Improved joint reversible data hiding in encrypted images

Slides:



Advertisements
Similar presentations
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Advertisements

Reversible Data Hiding Based on Two-Dimensional Prediction Errors
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:
Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
Reversible Image Watermarking Using Interpolation Technique Source: IEEE Transcation on Information Forensics and Security, Vol. 5, No. 1, March 2010 Authors:
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
1 LSB Matching Revisited Source: IEEE Signal Processing Letters (Accepted for future publication) Authors: Jarno Mielikainen Speaker: Chia-Chun Wu ( 吳佳駿.
人力資源報告 Image and Signal Processing 1 Steganography Using Sudoku Revisited Wien Hong, Tung-Shou Chen, Chih-Wei Shiu Department of Information Management,
1 Security of fragile watermarking scheme for image authentication Authors: K. C. Liao, W. B. Lee, and C. W. Liao Source: The Imaging Science Journal,
Source: IEEE Signal Processing Letters (Accepted)2016
Palette Partition Based Data Hiding for Color Images
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Source: IEEE Transactions on Circuits and Systems for Video Technology Vol.26.
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
Image camouflage by reversible image transformation
A new data transfer method via signal-rich-art code images captured by mobile devices Source: IEEE Transactions on Circuits and Systems for Video Technology,
Reversible Data Hiding in JPEG Images using Ordered Embedding
Source : Signal Processing, Volume 133, April 2017, Pages
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Reversible data hiding scheme based on significant-bit-difference expansion Sourse: IET Image Processing ( Volume: 11, Issue: 11, ), Pages 1002.
Mean value based reversible data hiding in encrypted images
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
Source: Signal Processing 109 (2015) 317–333
Source: J. Vis. Commun. Image R. 41 (2016) 58–64
Source : Signal Processing, vol. 150, pp ,  September 2018
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images Source: Symmetry, vol. 8, no. 6, June.
Separable and error-free reversible data hiding in encrypted images
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
An efficient reversible data hiding method for AMBTC compressed images
Source: Information Sciences, 2018, accpeted.
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Source:. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL
Source: Signal Processing, Vol. 125, pp , August 2016.
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
A reversible and secure patient information hiding system for IoT driven e-health Source : International Journal of Information Management, Available online.
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Data hiding method using image interpolation
Sourse: Multimedia Tools and Applications, 2018, pp 1–17
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
A new chaotic algorithm for image encryption
Data hiding method using image interpolation
Partial reversible data hiding scheme using (7, 4) hamming code
New Framework for Reversible Data Hiding in Encrypted Domain
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection Source: Multimedia.
Source: IEICE-Transactions on Info and Systems
Secret Image Sharing Based on Encrypted Pixels
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Pairwise IPVO-Based Reversible Data Hiding
Sourse: Information Sciences, Vol. 494, pp , August 2019
Dynamic improved pixel value ordering reversible data hiding
Source : Digital Signal Processing. Vol. 73, pp , Feb
LSB matching revisited
Sourse: arXiv preprint, arXiv: , 2018 (Submit to IEEE Trans
Lossless Data Hiding in the Spatial Domain for High Quality Images
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
A Quadratic-Residue-based Fragile Watermarking Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Adopting secret sharing for reversible data hiding in encrypted images
Reversible data hiding in encrypted binary images by pixel prediction
Presentation transcript:

Improved joint reversible data hiding in encrypted images Source: J. Vis. Commun. Image R. 40 (2016) 732–738 Authors: Zhenxing Qian, Shu Dai, Fei Jiang, Xinpeng Zhang Speaker: Lin Jiang-Yi Date: 2017-1-11 前三個作者都是 Information Science and Technology,Sun Yat-sen University, Guangdong,廣東中山大學 Department of Electronics and Computer Engineering,New Jersey Institute of Technology, Newark, NJ 07102, USA

Outline Introduction Proposed Scheme Experimental Results Comments

Introduction(1/6) 1、 reversible data hiding in encrypted images (RDH-EI)

Introduction(2/6) 2、vacating room before encryption (VRBE) K. Ma, W. Zhang, X. Zhao, N. Yu, and F. Li, Reversible data hiding in encrypted images by reserving room before encryption, IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, pp. 553–562, Mar. 2013. W. Zhang, K. Ma, and N. Yu, Reversibility improved data hiding in encrypted images, Signal Process., vol. 94, no. 1, pp. 118–127, Jan. 2014. Sh. Yi, Y. Zhou, Binary-block embedding for reversible data hiding in encrypted images, Signal Process., vol. 133, pp. 40–51, Apr. 2017.

