Data hiding based Hamming code

Slides:



Advertisements
Similar presentations
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
Advertisements

Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
1 Formatted Text Document Data Hiding Robust to Printing,Copying and Scanning Speaker:Fanjia Yen Adviser:Quincy Wu Date:2008/04/10.
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Data hiding in Least Significant Bit (LSB) Speaker: Feng Jen-Bang ( 馮振邦 )
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Cryptographic Anonymity Project Alan Le
1 Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems Adviser: Chih-Hung Lin Speaker : Chia-Wei Chang Date:2009/10/06.
1 LSB Matching Revisited Source: IEEE Signal Processing Letters (Accepted for future publication) Authors: Jarno Mielikainen Speaker: Chia-Chun Wu ( 吳佳駿.
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
基於龜殼魔術矩陣的隱寫技術及其衍生的研究問題
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
A steganographic method for digital images using side match
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
Advisor: Chin-Chen Chang1, 2 Student: Yi-Hui Chen2
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Information Steganography Using Magic Matrix
A Data Hiding Scheme Based Upon Block Truncation Coding
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images Source: Symmetry, vol. 8, no. 6, June.
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
A Study of Digital Image Coding and Retrieving Techniques
Embedding Secrets Using Magic Matrices
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
A Restricted Region-based Data-hiding Scheme
Source: Information Sciences, 2018, accpeted.
Source : Signal Processing, vol. 126, pp ,  November 2016
Some Novel Steganographic Methods for Digital Images
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding Scheme Using Two Steganographic Images
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Information Steganography Using Magic Matrix
Source: IEEE Access, Vol. 6, Dec. 2017, pp
Data hiding method using image interpolation
Dynamic embedding strategy of VQ-based information hiding approach
A High Embedding Capacity Approach to Adaptive Steganography
Hiding Information in VQ Index Tables with Reversibility
Information Hiding and Its Applications
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
Chair Professor Chin-Chen Chang Feng Chia University
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Data hiding method using image interpolation
Chair Professor Chin-Chen Chang Feng Chia University
Partial reversible data hiding scheme using (7, 4) hamming code
New Framework for Reversible Data Hiding in Encrypted Domain
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection Source: Multimedia.
De-clustering and Its Application to Steganography
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Information Hiding Techniques Using Magic Matrix
Sourse: Information Sciences, Vol. 494, pp , August 2019
LSB matching revisited
Steganographic Systems for Secret Messages
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Sourse: arXiv preprint, arXiv: , 2018 (Submit to IEEE Trans
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
Adopting secret sharing for reversible data hiding in encrypted images
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Data hiding based Hamming code Speaker: Su Guodong Date: 2019-01-31

Outline Matrix coding [1] Nearest covering code [2] Hamming+1 [3] Comparisons [1] Westfeld A., “F5—a steganographic algorithm,” International workshop on information hiding. Springer, Berlin, Heidelberg, 2001: 289-302. [2] Chang C. C., Chou Y. C., “Using nearest covering codes to embed secret information in grayscale images,” Proceedings of the 2nd international conference on Ubiquitous information management and communication. ACM, 2008: 315-320. [3]Zhang W., Wang S., Zhang X., “Improving embedding efficiency of covering codes for applications in steganography,” IEEE Communications Letters, 2007, 11(8). [4] Kim C., Yang C. N., “Improving data hiding capacity based on hamming code,” Frontier and Innovation in Future Computing and Communications. Springer, Dordrecht, 2014: 697-706.

Matrix coding-Embedding CodeWord (CW): 1010111 Modified CodeWord : 1000111 Secret message bits: S =1 0 1 z 001 010 011 100 101 110 111 ei 1000000 0100000 0010000 0001000 0000100 0000010 0000001

Matrix coding-Extraction Received Codeword (RCW): 1000111 Secret message bits: S =1 0 1

Matrix coding-Extraction The 7-bit codeword can carry 3 secret bits by changing at most 1 bit Embedding Rate: Embedding efficiency:

Nearest Covering Code Classification rule: First, a reference data prepared for secret data embedding is constructed by classifying all possible combinations of seven bits into eight classes C0, C1, ..., C7. Classification rule:

Nearest Covering Code Example: C7 C3

Nearest Covering Code Example: C3:

Nearest Covering Code Example: Secret message bits: S =0 1 1 LSB Example: Decimal digit Secret message bits: S’ =3 Size: 1 7 pixels C3: S’ =3

Nearest Covering Code Example: Secret message bits: S =0 1 1 LSB Secret message bits: S =0 1 1 Secret message bits: S’ =3

Nearest Covering Code The 7-bit Codeword can carry 3 secret bits by changing at most 1 bit

Hamming+1 It embeds k+1 bits into 2k pixel using at most change one bit. (1,8,3): 8 pixels can carry 4 bits message by changing one bit at most. LSB Secret message bits:

Hamming+1----Example for embedding Secret message bits: LSB 0 change to 1 1

Hamming+1----Example for embedding Secret message bits: LSB

Hamming+1----Example for embedding Secret message bits:

Hamming+1----Example for extraction LSB Secret message bits:

Hamming+1 The 8-bit Codeword can carry (3+1) secret bits by changing at most 1 bit

Hamming+3----Embedding It embeds k+3 bits into 2k -1 pixels using at most change 2 bits. (1,7,3): 7 pixels can carry 6 bits message by changing 2 bits at most. LSB Secret message bits:

Hamming+3--Embedding Secret message bits: 2LSB LSB

Hamming+3----Extraction 2LSB LSB Secret message bits:

Hamming+3 The 7-bit codeword can carry (3+3) secret bits by changing at most 1 bit

Comparisons

Comparisons

Thanks!