Source: IEEE Access, Vol. 6, Dec. 2017, pp

Slides:



Advertisements
Similar presentations
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
Advertisements

1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:
Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
1 An Efficient VQ-based Data Hiding Scheme Using Voronoi Clustering Authors:Ming-Ni Wu, Puu-An Juang, and Yu-Chiang Li.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
1 A Steganographic Scheme for Secure Communications Based on the Chaos and Eular Theorem Der-Chyuan Lou and Chia-Hung Sung IEEE Transactions on Multimedia,
1 Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems Adviser: Chih-Hung Lin Speaker : Chia-Wei Chang Date:2009/10/06.
多媒體網路安全實驗室 Source: IEICE Trans. Fundamentals, Vol. E90-A, No. 4, April 2007, pp Authors:Hong Lin Jin, Masaaki Fujiyoshi, Hitoshi Kiya Speaker:Cheng.
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
Source: IEEE Signal Processing Letters (Accepted)2016
(k, n)-Image Reversible Data Hiding
Palette Partition Based Data Hiding for Color Images
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Chair Professor Chin-Chen Chang Feng Chia University
QR Code Authentication with Embedded Message Authentication Code
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images Source: Symmetry, vol. 8, no. 6, June.
Hiding Data in a Color Palette Image with Hybrid Strategies
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
A Restricted Region-based Data-hiding Scheme
Source: Information Sciences, 2018, accpeted.
Source : Signal Processing, vol. 126, pp ,  November 2016
Some Novel Steganographic Methods for Digital Images
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding Scheme Using Two Steganographic Images
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
Source:. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL
Source: Signal Processing, Vol. 125, pp , August 2016.
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
A reversible and secure patient information hiding system for IoT driven e-health Source : International Journal of Information Management, Available online.
Data hiding based Hamming code
Source : Journal of Visual Communication and Image Representation, vol
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Data hiding method using image interpolation
Dynamic embedding strategy of VQ-based information hiding approach
Hiding Information in VQ Index Tables with Reversibility
Source : Journal of Visual Communication and Image Representation, vol
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
Chair Professor Chin-Chen Chang Feng Chia University
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Digital Watermarking for Image Authentication with Localization
Data hiding method using image interpolation
Chair Professor Chin-Chen Chang Feng Chia University
Partial reversible data hiding scheme using (7, 4) hamming code
Novel Multiple Spatial Watermarking Technique in Color Images
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection Source: Multimedia.
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Lossless Data Hiding in the Spatial Domain for High Quality Images
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Adopting secret sharing for reversible data hiding in encrypted images
Presentation transcript:

Enhance Embedding Capacity of Generalized Exploiting Modification Directions in Data Hiding Source: IEEE Access, Vol. 6, Dec. 2017, pp. 2169-3536 Authors: Yanxiao Liu, Chingnung Yang, Qindong Sun Speaker: Guanlong Li Date: 7/12/2018

Outline Related Works Propose Scheme Experimental Results Conclusions Exploiting Modification Direction(EMD) Generalized Exploiting Modification Direction(GEMD) Propose Scheme Experimental Results Conclusions

Related Works(1/4) - EMD g1 g2 … gn . Input: cover image 𝐼 and secret data S→(2n+1) - array Output:stego image 𝐼′ 1. Calculate 𝑓 𝐸𝑀𝐷 =𝑓𝑎(g1, g2, g3,…gn) using 𝑓𝑎 (g1, g2, g3,…gn) = 𝑖=1 𝑛 (gi ×𝑖) 𝑚𝑜𝑑 (2𝑛+1) 2. Calculate the difference d=(S− 𝑓 𝐸𝑀𝐷 ) mod (2n+1) 3. If (d = 0) then (g'1,g'2,g'3, …g′n) = (g1,g2,g3, …gn); else if (n > d), then (g′1, g'2, …, g'd, …g'n) = (g1, g2,…, gd+1,… gn); else (g′1, g'2,…, g'(2n+1)-d,… g'n) = (g1,g2,…,g(2n+1)-d -1,…gn). 4. Modify the (g1, g2, g3,… gn) in 𝐼 by (g′1, g'2, g'3,… g'n) to create 𝐼′ Extracting phase S = 𝑖=1 𝑛 (gi ×𝑖) 𝑚𝑜𝑑 (2𝑛+1)

