Reporter :Liang, Min-Chen Date :2003/05/06

Slides:



Advertisements
Similar presentations
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
Advertisements

Piyu Tsia,Yu-Chen Hu,Hsiu-Lien Yen Signal Processing 日期 :1 月 4 號 報告者 : 許睿中.
1 Hiding Data in Images by Simple LSB Substitution Source: Pattern Recognition, Vol. 37, pp , 2004 Authors: Chi-Kwong Chan and L.M. Cheng Speaker:
Data hiding in Least Significant Bit (LSB) Speaker: Feng Jen-Bang ( 馮振邦 )
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
影像偽裝術 Dr. Chin-Chen Chang
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Reporter :Liang, Min-Chen Date :2003/04/15
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
2003/04/291 Hiding data in images by optimal moderately- significant-bit replacement Wang, Ran-Zan, Lin, Chi-Fang, and Lin, Ja-Chen, IEE Electronics Letters,
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Information Steganography Using Magic Matrix
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Reversible data hiding scheme based on significant-bit-difference expansion Sourse: IET Image Processing ( Volume: 11, Issue: 11, ), Pages 1002.
Chair Professor Chin-Chen Chang Feng Chia University
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images Source: Symmetry, vol. 8, no. 6, June.
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
A Color Image Hidden in a
Hiding Data in a Color Palette Image with Hybrid Strategies
Embedding Secrets Using Magic Matrices
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
An Innovative Steganographic Scheme Based on Vector Quantization
A Restricted Region-based Data-hiding Scheme
An Innovative Steganographic Scheme Based on Vector Quantization
Some Novel Steganographic Methods for Digital Images
Reversible Data Hiding Scheme Using Two Steganographic Images
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Information Steganography Using Magic Matrix
Source: IEEE Access, Vol. 6, Dec. 2017, pp
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Data hiding method using image interpolation
Reporter :Liang, Min-Chen Date :2003/05/06
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Information Hiding and Its Applications
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
A Data-Hiding Technique with Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
Chair Professor Chin-Chen Chang Feng Chia University
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Reporter :Liang, Min-Chen Date :2003/05/06
A new chaotic algorithm for image encryption
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Data hiding method using image interpolation
Chair Professor Chin-Chen Chang Feng Chia University
Source: Signal Processing: Image Communication 16 (2001) pp
Partial reversible data hiding scheme using (7, 4) hamming code
A Data-Hiding Technique With Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
Novel Multiple Spatial Watermarking Technique in Color Images
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
Source: IEEE Transactions on Circuits and Systems,
A Data Hiding Scheme Based Upon Block Truncation Coding
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Information Hiding Techniques Using Magic Matrix
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Improvements of Image Sharing with Steganography and Authentication
Steganographic Systems for Secret Messages
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Lossless Data Hiding in the Spatial Domain for High Quality Images
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Reporter :Liang, Min-Chen Date :2003/05/06 Improved Hiding Data in Images by Optimal Moderately-Significant-Bit Replacement Author:Chi-Kwong Chan and L.M. Cheng Source:IEE ELECTRONICS LETTERS,VOL.37, NO. 16, AUGUST 2001, pp. 1017-1018. Adviser :Dr. Chang, Chin-Chen Reporter :Liang, Min-Chen Date :2003/05/06 2003/05/06

Outline PREVIOUS WORK PROPOSED METHODS EXPERIMENTAL RESULTS CONCLUSIONS 2003/05/06

PREVIOUS WORK – Wang-Lin-Lin Scheme temporal image (1bit/pixel) The cipher process GA important image (1 bit/pixel) perturbed image (1 bit/pixel) replacement Improve H R Z Z1 pixel adjustment host image (8 bits/pixel) residual image (1 bit/pixel) PSNR=33.02dB PSNR=38.75dB 2003/05/06

The Cipher Process Ex. F(X)=(5+3*X) mod (4*4) F(0)=5, F(1)=8, F(2)=11, F(3)=14, F(4)=1,….. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 9 4 15 10 5 11 6 1 12 7 2 13 8 3 14 The location of important image The location of perturbed image 2003/05/06

The Cipher Process (cont.) 1 1 important image perturbed image 2003/05/06

GA (Genetic Algorithm) 1 G=g0g1….g15=g0000g0001….g1111 EX. we get the best replacement : E1 E2 perturbed image {1111}  {1100} {1001}  {0001} {0101}  {1101} {0000}  {1111} . . residual image 1 2003/05/06 perturbed image

Pixel Adjustment H Z 10 29 31 5 16 22 43 100 79 213 176 162 27 93 121 200 10 29 23 5 16 22 35 108 79 221 176 170 27 93 121 200 host image optimal substitution image δ 1. If δ>=4 then add 8- δ-1 EX. 7>=4 then 23+0 2. If δ<4 and if the 4th bit is 0 then 0 is changed to 1 and subtracted δ 3. Do nothing otherwise 00011111=31 00010111=23 2003/05/06

Pixel Adjustment (cont.) H Z 10 29 31 5 16 22 43 100 79 213 176 162 27 93 121 200 10 29 23 5 16 22 35 108 79 221 176 170 27 93 121 200 optimal substitution image host image δ 1. If δ <4 then subtract δ 2. If δ >=4 and if the 4th bit is 1 then 1 is changed to 0 and add 8- δ -1 3. Do nothing otherwise 01100100=100 01101100=108 2003/05/06

PROPOSED METHODS H Z 10 29 31 5 16 22 43 100 79 213 176 162 27 93 121 200 10 29 23 5 16 22 35 108 79 221 176 170 27 93 121 200 host image δ optimal substitution image 1. If δ >=4 then add 8- δ -1 EX. 7>=4 then 23+0 2. If δ <4 and if the 4th bit is 0 then 0 is changed to 1 and subtracted δ 3. Do nothing otherwise absolute error ε=31-23=8 If ε=32-31=1 32=00100000 00011111=31 00010111=23 2003/05/06

PROPOSED METHODS (cont.) O are the possible pixel values of H(Host image) S are the pixel values used for the substitution H E1 10 29 31 5 16 12 43 100 79 213 176 162 27 93 121 200 1 12=00001100 is replaced by 16=00010000 2003/05/06

PROPOSED METHODS (cont.) ε Mean ε 00000000 00000001 00000010 00000011 00000100 00000101 00000110 00000111 00001000 8 7 6 5 4 3 2 1 4.5 00001000 00001001 00001010 00001011 . 00000111 . 1 2 3 4 . 2.5 . 2003/05/06

EXPERIMENTAL RESULTS Resulting stego-image with PSNR=42.352 2003/05/06

CONCLUSIONS An improvement of the Wang-Lin-Lin data hiding scheme is proposed. The improvement demonstrates better performance than the Wang-Lin-Lin scheme with respect to computational cost and image quality. 2003/05/06