An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,

Slides:



Advertisements
Similar presentations
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
Advertisements

1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
Reversible Image Watermarking Using Interpolation Technique Source: IEEE Transcation on Information Forensics and Security, Vol. 5, No. 1, March 2010 Authors:
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
1 Security of fragile watermarking scheme for image authentication Authors: K. C. Liao, W. B. Lee, and C. W. Liao Source: The Imaging Science Journal,
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
影像偽裝術 Dr. Chin-Chen Chang
(k, n)-Image Reversible Data Hiding
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
Source: The Journal of Systems and Software, Volume 67, Issue 2, pp ,
Image camouflage by reversible image transformation
Reversible Data Hiding in JPEG Images using Ordered Embedding
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source :Journal of visual Communication and Image Representation
Reversible data hiding scheme based on significant-bit-difference expansion Sourse: IET Image Processing ( Volume: 11, Issue: 11, ), Pages 1002.
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
A Restricted Region-based Data-hiding Scheme
An efficient reversible data hiding method for AMBTC compressed images
Source: Information Sciences, 2018, accpeted.
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source : Signal Processing, vol. 126, pp ,  November 2016
Improved joint reversible data hiding in encrypted images
Reversible Data Hiding Scheme Using Two Steganographic Images
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Source: Signal Processing: Image Communication 64 (2018) 78-88
Source:. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
A reversible and secure patient information hiding system for IoT driven e-health Source : International Journal of Information Management, Available online.
Source : Journal of Visual Communication and Image Representation, vol
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Dynamic embedding strategy of VQ-based information hiding approach
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Source : Journal of Visual Communication and Image Representation, vol
Sourse: Multimedia Tools and Applications, 2018, pp 1–17
Partial reversible data hiding scheme using (7, 4) hamming code
Chair Professor Chin-Chen Chang Feng Chia University
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Data hiding method using image interpolation
Chair Professor Chin-Chen Chang Feng Chia University
Partial reversible data hiding scheme using (7, 4) hamming code
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
Blind Reversible Authentication Based on PEE and CS Reconstruction
Source: Signal Processing Volume 111 June 2015, Pages
Ming-Shi Wang *, Wei-Che Chen 11 November 2006 present: 沈雅楓
Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images Source: Symmetry, Vol. 10, No. 8, pp. 318.
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Pairwise IPVO-Based Reversible Data Hiding
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Dynamic improved pixel value ordering reversible data hiding
Source : Digital Signal Processing. Vol. 73, pp , Feb
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
Presentation transcript:

An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication, vol. 58, pp. 111-122,  October 2017 Authors : Wien Hong, Meijin Chena and Tung Shou Chen Speaker : Chia-Shuo Shih Date : 2018/12/27 1

Outline Introduction Related work Proposed method Experimental results Conclusions 2

Introduction-Reversible Image Authentication Authentication Code Original Image Stego Image Authentication Code + Recovery Code Original Image Stego Image 3

Related work-Improved Pixel Value Ordering(IPVO) PVO: d = 1 IPVO: d = 0 or 1 max 𝑥 ′ =𝑥 𝑖𝑓 𝑑=0 𝑥 ′ =𝑥+𝑏 𝑖𝑓𝑑=1 𝑥 ′ =𝑥+1 𝑖𝑓𝑑>1 min 𝑥 ′ =𝑥 𝑖𝑓 𝑑=0 𝑥 ′ =𝑥−𝑏 𝑖𝑓𝑑=1 𝑥 ′ =𝑥−1 𝑖𝑓𝑑>1 max 𝑥 ′ =𝑥+𝑏 𝑖𝑓 𝑑=1 𝑥 ′ =𝑥+1 𝑖𝑓 𝑑>1 𝑥 ′ =𝑥+𝑏 𝑖𝑓 𝑑=0 𝑥 ′ =𝑥+1 𝑖𝑓 𝑑<0 min 𝑥 ′ =𝑥−𝑏 𝑖𝑓 𝑑=1 𝑥 ′ =𝑥−1 𝑖𝑓 𝑑>1 𝑥 ′ =𝑥−𝑏 𝑖𝑓 𝑑=0 𝑥 ′ =𝑥−1 𝑖𝑓 𝑑<0 4

Related work-Improved Pixel Value Ordering(IPVO) max 𝑥 ′ =𝑥+𝑏 𝑖𝑓 𝑑=1 𝑥 ′ =𝑥+1 𝑖𝑓 𝑑>1 𝑥 ′ =𝑥+𝑏 𝑖𝑓 𝑑=0 𝑥 ′ =𝑥+1 𝑖𝑓 𝑑<0 min 𝑥 ′ =𝑥−𝑏 𝑖𝑓 𝑑=1 𝑥 ′ =𝑥−1 𝑖𝑓 𝑑>1 𝑥 ′ =𝑥−𝑏 𝑖𝑓 𝑑=0 𝑥 ′ =𝑥−1 𝑖𝑓 𝑑<0 5

Proposed method 6 IPVO Authentication Code LSB Authentication Code Original Image Stego Image 6

Proposed method 60 54 59 63 64 66 61 55 62 58 53 65 B 1 B 2 Original Image 60 54 59 63 61 55 58 64 53 65 𝐵 1 1 ={54,59,60,61} 𝐵 1 2 ={55,59,59,63} 𝐵 1 3 ={54,55,58,64} 𝐵 1 4 ={53,60,63,65} 64 66 61 63 62 60 58 59 𝐵 2 1 ={62,63,64,64} 𝐵 2 2 ={60,61,61,66} 𝐵 2 3 ={59,59,60,61} 𝐵 2 4 ={58,60,61,64} α 1 = 0 α 2 = 4 B 1 B 2 IPVO: d = 0 or 1 7

