Source: IEEE Transactions on multimedia, Vol. 21, No

Slides:



Advertisements
Similar presentations
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
Advertisements

1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Reversible data hiding based on histogram shifting scheme Reporter: Date: Wan-Yu Lu 2012/12/13.
Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
基本知识和几何要素的投影 模块一: 字体练习 第一章 制图的基本知识与基本技能 题目提示返回.
Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
1 Hiding Data in Images by Simple LSB Substitution Source: Pattern Recognition, Vol. 37, pp , 2004 Authors: Chi-Kwong Chan and L.M. Cheng Speaker:
1 Embedding Compression in Chaos- Based Cryptography 嵌入壓縮功能到混亂加密法 IEEE Transactions on Circuits and Systems—II: Express Briefs, VOL. 55, NO. 11, NOV
Improvements to the JPEG-LS prediction scheme Authors: S. Bedi, E. A. Edirisinghe, and G. Grecos Source : Image and Vision Computing. Vol. 22, No. 1, 2004,
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
A Novel Technique for Image Authentication in Frequency Domain using Discrete Fourier Transformation Technique (IAFDDFTT) Malaysian Journal of Computer.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
企业产品标准信息公共服务平台 操作介绍 目录 一 、系统架构介绍 二 、企业产品标准自我声明填报系统 三 、企业产品标准公示系统.
Reversible Date Hiding Based on Histogram Modification of pixel Differences IEEE Transactions on circuits and systems for video technology, VOL. 19, NO.
1 Commutative Encryption and Watermarking in Video Compression 交換式加密及浮水印法應用在視頻壓縮 IEEE Transactions on Circuits and Systems for Video Technology, VOL. 17,
1 Reversible and lossless data hiding in the integer wavelet transform domain (Review) Authors: S. Yousefi, H. R. Rabiee, E. Yousefi, and M. Ghanbari Speaker:
1 Block Truncation Coding Using Pattern Fitting Source: Pattern Recognition, vol.37, 2004, pp Authors: Bibhas Chandra Dhara, Bhabatosh Chanda.
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
Source: IEEE Signal Processing Letters (Accepted)2016
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Source: IEEE Transactions on Circuits and Systems for Video Technology Vol.26.
A Secret Information Hiding Scheme Based on Switching Tree Coding
Advisor: Chin-Chen Chang1, 2 Student: Yi-Hui Chen2
Reversible Data Hiding in JPEG Images using Ordered Embedding
Source : Signal Processing, Volume 133, April 2017, Pages
Source :Journal of visual Communication and Image Representation
Reversible data hiding scheme based on significant-bit-difference expansion Sourse: IET Image Processing ( Volume: 11, Issue: 11, ), Pages 1002.
Mean value based reversible data hiding in encrypted images
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
Separable and error-free reversible data hiding in encrypted images
Yongjian Hu, Member, IEEE, Heung-Kyu Lee, Kaiying Chen, and Jianwei Li
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Improved joint reversible data hiding in encrypted images
Source: Signal Processing: Image Communication 64 (2018) 78-88
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
A reversible and secure patient information hiding system for IoT driven e-health Source : International Journal of Information Management, Available online.
Sourse: IEEE Transactions on Circuits and Systems for Video Technology
Source : Journal of Visual Communication and Image Representation, vol
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Hiding Information in VQ Index Tables with Reversibility
Source : Journal of Visual Communication and Image Representation, vol
Sourse: Multimedia Tools and Applications, 2018, pp 1–17
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
A new chaotic algorithm for image encryption
Digital Watermarking for Image Authentication with Localization
Data hiding method using image interpolation
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
Partial reversible data hiding scheme using (7, 4) hamming code
New Framework for Reversible Data Hiding in Encrypted Domain
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
Secret Image Sharing Based on Encrypted Pixels
Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images Source: Symmetry, Vol. 10, No. 8, pp. 318.
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Sourse: Information Sciences, Vol. 494, pp , August 2019
Sourse: arXiv preprint, arXiv: , 2018 (Submit to IEEE Trans
Lossless Data Hiding in the Spatial Domain for High Quality Images
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Adopting secret sharing for reversible data hiding in encrypted images
Reversible data hiding in encrypted binary images by pixel prediction
Presentation transcript:

Separable and Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling Source: IEEE Transactions on multimedia, Vol. 21, No. 1, pp. 51-64, January 2019 Author: Shuang Yi and Yicong Zhou Speaker: Su Guodong Date: 2019/03/28

Outline Introduction Related work Proposed scheme Experiments Conclusions

Introduction(1/3) Original image secret

Introduction(2/3)

