Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct

Slides:



Advertisements
Similar presentations
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
Advertisements

1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
Recover the tampered image based on VQ indexing Source: Signal Processing, Volume 90, Issue 1, Jan. 2010, pp Authors: Chun-Wei Yang and Jau-Ji.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
1 Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems Adviser: Chih-Hung Lin Speaker : Chia-Wei Chang Date:2009/10/06.
A general (k, n) scalable secret image sharing scheme with the smooth scalability Ching-Nung Yang, Yu-Ying Chu The Journal of Systems and Software 84 (2011)
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
(k, n)-Image Reversible Data Hiding
Palette Partition Based Data Hiding for Color Images
Der-Chyuan Lou and Jiang-Lung Liu,
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
Image camouflage by reversible image transformation
2003/04/291 Hiding data in images by optimal moderately- significant-bit replacement Wang, Ran-Zan, Lin, Chi-Fang, and Lin, Ja-Chen, IEE Electronics Letters,
A new data transfer method via signal-rich-art code images captured by mobile devices Source: IEEE Transactions on Circuits and Systems for Video Technology,
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Chair Professor Chin-Chen Chang Feng Chia University
Source :Journal of visual Communication and Image Representation
Reversible data hiding scheme based on significant-bit-difference expansion Sourse: IET Image Processing ( Volume: 11, Issue: 11, ), Pages 1002.
High-capacity image hiding scheme based on vector quantization
QR Code Authentication with Embedded Message Authentication Code
Mean value based reversible data hiding in encrypted images
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images Source: Symmetry, vol. 8, no. 6, June.
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
A Restricted Region-based Data-hiding Scheme
An efficient reversible data hiding method for AMBTC compressed images
Source: Pattern Recognition, Vol. 38, Issue 11, December 2005, pp
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Reversible Data Hiding Scheme Using Two Steganographic Images
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Source: Signal Processing, Vol. 125, pp , August 2016.
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Data hiding method using image interpolation
Dynamic embedding strategy of VQ-based information hiding approach
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Sourse: Multimedia Tools and Applications, 2018, pp 1–17
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
A Data-Hiding Technique with Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
Chair Professor Chin-Chen Chang Feng Chia University
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
A new chaotic algorithm for image encryption
Data hiding method using image interpolation
Chair Professor Chin-Chen Chang Feng Chia University
Partial reversible data hiding scheme using (7, 4) hamming code
A Data-Hiding Technique With Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
Novel Multiple Spatial Watermarking Technique in Color Images
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection Source: Multimedia.
Secret image sharing with steganography and authentication
Ming-Shi Wang *, Wei-Che Chen 11 November 2006 present: 沈雅楓
Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images Source: Symmetry, Vol. 10, No. 8, pp. 318.
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Dynamic improved pixel value ordering reversible data hiding
Source : Digital Signal Processing. Vol. 73, pp , Feb
Improvements of Image Sharing with Steganography and Authentication
LSB matching revisited
Lossless Data Hiding in the Spatial Domain for High Quality Images
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
Adopting secret sharing for reversible data hiding in encrypted images
Reversible data hiding in encrypted binary images by pixel prediction
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Selective scalable secret image sharing with adaptive pixel-embedding technique Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp. 27107-27121, Oct. 2018. Authors: Jung-San Lee, Ying-Chin Chen, Hong-Chi Su Speaker:Yun-Hao Hsieh Date:2018/7/11

Outline Introduction Preliminaries Proposed mechanism Experimental results and analysis Conclusions

Introduction(1/2) – (t, n) threshold (3, 5) (4, 5)

Introduction(2/2) – Secret image sharing Cover image Result of shadows 3 shadows (3, 5) 4 shadows 5 shadows

Preliminaries(1/5) – Scalable secret image sharing Cover image Result of shadows (3, 5) 3 shadows 4 shadows (3, 5) (4, 5) (5, 5) 5 shadows

Preliminaries(2/5) – Selective scalable secret image sharing Cover image Result of shadows (3, 5) 3 shadows 4 shadows (3, 5) (4, 5) (5, 5) 5 shadows

Preliminaries(3/5) – Meaningful shadow Secret image Cover image good PSNR good SSIM

Preliminaries(4/5) – No pixel expansion Cover image Secret image Preserve system performance

Preliminaries(5/5) – Verification Cover image Result of shadows 3 shadows LSB Integrity 4 shadows 5 shadows

Proposed mechanism(1/5) - Sharing (3, 5) 1000 Pixel 600 Pixel 200 Pixel

Proposed mechanism(2/5) - Sharing (3, 5) (4, 5) (5, 5) 290 Pixel 600 Pixel 200 Pixel 200 Pixel (10,15,20) (1, 45) (2, 120) (3, 235) (5, 83) (4, 139)

Proposed mechanism(3/5) - Embedding 290 Pixel 2500 Pixel

Proposed mechanism(4/5) – Decrypting and verification (3, 5) 290 Pixel 2500 Pixel

Proposed mechanism(5/5) – Decrypting and verification (3, 5) 3 shadows 4 shadows (1, 45) (2, 120) (3, 235) 5 shadows

Experimental results and analysis(1/3) (3, 5) [7] Lee JS, Chen YR (2017) Selective scalable secret image sharing with verification. Multimedia Tools Application 76(1):1–11 [15] Yang CN, Chu YY (2011) A general (k, n) scalable secret image sharing scheme with the smooth scalability. J Systems and Software 84(10):1726–1733 [16] Yang CN, Huang SM (2010) Constructions and properties of k out of n scalable secret image sharing. Optics Communications 283(9):1750–1762

Experimental results and analysis(2/3) PSNR SSIM [7] Lee JS, Chen YR (2017) Selective scalable secret image sharing with verification. Multimedia Tools Application 76(1):1–11 [9] Lin CC, Tsai WH (2004) Secret image sharing with steganography and authentication. J Systems and Software 73(3): 405–414 [17] Yang CN, Chen TS, Yu KH, Wang CC (2007) Improvements of image sharing with steganography and authentication. J Systems and Software 80(7):1070–1076

Experimental results and analysis(3/3)

Conclusions Smooth scalability Selectivity Higher PSNR and SSIM

Thanks For listing