A Virtual Image Cryptosystem Based upon Vector Quantization

Slides:



Advertisements
Similar presentations
Side match vector quantization. 2 preface To compress image, using VQ, usual method is to encode blocks indepentently. However, there are many interblock.
Advertisements

Vector Quantization. 2 outline Introduction Two measurement : quality of image and bit rate Advantages of Vector Quantization over Scalar Quantization.
Fast vector quantization image coding by mean value predictive algorithm Authors: Yung-Gi Wu, Kuo-Lun Fan Source: Journal of Electronic Imaging 13(2),
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
1 An Efficient VQ-based Data Hiding Scheme Using Voronoi Clustering Authors:Ming-Ni Wu, Puu-An Juang, and Yu-Chiang Li.
Date: Advisor: Jian-Jung Ding Reporter: Hsin-Hui Chen.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
A Fast LBG Codebook Training Algorithm for Vector Quantization Presented by 蔡進義.
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
Advisor: Chang, Chin-Chen Student: Chen, Chang-Chu
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
影像偽裝術 Dr. Chin-Chen Chang
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
An Image Database Retrieval Scheme Based Upon Multivariate Analysis and Data Mining Presented by C.C. Chang Dept. of Computer Science and Information.
隱 像 術 張真誠 國立中正大學資訊工程研究所.
Visual Secret Sharing Chair Professor Chin-Chen Chang (張真誠)
隱 像 術 張真誠 國立中正大學資訊工程研究所.
A Secret Information Hiding Scheme Based on Switching Tree Coding
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
Chapter 3 向量量化編碼法.
A New Image Compression Scheme Based on Locally Adaptive Coding
The Recent Developments in Visual Cryptography
Information Steganography Using Magic Matrix
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Chair Professor Chin-Chen Chang Feng Chia University
Chair Professor Chin-Chen Chang Feng Chia University
High-capacity image hiding scheme based on vector quantization
Advisor: Chin-Chen Chang1, 2 Student: Wen-Chuan Wu2
指導教授: Chang, Chin-Chen (張真誠)
A Data Hiding Scheme Based Upon Block Truncation Coding
第七章 資訊隱藏 張真誠 國立中正大學資訊工程研究所.
Hiding Data in a Color Palette Image with Hybrid Strategies
基於邊緣吻合向量量化編碼 法之資訊隱藏 張 真 誠 逢甲大學 講座教授 中正大學 榮譽教授、合聘教授 清華大學 合聘教授
A Study of Digital Image Coding and Retrieving Techniques
Embedding Secrets Using Magic Matrices
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
An Innovative Steganographic Scheme Based on Vector Quantization
A Restricted Region-based Data-hiding Scheme
An Innovative Steganographic Scheme Based on Vector Quantization
The New Developments in Visual Cryptography
Some Novel Steganographic Methods for Digital Images
第 四 章 VQ 加速運算與編碼表壓縮 4-.
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding Scheme Using Two Steganographic Images
Density-Based Image Vector Quantization Using a Genetic Algorithm
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Information Steganography Using Magic Matrix
Dynamic embedding strategy of VQ-based information hiding approach
Chair Professor Chin-Chen Chang Feng Chia University
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Hiding Information in VQ Index Tables with Reversibility
Information Hiding and Its Applications
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
第 十 章 隱像術.
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
De-clustering and Its Application to Steganography
A Data Hiding Scheme Based Upon Block Truncation Coding
Predictive Grayscale Image Coding Scheme Using VQ and BTC
資訊偽裝術 張真誠 講座教授 多媒體暨網路安全實驗室
Information Hiding Techniques Using Magic Matrix
My Research Projects Chair Professor Chin-Chen Chang (張真誠)
Steganographic Systems for Secret Messages
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
A New Image Compression Scheme Based on Locally Adaptive Coding
A Restricted Region-based Data-hiding Scheme
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

A Virtual Image Cryptosystem Based upon Vector Quantization Chair Professor Chin-Chen Chang National Tsing Hua University National Chung Cheng University Feng Chia University http://msn.iecs.fcu.edu.tw/~ccc

Introduction Images have been widely used in our daily life. The image security has become an important issue in current computer world. Image cryptology is a very useful tool to defend the information security.