Related work---Fully binary tree Number of nodes for each layer Layer 1: 1 Layer 2: 00 01 10 11 Layer 3: 000 001 010 011 100 101 110 111 … … … … Layer 7: 0000000 0000001 1111110 1111111 Distribution of binary codes based on a fully binary tree

Proposed scheme(1/12) ---Parametric binary tree labeling scheme(PBTL) 1 Labeling 00 01 10 11 为此,本文提出了基于MSB的high payload and high quality image的方法。具体是: 先对original image进行MSB误差预测,后面详细介绍。 然后根据Ke对图像加密。 secret隐藏在加密图像的MSB中。 G2 G1 000 001 010 011 100 101 110 111 … … … … 0000000 0000001 1111110 1111111

Proposed scheme(2/12) ---Parametric binary tree labeling scheme(PBTL) 1 10 11 100 101 110 111 … … Ignore … 1111110 1111111 Example of labeling bits selection when = 1 and = 1 to 7

Proposed scheme(3/12) ---Parametric binary tree labeling scheme(PBTL) 1 00 01 10 11 100 101 110 111 … … Ignore … 1111110 1111111 Example of labeling bits selection when = 2 and = 1 to 7

Proposed scheme(4/12)---Data hiding using PBTL 166 165 164 163 159 158 166 175 165 164 163 169 159 155 158 166 175 165 164 163 169 159 155 158 Pr Ps Pe Pn

Proposed scheme(5/12)---Data hiding using PBTL 166 175 165 164 163 169 159 155 158 166 9 165 1 -1 -2 4 159 7 -11

Proposed scheme(6/12)---Data hiding using PBTL Pn Pe 00 e= -1 e= 0 e= 1 01 10 11 166 9 165 1 -1 -2 4 159 7 -11 166 9 165 1 -1 -2 4 159 7 -11 = 2 and = 2

Proposed scheme(7/12)---Data hiding using PBTL Pn Pe 00 e= -3 e= -2 e= -1 e= 0 e= 1 e= 2 010 101 100 110 111 166 9 165 1 -1 -2 4 159 7 -11 166 9 165 1 -1 -2 4 159 7 -11 = 2 and = 3

Proposed scheme(8/12)---Data hiding using PBTL 166 Pr 1 Original bits 166 175 165 164 163 169 159 155 158 166 165 166 Ps 1 and 166 Pe 1 1 Payload bits 165 Pe 1 1 Payload bits Message: 10100110 166 9 165 1 -1 -2 4 159 7 -11 = 2 and = 2 Pn Pe 00 e= -1 e= 0 e= 1 01 10 11

Proposed scheme(9/12)---Data hiding using PBTL 166 175 165 164 163 169 159 155 158 166 Pr 1 Original bits 166 175 165 175 Pn 1 Original bits 165 Pe 1 1 Payload bits Pe 165 1 1 Payload bits Message: 10100110 10 166 9 165 1 -1 -2 4 159 7 -11 = 2 and = 2 Pn Pe 00 e= -1 e= 0 e= 1 01 10 11

Proposed scheme(10/12)---Data hiding in Encrypted image using PBTL Generation of Encrypted Image Keep the spatial correlations in image block Block permutation: 为此,本文提出了基于MSB的high payload and high quality image的方法。具体是: 先对original image进行MSB误差预测,后面详细介绍。 然后根据Ke对图像加密。 secret隐藏在加密图像的MSB中。 Block Block Pixel modulation: : j-th pixel of block Random generator [0,255] (Chaotic system)

Proposed scheme(11/12)---Data hiding in Encrypted image using PBTL Problem of modulation operation [102, 102; 99, 103] [~, 0 ; -3 , 1 ] = 100 为此,本文提出了基于MSB的high payload and high quality image的方法。具体是: 先对original image进行MSB误差预测,后面详细介绍。 然后根据Ke对图像加密。 secret隐藏在加密图像的MSB中。 [202, 202; 199, 203] [~, 0 ; -3 , 1 ] = 153 [255, 255; 252, 0] [~, 0 ; -3 , -255 ] Histograms of difference e calculated from image Lena when applied with and without pixel modulation operation for block sizes are set to (a) 2 × 2 and (b) 3 × 3

Proposed scheme(12/12)-Framework of PBTL-RDHEI

Security analyses(1/3) Brute-force attack:

Security analyses(2/3) Known/Chosen-plaintext attack:

Security analyses(3/3) Nosie and data loss attacks

Experiments(1/6)

Experiments(2/6)

Experiments(3/6)

Experiments(4/6)

Experiments(5/6)

Experiments(6/6)

Conclusions and Contributions Propose a reversible data hiding scheme based on parametric binary tree labeling for encrypted image. Achieve an average embedding rate as large as 1.752 bpp and 2.003 bpp when block size is 2*2 or 3*3.

Thanks!