Data Hiding Watermarking for Halftone Images

Slides:



Advertisements
Similar presentations
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
Advertisements

1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
1 High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
1 Data Hiding Watermarking for Halftone Images Ming Sun Fu, Student Member, IEEE, and Oscar C. Au, Senior Member, IEEE, IEEE TRANSACTIONS ON IMAGE PROCESSING,
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Half-Tone Watermarking Multimedia Security. 2 Outline Half-tone technique Watermarking Method Measurement Robustness Conclusion.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
Reversible Date Hiding Based on Histogram Modification of pixel Differences IEEE Transactions on circuits and systems for video technology, VOL. 19, NO.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Halftone Visual Cryptography
A Novel Full-Search Vector Quantization Algorithm Based on the Law of Cosines Author:Jarno Mielikainen, Student Member, IEEE Source:IEEE SIGNAL.
Advisor: Chang, Chin-Chen Student: Chen, Chang-Chu
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
Der-Chyuan Lou and Jiang-Lung Liu,
Reporter :Liang, Min-Chen Date :2003/04/15
Source: The Journal of Systems and Software, Volume 67, Issue 2, pp ,
2003/04/291 Hiding data in images by optimal moderately- significant-bit replacement Wang, Ran-Zan, Lin, Chi-Fang, and Lin, Ja-Chen, IEE Electronics Letters,
A new data transfer method via signal-rich-art code images captured by mobile devices Source: IEEE Transactions on Circuits and Systems for Video Technology,
Reversible Data Hiding in JPEG Images using Ordered Embedding
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Steganography with Digital Images
A Data Hiding Scheme Based Upon Block Truncation Coding
Yongjian Hu, Member, IEEE, Heung-Kyu Lee, Kaiying Chen, and Jianwei Li
A Restricted Region-based Data-hiding Scheme
Source: Pattern Recognition, Vol. 38, Issue 11, December 2005, pp
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Reversible Data Hiding
Reporter :Liang, Min-Chen Date :2003/05/06
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Hiding Information in VQ Index Tables with Reversibility
Source: IEEE Signal Processing Letters, Vol. 14, No. 3, Mar. 2007, pp
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
A Data-Hiding Technique with Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
Zhe-Ming Lu, Chun-He Liu, Dian-Guo Xu, Sheng-He Sun,
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Reporter :Liang, Min-Chen Date :2003/05/06
Reporter :Liang, Min-Chen Date :2003/05/06
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Steganography in halftone images: conjugate error diffusion
Digital Watermarking for Image Authentication with Localization
Data hiding method using image interpolation
Data Hiding Watermarking for Halftone Images
Source: Signal Processing: Image Communication 16 (2001) pp
Partial reversible data hiding scheme using (7, 4) hamming code
A Data-Hiding Technique With Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
New Framework for Reversible Data Hiding in Encrypted Domain
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Source: IEEE Transactions on Circuits and Systems,
Halftone Image Data Hiding with Block-Overlapping Parity Check
Using Association Rules as Texture features
A Data Hiding Scheme Based Upon Block Truncation Coding
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Hidden Digital Watermarks in Images
Pairwise IPVO-Based Reversible Data Hiding
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Dynamic improved pixel value ordering reversible data hiding
Source : Digital Signal Processing. Vol. 73, pp , Feb
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
FREQUENTLY USED 3x3 CONVOLUTION KERNELS
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
Adopting secret sharing for reversible data hiding in encrypted images
Reversible data hiding in encrypted binary images by pixel prediction
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Data Hiding Watermarking for Halftone Images Ming Sun Fu, Student Member, IEEE, and Oscar C. Au, Senior Member, IEEE, IEEE TRANSACTIONS ON IMAGE PROCESSING, Vol. 11, No. 4, Apr. 2002, pp. 477 -484 Adviser : Dr. Chang, Chin-Chen Reporter : Huang, Chang-Chin Date : 2003/03/18

Outline Introduction Data Hiding without Original Multitone Image (DHST, DHPT, DHSPT) Data Hiding with Original Multitone Image (DHED, MDHED) Conclusions

Introduction Halftone images Error diffusion Jarvis kernel and Steinberg kernel

Data Hiding without Original Multitone Image (DHST, DHPT, DHSPT) Data Hiding Self Toggling(DHST) use seed generate a set of N pseudo-random location. embedded 0 or 255 simple & error correction coding “salt-and-pepper” noise intensity being about 128

Data Hiding without Original Multitone Image (DHST, DHPT, DHSPT) Data Hiding Pair Toggling(DHPT) slave pixel is chosen randomly. two errors are introduced instead of one complexity is slightly larger than DHST fewer “salt-and-pepper” noise M=

Data Hiding without Original Multitone Image (DHST, DHPT, DHSPT) Data Hiding by Smart Pair Toggling(DHSPT) Candidate is Min [conafter(m,n)] Define 2 x0 1 x0

Data Hiding without Original Multitone Image (DHST, DHPT, DHSPT) Data Hiding by Smart Pair Toggling(DHSPT) Ex. before after 1+2+2=5 2+1+2+1+1=7 1 X0=1 1 X0=0 - = 12 +

Data Hiding without Original Multitone Image (DHST, DHPT, DHSPT) - - f(X0, Xmaster) + f(X0, Xmaster) = 0 before after vertical or horizontal master w(i) = 2  conbefore(m, n) + conafter(m, n) = 10 other master w(i) = 1  conbefore(m, n) + conafter(m, n) = 11 Xmaster=1 X0=0 Xmaster=0 X0=1 - -

Data Hiding without Original Multitone Image (DHST, DHPT, DHSPT) conbefore=1+2+2+1=6 conafter=11-6=5 1 conbefore=0 conafter=10-0=10 1 conbefore=2+2=4 conafter=10-4=6

Data Hiding with Original Multitone Image (DHED, MDHED) Error diffusion

Data Hiding with Original Multitone Image (DHED, MDHED) Error diffusion

Data Hiding with Original Multitone Image (DHED, MDHED) Error diffusion

Data Hiding with Original Multitone Image (DHED, MDHED) Data Hiding Error Diffusion

Data Hiding with Original Multitone Image (DHED, MDHED) Modified Data Hiding Error Diffusion

Conclusions

Conclusions