Related Works(2/4) - EMD An example: 𝐼 = (1,2,3,4,6) , S = 7 1. Calculate 𝑓 𝐸𝑀𝐷 = 𝑓𝑎(1,2,3,4,6) using 𝑓𝑎 (1,2,3,4,6) = 𝑖=1 𝑛 (gi ×𝑖) 𝑚𝑜𝑑 (2𝑛+1) = (1*1+2*2+3*3+4*4+6*5) mod (2*5+1) = 5 2. Calculate the difference d = (7−5) mod (2n+1) = 2 3. Have ( n > d ), then (g′1, g′2, g′3, g′4, g′5) = (g1, g2+1, g3, g4, g5) = (1,3,3,4,6) 4. Modify the (g1, g2, g3, g4, g5) in 𝐼 by (g′1, g′2, g′3, g′4, g′5) to create 𝐼′ Extract secret S = 𝑖=1 𝑛 (gi ×𝑖) 𝑚𝑜𝑑 (2𝑛+1) = (1*1+3*2+3*3+4*4+6*5) mod (2*5+1) =7

Related Works(3/4) - GEMD Input: cover image 𝐼 and secret data S→(2n+1) - array Output:stego image 𝐼′ 1. Calculate 𝑓 𝐺𝐸𝑀𝐷 =𝑓𝑏(g1, g2, g3,…gn) using 𝑓𝑏 (g1, g2, g3,…gn) = 𝑖=1 𝑛 gi ×( 2 𝑖 −1) 𝑚𝑜𝑑 2 𝑛+1 2. Calculate the difference d = ( S − 𝑓 𝐺𝐸𝑀𝐷 ) mod 2 𝑛+1 3. If (d = 0) then g 𝑖 ′ = g 𝑖 ; else if(d = 2 𝑛 ) then g 𝑛 ′ = g 𝑛 +1 , g 1 ′ = g 1 +1; else if (0 < d < 2 𝑛 ), then d → ( 𝑏 𝑛 , 𝑏 𝑛−1 ,…, 𝑏 1 , 𝑏 0 )2 else d’ = 2 𝑛+1 − d , then d’ → ( 𝑏 𝑛 , 𝑏 𝑛−1 ,…, 𝑏 1 , 𝑏 0 )2 and for i = n to 1 do { If ( 𝑏 𝑖 = 0 & 𝑏 𝑖−1 = 0) or ( 𝑏 𝑖 = 1 & 𝑏 𝑖−1 = 1) then g 𝑖 ′ = g 𝑖 ; else if ( 𝑏 𝑖 = 0 & 𝑏 𝑖−1 = 1) then d : g 𝑖 ′ = g 𝑖 +1 𝑑 ′ : g 𝑖 ′ = g 𝑖 −1 ; else if ( 𝑏 𝑖 = 1 & 𝑏 𝑖−1 = 0) then d : g 𝑖 ′ = g 𝑖 −1 𝑑 ′ : g 𝑖 ′ = g 𝑖 +1 .} Extracting phase S = 𝑖=1 𝑛 gi ×( 2 𝑖 −1)

Related Works(4/4) - GEMD An example: 𝐼 = (6,9,5) , S = 13 1. Calculate 𝑓 𝐺𝐸𝑀𝐷 = 𝑓𝑎(6,9,5) using 𝑓𝑎 (6,9,5) = 𝑖=1 𝑛 gi × 2 𝑖 −1 𝑚𝑜𝑑 2 𝑛+1 = (6*1+9*3+5*7) mod (16) = 4 2. Calculate the difference d = (13−4) mod 2 𝑛+1 = 9 3. Have (0 < d < 𝟐 𝒏 ), then d′ = 2 𝑛+1 −𝑑=7 → (0111) 2 (g′1, g′2, g′3) = (g1, g2, g3-1) = (6,9,4) 4. Modify the (g1, g2, g3, g4, g5) in 𝐼 by (g′1, g′2, g′3, g′4, g′5) to create 𝐼′ Extract secret S = 𝑖=1 𝑛 gi × 2 𝑖 −1 𝑚𝑜𝑑 2 𝑛+1 = (6*1+9*3+4*7) mod (16) =13

Propose Scheme(1/4) – Enhanced GEMD Input: two cover image 𝐼 1 = (g1, g2, g3,…gn1) 、 𝐼 2 = (g1, g2, g3,…gn2) , n= 𝑛 1 + 𝑛 2 and secret data S→(2n+2) - array Output: two stego image 𝐼′ 1 、 𝐼′ 2 Convert the n+2 bits data s into decimal 𝑆 (10) Let 𝑆 (10) = 2 𝑛 1 +1 ×𝑐+𝑟 , where c and r are integers and r < 2 𝑛 1 +1 Embedding r,c into 𝐼 1 , 𝐼 2 using the embedding approach in GEMD respectively Extracting phase Extracting c and r from 𝐼′ 2 and 𝐼′ 1 respectively using the extraction approach in GEMD. Computing 𝑆 (10) = 2 𝑛 1 +1 ×𝑐+𝑟

