Steganography in halftone images: conjugate error diffusion

Slides:



Advertisements
Similar presentations
Cheating prevention in visual cryptography Author: C.M. Hu and W.G. Tzeng Source: IEEE-TIP 2007 Presenter: Yu-Chi Chen Date: /4/13 1.
Advertisements

Reversible Data Hiding Based on Two-Dimensional Prediction Errors
國立暨南國際大學 National Chi Nan University A Study of (k, n)-threshold Secret Image Sharing Schemes in Visual Cryptography without Expansion Presenter : Ying-Yu.
1 影像偽裝術的最新發展 張真誠 逢甲大學 講座教授 中正大學 榮譽教授 清華大學 合聘教授 Watermarking 2. Image authentication 3. Secret sharing 4. Visual cryptography 5. Steganography.
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
1 視覺密碼學 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University ( 清華大學 ) National Chung Cheng University ( 中正大學 ) Feng Chia University (
1 High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
1 Data Hiding Watermarking for Halftone Images Ming Sun Fu, Student Member, IEEE, and Oscar C. Au, Senior Member, IEEE, IEEE TRANSACTIONS ON IMAGE PROCESSING,
Chapter 6 Color Image Processing Chapter 6 Color Image Processing.
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
Visual Cryptography Advanced Information Security March 11, 2010 Presenter: Semin Kim.
Half-Tone Watermarking Multimedia Security. 2 Outline Half-tone technique Watermarking Method Measurement Robustness Conclusion.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
1 Adaptive Data Hiding in Palette images by Color Ordering and Mapping With Security Protection Authors: Chih-Hsuan Tzeng, Zhi-Fang Yang, and Wen-Hsiang.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
國立雲林科技大學 National Yunlin University of Science and Technology Self-organizing map learning nonlinearly embedded manifoldsmanifolds Author :Timo Simila.
Palette Partition Based Data Hiding for Color Images Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, and Chien-Ting Huang Speaker : Yu-Chiang Li.
Introduction to Visual Cryptography
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 1 Region-based image retrieval using integrated color, shape,
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Visual Cryptography for Gray-Level Images by Dithering Techniques
A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.
Halftone Visual Cryptography
Authors: Tzung-Her Chen, Kai-Hsiang Tsao, and Kuo-Chen Wei Source: Proceedings of The 8th International Conference on Intelligent System Design and Applications.
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
Palette Partition Based Data Hiding for Color Images
Information Hiding Technology: Current Research and Future Trend
Visual Secret Sharing Chair Professor Chin-Chen Chang (張真誠)
Advisor: Chin-Chen Chang1, 2 Student: Yi-Hui Chen2
The Recent Developments in Visual Cryptography
Image camouflage by reversible image transformation
A new data transfer method via signal-rich-art code images captured by mobile devices Source: IEEE Transactions on Circuits and Systems for Video Technology,
Small target detection combining regional stability
Source: Optical Engineering, Vol. 55, No. 6, pp , 2016.
Source: Mobile Information Systems, vol. 2017, 2017.
Centrality Bias Measure for High Density QR Code Module Recognition
Source :Journal of visual Communication and Image Representation
Source: Signal Processing 109 (2015) 317–333
The Recent Developments in Visual Secret Sharing
Counting Iron-Absorbed Small Intestinal Cells
Small target detection combining regional stability
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
Source: Pattern Recognition, Vol. 38, Issue 11, December 2005, pp
The New Developments in Visual Cryptography
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Color Image Processing
Source: Signal Processing, Vol. 125, pp , August 2016.
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
Data Hiding Watermarking for Halftone Images
Dynamic embedding strategy of VQ-based information hiding approach
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Data hiding method using image interpolation
Data Hiding Watermarking for Halftone Images
Source: Signal Processing: Image Communication 16 (2001) pp
HIDING DATA IN COLOR HALFTONE IMAGES USING DOT DIFFUSION WITH NONLINEAR THRESOLDING Volume 2, April 2007 April 2007 page(s):Ⅱ-205-Ⅱ-208 Digital Object.
Novel Multiple Spatial Watermarking Technique in Color Images
Secret image sharing with steganography and authentication
An imperceptible spatial domain color image watermarking scheme
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Sourse: Information Sciences, Vol. 494, pp , August 2019
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Dynamic improved pixel value ordering reversible data hiding
Improvements of Image Sharing with Steganography and Authentication
LSB matching revisited
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
Rich QR Codes With Three-Layer Information Using Hamming Code
Reversible data hiding in encrypted binary images by pixel prediction
Presentation transcript:

Steganography in halftone images: conjugate error diffusion Source: Signal processing, Vol. 83, 2003, pp. 2171-2178 Authors: M.S. Fu and C. Au Speaker: J. C. Chuang

Stacking

Visual cryptography Steganography review Binary O1 + Binary O2-> Binary O3 Noar & Shamir, (2, 2), secret (binary image), 1994 Hwang & Chang, (3, 3), secret (binary image), 2001 Gray O1 + Gray O2-> Gray O3 (Current, halftone technique) Lin & Tsai, secret (binary image), 2003 Pei & Guo, secret (binary image), 2003 Color O1 + Color O2-> Color O3 (CMYK) Hou, secret (halftone color image), 2003

Error Diffusion 1 2 <T (128) Two kernels Steinberg kernel Jarvis kernel

3 4 依此類推 Error=-105 130+(7/16)*(-105)=93 100+(1/16)*(-105)=93 150+(5/16)*(-105)=117 Error=93-0=93 120+(7/16)*(93)=161 4 100+(1/16)*(93)=106 93+ (5/16)*(93)=122 Error=161-255=94 117+(3/16)*(93)=134 依此類推

Data hiding by conjugate error diffusion (DHCED) 國立中正大學 Share 1 Share 2 Watermark

Share 1 (Halftone, binary) Error diffusion Share 1 (gray-level) Share 1 (Halftone, binary) F(.) Error diffusion Share 2 (gray-level) Share 2 (Halftone, binary)

Share 2 (ideal case) Watermark, (1, 白) (0, 黑) Share-1, (1, 白) (0, 黑)

93<T=127, 黑色(0) △=128-93=35 T2=20

Conclusion Secret (Gray-level image) Color image (RGB)