Apply the Traditional Cryptosystem on Images

Problems The cipherimage is meaningless. Image Camouflage(影像偽裝) Image size is huge Image Compression(影像壓縮) The decrypted image containing a small distortion is usually acceptable. Vector Quantization (向量量畫編碼法)

Virtual Image Cryptosystem

VQ Compression Index table Original Image Codebook (16, 200, …, 90) 1 (16, 200, …, 90) 1 (35, 22, …, 100) 2 (40, 255, …, 59) . 254 (90, 102, …, 98) 255 (145, 16, …, 99) 1 60 61 175 … 100 95 203 . . . . Index table Original Image Codebook

Vector Quantization (VQ) Codebook Training Codebook Generation 1 2 . N-1 N Training Images Training Set Separating All Training Images to Vectors

Vector Quantization (VQ) Codebook Training Codebook Generation (Ex: Codebook Size = 256) 1 . 1 . 254 255 N-1 N Initial Codebook Training Set Codebook Initiation

Vector Quantization (VQ) Codebook Training LBG Algorithm Training Set Training 256 codewords each time K times Until the difference between every two times is smaller than the threshold

Example Codebook To encode an input vector, for example, v = (150,145,121,130) (1) Compute the distance between v with all vectors in codebook d(v, cw1) = 114.2 d(v, cw2) = 188.3 d(v, cw3) = 112.3 d(v, cw4) = 124.6 d(v, cw5) = 122.3 d(v, cw6) = 235.1 d(v, cw7) = 152.5 d(v, cw8) = 63.2 (2) So, we choose cw8 to replace the input vector v.

VQ Decompression Index Table VQ Coded Image Codebook (16, 200, …, 90) (16, 200, …, 90) 1 (35, 22, …, 100) 2 (40, 255, …, 59) . 254 (90, 102, …, 98) 255 (145, 16, …, 99) 1 60 61 175 … 100 95 203 . . . . Index Table VQ Coded Image Codebook

The Principle of the Virtual Image Cryptosystem Separate O into a set of vectors {O1, O2, O3,…, Ono}. Separate V into another set of vectors {V1, V2, V3, … , Vnv} Let O be the original image Let {V1, V2, V3, …, Vnv} be the codebook

Encryption Randomly generate the transformed-origin G and the project-direction D. Project {V1, V2, V3, …, Vnv} to D based on G Sort the projected results, and obtain {{V’1, V’2, V’3, …, V’nv}

Encrypt w, h, no, G, and D into wc, hc, noc, Gc, and Dc by DES-like, respectively. Encrypt I into Ic, where Ic=IXORX and X is the bit-string containing G, D, G, D,… only. Hide wc, hc, noc, Gc, Dc, and Ic into the pixels of V. Cipher Image Vc

Decryption

Original Image Airplane 512 X 512 Empirical Tests Test1: Original Image Airplane 512 X 512

Virtual Image Lena 256 X 256 Cipher Image Lena 256 X 256 PSNR=37.87dB

Decrypted Image Airplane 512 X 512 PSNR=30.22dB

Original Image Airplane 512 X 512 Test2: Original Image Airplane 512 X 512

Virtual Image Lena 360 X 360 Cipher Image Lena 360 X 360 PSNR=45.13dB

Decrypted Image Airplane 512 X 512 PSNR=31.36dB

Original Image Peppers 512 X 512 Test3: Original Image Peppers 512 X 512

Virtual Image Lena 256 X 256 Cipher Image Lena 256 X 256 PSNR=37.60dB

Decrypted Image Peppers 512 X 512 PSNR=29.91dB