Propose Scheme(2/4) – Enhanced GEMD An example: 𝐼 = (6,9,5) , S = (11010) 2 𝐼 into 𝐼 1 = (6,9) and 𝐼 2 = (5) , S = (11010) 2 = (26) 10 26 = 2 𝑛 1 +1 ×𝑐+𝑟 = 2 2+1 ×3+2 3. Embed 2 and 3 into 𝐼 1 and 𝐼 2 using the embedding approach in GEMD respectively 4. 𝐼′ 1 =(7,9) , 𝐼′ 2 =(7) Extract secret 𝐼 ′ 1 : 7× 2 1 −1 +9× 2 2 −1 𝑚𝑜𝑑 2 3 =2 , 𝐼′ 2 :7× 2 1 −1 𝑚𝑜𝑑 2 2 =3 𝑆 (10) = 2 𝑛 1 +1 ×𝑐+𝑟 = 2 2+1 ×3+2 = 26

Propose Scheme(3/4) – Enhanced GEMD Input: k cover image 𝐼 1 , 𝐼 2 , … , 𝐼 𝑘 , n= 𝑖=1 𝑘 𝑛 𝑖 and secret data S→(2n+k) - array Output: k stego image 𝐼′ 1 , 𝐼′ 2 , … , 𝐼′ 𝑘 Convert the n+k bits data s into decimal 𝑆 (10) Let 𝑆 (10) = 2 𝑛 1 +1 × 𝑐 1 + 𝑟 1 , 𝑐 1 = 2 𝑛 2 +1 × 𝑐 2 + 𝑟 2 , . . . 𝑐 𝑘−2 = 2 𝑛 𝑘−1 +1 × 𝑐 𝑘−1 + 𝑟 𝑘−1 , Embedding 𝑐 𝑘−1 into 𝐼 𝑘 and embedding 𝑟 1 , 𝑟 2 , … , 𝑟 𝑘−1 into 𝐼 1 , 𝐼 2 , … , 𝐼 𝑘−1 using embedding approach in GEMD. Extract secret Extracting 𝑟 1 , 𝑟 2 , … , 𝑟 𝑘−1 and 𝑐 𝑘−1 from 𝐼 1 , 𝐼 2 , … , 𝐼 𝑘 respectively using the extraction approach in GEMD. Computing 𝑐 𝑘−2 = 2 𝑛 𝑘−1 +1 × 𝑐 𝑘−1 + 𝑟 𝑘−1 , . . . 𝑐 1 = 2 𝑛 2 +1 × 𝑐 2 + 𝑟 2 , 𝑆 (10) = 2 𝑛 1 +1 × 𝑐 1 + 𝑟 1

Propose Scheme(4/4) – Enhanced GEMD An example: 𝐼 = (6,9,5,8,12,3) , S = (101100101) 2 , k = 3 𝐼 into 𝐼 1 = (6,9,5) and 𝐼 2 = (8,12) and 𝐼 3 = (3) , S = (101100101) 2 = (357) 10 , n + k = 9 357 = 2 𝑛 1 +1 ×22+5 22 = 2 𝑛 2 +1 ×2+6 3. Embed 5 , 6 and 2 into 𝐼 1 , 𝐼 2 and 𝐼 3 using the embedding approach in GEMD respectively 4. 𝐼′ 1 =(7,9,5) , 𝐼′ 2 =(7,13) , 𝐼′ 3 =(2) Extract secret 𝐼 ′ 1 : 7× 2 1 −1 +9× 2 2 −1 +5× 2 3 −1 𝑚𝑜𝑑 2 4 =5 , 𝐼′ 2 : 7× 2 1 −1 +13× 2 2 −1 7× 2 1 −1 +13× 2 2 −1 𝑚𝑜𝑑 2 3 =6 , 𝐼′ 3 :2× 2 1 −1 𝑚𝑜𝑑 2 2 =2 𝑐 1 = 2 𝑛 2 +1 × 𝑐 2 + 𝑟 2 = 2 2+1 ×2+6=22 , 𝑆 (10) = 2 𝑛 1 +1 × 𝑐 1 + 𝑟 1 = 2 3+1 ×22+5 = 357

Experimental Results(1/2) Comparison of Embedding Capacities Comparison of PSNRs Between Three Schemes

Experimental Results(2/2) Capacities and PSNRs of Generalized Enhanced GEMD

Conclusions In two group, it improve the embedding capacity of GEMD from 𝑛+1 𝑛 bpp to 𝑛+2 𝑛 bpp. In k group, it can improve embedding capacity by choosing a larger parameter k , however the PSNR will decrease when k increases.