +𝐸(𝑖,𝑗).

Proposed scheme(10/13)-Scheme I (Image recovery)

Proposed scheme(11/13)-Scheme II (Image decryption) 124 3 245 36 21 … -4 25 9 67 42 -2 154 -47 230 -36 14 1 45 27 -34 189 3 23 … -4 18 6 11 -2 -18 -33 21 1 13 -17 𝑟 1 𝑖,𝑗 𝑟 2 𝑖,𝑗 The marked encrypted image 𝑋 𝑖,𝑗 ∈𝑆𝑃:⨁ 𝐾 𝑒𝑛 𝑋′(𝑖,𝑗)∈𝑁𝑆𝑃 : interpolation 90 59 28 29 30 … 98 79 64 48 31 99 100 66 32 61 77 93 65 24 55 86 92 90 62 28 52 30 … 94 97 70 54 42 98 100 48 32 92 86 24 38 The marked decrypted image

Proposed scheme(12/13)-Scheme II (Image decryption)

Proposed scheme(13/13)-Scheme II (data extraction and image recovery) 90 62 28 52 30 … 94 97 70 54 42 98 100 48 32 92 86 24 38 3 23 … -4 18 6 11 -2 -18 -33 21 1 13 -17 10010 The marked decrypted image 𝑋′(𝑖,𝑗)∈𝑁𝑆𝑃 : interpolation 1 21 … -2 16 4 9 -1 -16 -31 19 11 -15 90 59 28 29 30 … 98 79 64 48 31 99 100 66 32 61 77 93 65 24 55 86 92 The original image

Experimental results (1/5)

Experimental results (2/5)

Experimental results (3/5)

Experimental results (4/5)

Experimental results (5/5) [20] W.M.Zhang,K.D.Ma,N.H.Yu, Reversibility improved data hiding in encrypted images, Signal Process. 94 (2014) 118–127. [21]X.C.Cao, L.Du, X.X.Wei, D.M.Meng, X.J.Guo, High capacity reversible data hiding in encrypted images by patch-level sparse representation, IEEE Trans. Cybern., no.99, pp.11.

Conclusions Separable. The hidden data can be extracted either in encrypted or decrypted domain.

Thank you!