Source: Signal Processing: Image Communication 16 (2001) pp

Slides:



Advertisements
Similar presentations
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
Advertisements

國立暨南國際大學 National Chi Nan University A Study of (k, n)-threshold Secret Image Sharing Schemes in Visual Cryptography without Expansion Presenter : Ying-Yu.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
1 Data Hiding Watermarking for Halftone Images Ming Sun Fu, Student Member, IEEE, and Oscar C. Au, Senior Member, IEEE, IEEE TRANSACTIONS ON IMAGE PROCESSING,
1 Hiding Data in Images by Simple LSB Substitution Source: Pattern Recognition, Vol. 37, pp , 2004 Authors: Chi-Kwong Chan and L.M. Cheng Speaker:
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
1 Formatted Text Document Data Hiding Robust to Printing,Copying and Scanning Speaker:Fanjia Yen Adviser:Quincy Wu Date:2008/04/10.
Data hiding in Least Significant Bit (LSB) Speaker: Feng Jen-Bang ( 馮振邦 )
Half-Tone Watermarking Multimedia Security. 2 Outline Half-tone technique Watermarking Method Measurement Robustness Conclusion.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
1 A Color Image Hidden in a Grey-Level Image IS&T Third European Conference on Colour in Graphics, Imaging, and Vision, CGIV’2006, pp. 226–231, (Leeds,
Halftone Visual Cryptography
1 LSB Matching Revisited Source: IEEE Signal Processing Letters (Accepted for future publication) Authors: Jarno Mielikainen Speaker: Chia-Chun Wu ( 吳佳駿.
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
Watermarking Scheme Capable of Resisting Sensitivity Attack
Source: Pattern Recognition, 37(5), P , 2004
Digital information encrypted in an image using binary encoding
Image camouflage by reversible image transformation
A new data transfer method via signal-rich-art code images captured by mobile devices Source: IEEE Transactions on Circuits and Systems for Video Technology,
Source : Signal Processing, Volume 133, April 2017, Pages
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Centrality Bias Measure for High Density QR Code Module Recognition
High-capacity image hiding scheme based on vector quantization
Separable and error-free reversible data hiding in encrypted images
A Color Image Hidden in a
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source : Signal Processing, vol. 126, pp ,  November 2016
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Source: Signal Processing: Image Communication 64 (2018) 78-88
Data Hiding Watermarking for Halftone Images
Source : Journal of Visual Communication and Image Representation, vol
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Reporter :Liang, Min-Chen Date :2003/05/06
Source : Journal of Visual Communication and Image Representation, vol
Partial reversible data hiding scheme using (7, 4) hamming code
High-fidelity reversible data hiding based on pixel-value-ordering and pairwise prediction-error expansion Source: Journal of Visual Communication and.
High Capacity Data Hiding for Grayscale Images
Reporter :Liang, Min-Chen Date :2003/05/06
Reporter :Liang, Min-Chen Date :2003/05/06
Steganography in halftone images: conjugate error diffusion
Data hiding method using image interpolation
Data Hiding Watermarking for Halftone Images
Source: Pattern Recognition Letters 29 (2008)
Partial reversible data hiding scheme using (7, 4) hamming code
HIDING DATA IN COLOR HALFTONE IMAGES USING DOT DIFFUSION WITH NONLINEAR THRESOLDING Volume 2, April 2007 April 2007 page(s):Ⅱ-205-Ⅱ-208 Digital Object.
New Framework for Reversible Data Hiding in Encrypted Domain
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Source: Signal Processing Volume 111 June 2015, Pages
Source: IEEE Transactions on Circuits and Systems,
Halftone Image Data Hiding with Block-Overlapping Parity Check
Mr.M. Venkatesan Mrs.P.MeenakshiDevi Dr.K.Duraiswamy Dr.K.Thiagarajah
An Iterative Method for Lossless Data Embedding in BMP Images
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Dynamic improved pixel value ordering reversible data hiding
Source : Digital Signal Processing. Vol. 73, pp , Feb
Lossless Data Hiding in the Spatial Domain for High Quality Images
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
Rich QR Codes With Three-Layer Information Using Hamming Code
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Adopting secret sharing for reversible data hiding in encrypted images
Reversible data hiding in encrypted binary images by pixel prediction
Presentation transcript:

Halftone Image Data Hiding with Intensity Selection and Connection Selection Source: Signal Processing: Image Communication 16 (2001) pp. 909-930 Authors: Ming Sun Fu and Oscar C. Au Speaker: Hsien-Chu Wu Date: Nov. 8, 2001

Outline Introduction Previous works -Data hiding self toggling (DHST) -Data hiding pair toggling (DHPT) -Data hiding smart pair toggling (DHSPT) The proposed intensity selection algorithm (IS) The proposed connection selection algorithm (CS) Experimental results Conclusions

Introduction Halftone image (binary image) -a bit/pixel -pixel value: 0,1 Gray-level image -a byte/pixel -pixel value: 0-255 X 128 white (0) X<128 Black (1)

Introduction---hiding data in a halftone image 1 Host image Changed image 1 1  

Data hiding self toggling (DHST) Host image “salt-and-pepper” artifacts PRNG(SK) … Hidden data:010100110101…

Data hiding pair toggling (DHPT) Master pixel 1 - - -> 0 1 PRNG(SK) Choose one to be the slave pixel 0 - - - > 1

Data hiding smart pair toggling (DHSPT) Master pixel 1 - - -> 0 1 PRNG(SK) Choose one to be the slave pixel by using “connection” 0 - - - > 1

Data hiding smart pair toggling (DHSPT) The weight of the candidate x x1 x2 x3 x4 x5 x6 x7 x8 x9 1 2

Data hiding smart pair toggling (DHSPT) Connection value = 1+2+2+1=6 1 Connection value =0 Connection value =2+2=4 1

The proposed intensity selection (DHSPT-IS) Hide one bit of the embedded data at M pseudo-random locations M-pixel-sum parity: If the hidden bit is not equal to the M-pixel-sum parity, one of the M pixels will be changed.

The proposed connectivity selection (DHSPT-CS) Compute the connection value for each of the M locations and choose the location with the largest connection.

Experimental results Visual quality measure scores:

Experimental results

Experimental results Fig 4. Error image for DHSPT

Experimental results Fig. 9. Error image for DHSPT-IS4

Experimental results Fig. 9. Error image for DHSPT-CS4

Conclusions The visual quality of IS and CS is better for larger M. The proposed IS and CS provide a tradeoff between visual quality and computational complexity.