Proposed method 8 0 0 1 1 1 1 0 AC key: 𝑘 𝑒 60 54 59 63 61 55 58 64 53 65 60 53 59 64 62 54 58 65 63 55 52 66 60 51 59 64 54 58 65 63 53 55 52 66 61 51 59 64 54 58 65 60 63 53 55 52 66 IPVO B 1 60 = 00111100 𝑆𝐵 𝐿𝑆𝐵 =0 0 0 1 1 1 1 0 AC 59 64 54 58 65 60 63 53 55 52 66 MD5  location information (1,1)  128-bit hash value Use XOR to 1 bit AC = 1 8

Proposed method 𝑆𝐵 𝐿𝑆𝐵 =0 α 2 = 4 AC = 3( α 𝑖 −1) bits 9 64 66 61 63 62 60 58 59 64 65 67 61 63 62 59 60 57 IPVO AC+SB: 1 0 1 0 B 2 Stego Image 𝐵 2 1 ={62,63,64,64} 𝐵 2 2 ={60,61,61,66} 𝐵 2 3 ={59,59,60,61} 𝐵 2 4 ={58,60,61,64} 64 61 63 60 59 MD5 128-bit hash value  location information (1,2)  Use XOR to 3 bits AC + 𝑆𝐵 𝐿𝑆𝐵 = 101 + 0 = 1 0 1 0 AC = 101 9

Proposed method 60 54 59 63 64 66 61 55 62 58 53 65 61 51 59 64 65 67 54 63 62 58 60 57 53 55 52 66 Original Block Stego Block 10

Proposed method-Image authentication and recovery 61 51 59 64 65 67 54 63 62 58 60 57 53 55 52 66 B 1 = α 1 = 0 B 2 = α 2 = 4 64 65 67 61 63 62 59 60 57 64 66 61 63 62 60 58 59 1 0 1 0 IPVO Original Block 64 61 63 60 59 Use XOR to 3 bits MD5  location information (1,2)  128-bit hash value AC = 101 11

Proposed method-Image authentication and recovery key: 𝑘 𝑒 61 51 59 64 54 58 65 60 63 53 55 52 66 60 54 59 63 61 55 58 64 53 65 𝑆𝐵 𝐿𝑆𝐵 =0 IPVO 59 64 54 58 65 60 63 53 55 52 66 MD5  location information (1,1)  128-bit hash value Use XOR to 1 bit AC = 1 12

Experimental results 13 α Lena Peppers Boat Jet Splash Elaine Average 2243 2561 3583 1795 739 4007 2488 1 3478 4580 4971 2550 2134 5439 3859 2 3716 4263 4016 2592 3346 3775 3618 3 3046 2897 2261 2520 3536 1742 2667 4 2026 1429 1023 2252 2821 751 1717 5 1139 522 368 1835 1704 361 988 6 439 118 124 1398 1047 152 546 7 144 12 37 900 650 47 298 8 153 542 407 110 203  Number of the blocks under various α 13

Experimental results Lo and Hu Nguyen et al. Yin et al. Proposed Embedding technique HS PEE IPVO Embedded data AC only AC and recovery data Reversibility Yes Implementation of location map No Protection of un-embeddable block Detectability of equal modification in brightness Comparisons of the proposed method with other related works. Lo C.C., Hu Y.C. ”A novel reversible image authentication scheme for digital images” Signal Process., 98 (2014), pp. 174-185 Nguyen T.S., Chang C.C., Shih T.H. “A high-quality reversible image authentication scheme based on adaptive PEE for digital images” KSII Trans. Internet Inf. Syst., 10 (1) (2016), pp. 395-413 Yin Z., Niu X., Zhou Z., Tang J., Luo B. ”Improved reversible image authentication scheme” Cogn. Comput., 8 (5) (2016), pp. 890-899 14

Experimental results 15 Image Lo and Hu Nguyen et al. Yin et al. Proposed Lena 48.75 42.67 51.83 50.48 Peppers 48.70 42.18 51.68 50.24 Boat 48.64 41.95 51.61 49.79 Jet 48.94 43.57 52.11 50.88 Splash 48.92 43.60 52.14 51.41 Elaine 48.65 41.83 51.58 49.61 Average 48.77 42.63 51.82 50.40 The PSNR comparisons of related works. 15

Experimental results 16

Experimental results 17 Lo and Hu’s method, ER = 0.274 Nguyen et al.’s method, ER = 0.186 Yin et al.’s method, ER = 0.300  Proposed method, ER =0.105 17

Experimental results Detection result: True Detection result: False Second-stage detection: 18

Experimental results 19 Image Lo and Hu Nguyen et al. Yin et al. Proposed Lena 0.274 0.186 0.300 0.105 Peppers 0.469 0.225 0.292 0.107 Boat 0.290 0.223 0.308 0.128 Jet 0.381 0.349 0.065 Splash 0.324 0.209 0.262 0.071 Elaine 0.284 0.201 0.286 0.097 Average 0.337 0.212 0.096 Comparisons of error rates. 19

Experimental results 20 Lo and Hu ER = 0.870 Proposed ER = 0.201 Nguyen et al. ER = 0.818 Yin et al. ER = 0.884 20

Experimental results 21 Lo and Hu’s method Proposed method Nguyen et al.’s method Yin et al.’s method 21

Conclusions The proposed method embeds the hashed value of block features. The proposed method also embeds one bit AC into all un-embeddable blocks. 22

-END- 23