Introduction(3/6) 3、vacating room after encryption (VRAE) X. Zhang, Reversible data hiding in encrypted images, IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255– 258, Apr. 2011. W. Hong, T. Chen, and H. Wu, An improved reversible data hiding in encrypted images using side match, IEEE Signal Process. Lett., vol. 19, no. 4, pp. 199–202, Apr. 2012. X. Zhang, Separable reversible data hiding in encrypted image, IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 826–832, Apr. 2012.

Introduction(4/6) 4、Zhang’s method in 2011 Original image s0 s1 145 146 144 147 148 145 146 144 147 148 001 010 000 011 100 Encryption key 3 LSBs Original image s0 s1 Original value Secret=0 Embedding Flip 150 146 151 144 145 149 148 147 110 010 111 000 001 101 100 011 Stego value

Introduction(5/6) 4、Zhang’s method in 2011 Stego value Extraction 150 146 151 144 145 149 148 147 110 010 111 000 001 101 100 011 001 010 000 011 100 145 146 144 147 148 Secret=0 H0 Stego value Secret=1 H1 110 101 111 100 011 150 149 151 153 152 148 147 Extraction

Introduction(6/6) 5、Drawback

Proposed Scheme(1/9) 1、Divide the original image four down-sampled images denoted as E1 , E2 , E3 and E4 .

Proposed Scheme(2/9) 2、 First round embedding Three LSB layers are extracted from E2 , E3 and E4 by Secret: t

Proposed Scheme(3/9) 2、 First round embedding-example 145 146 144 147 148 001 010 000 011 100 L1={(001),(001),(010),(010)} L=4,a=4 … Secret: 2 E2 , E3 and E4 3LSB 146 145 144 147 148 010 001 000 011 100 L1={ (010),(010),(001),(001)} E2’ , E3’ and E4’

Proposed Scheme(4/9) 3、 Second round embedding Three LSB layers are extracted from E1 by swaps the order of W1 and Wr+2 and put the swapped blocks back to the corresponding LSB layers in E1 Secret: r Repeat the embedding until R/2 blocks have been swapped to accommodate additional message

Proposed Scheme(5/9) 3、 Second round embedding-example 145 146 144 147 148 001 010 000 011 100 W1={(001001001000)} Secret: 1 R=4,r=2 W2={(010010000001)} W3={(010011100010)} W4={(010001011001)} 3LSB E1 U1={(010010000001)} 146 147 148 144 145 010 011 100 000 001 U2={(010001011001)} E1’

Proposed Scheme(6/9) 4、 Second round extraction Three LSB layers are extracted from E1’ by swaps the 3LSB of W1’ and Wi+2’,i belongs to [0,R-2],calculate k, and k is the secret. Remove W1’ and Wk+2’ from W set, repeat extraction until the length of J1’ is R/2.

Proposed Scheme(7/9) 4、 Second round extraction-example 146 147 148 144 145 010 011 100 000 001 W1={(010011100010)} Secret: 1 R=4,r=2 W2={(010010000001)} W3={(001001001000)} W4={(010001011001)} E1’ 3LSB 145 146 144 147 148 001 010 000 011 100 E1

Proposed Scheme(8/9) 5、 First round extraction Estimates the other pixels by linear interpolation through E1, create X2,X3 and X4. Divided all pixels in X2,X3 and X4 into L segments{G1,G2,…,GL}。 Divided all pixels in E2’,E3’ and E4’ into L segments{C1,C2,…,CL}。 for i=1:L secret_i = 𝑎𝑟𝑔𝑚𝑖𝑛 𝑘=1 𝑎 | 𝐺 𝑖 𝑘 − 𝐶 𝑖 (𝑘)| end

Proposed Scheme(9/9) 5、 First round extraction-example 146 145 144 147 148 010 001 000 011 100 L1={(010),(010),(001),(001)} L=4,a=4 … E2’ , E3’ and E4’ 145 146 144 147 148 Secret =0 L1’={(010),(010),(001),(001)} , {146,146,145,145} Secret = 1 L1’={(001),(010),(010),(001)} , {145,146,146,145} Secret = 2 L1’={(001),(001),(010),(010)} , {145,145,146,146} … X2 , X3 and X4

Experimental Results(1/5) [3] X. Zhang, Reversible data hiding in encrypted image, IEEE Signal Process. Lett. 18 (4) (2011) 255–258. [4] W. Hong, T.S. Chen, H.Y. Wu, An improved reversible data hiding in encrypted images using side match, IEEE Signal Process. Lett. 19 (4) (2012) 199–202. [5] X. Liao, C.W. Shu, Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels, J. Vis. Commun. Image Represent. 28 (2) (2015) 21–27. Empirical Chromosomes Addition

Experimental Results(2/5)

Experimental Results(3/5)

Comments RDH-EI in medical images. Suitable for small payload. A little complicate.