Secret image sharing with steganography and authentication

Slides:



Advertisements
Similar presentations
Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery Source: Pattern Recognition, Vol. 41, Issue 2,
Advertisements

1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
Ch12. Secret Sharing Schemes
A reversible data hiding method by histogram shifting in high quality medical images Author: Li-Chin Huang, Lin-Yu Tseng, Min-Shiang Hwang Source: The.
1 視覺密碼學 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University ( 清華大學 ) National Chung Cheng University ( 中正大學 ) Feng Chia University (
Recover the tampered image based on VQ indexing Source: Signal Processing, Volume 90, Issue 1, Jan. 2010, pp Authors: Chun-Wei Yang and Jau-Ji.
Steganography for Secure Digital Watermarking 1 Pratheepan Yogarajah, Dr. Joan Condell, Dr. Kevin Curran, Prof. Paul Mc Kevitt.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Phen-Lan Lin, Chung-Kai Hsieh, and Po-Whei Huang
人力資源報告 Image and Signal Processing 1 Steganography Using Sudoku Revisited Wien Hong, Tung-Shou Chen, Chih-Wei Shiu Department of Information Management,
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Palette Partition Based Data Hiding for Color Images
Ch12. Secret Sharing Schemes
Visual Secret Sharing Chair Professor Chin-Chen Chang (張真誠)
Der-Chyuan Lou and Jiang-Lung Liu,
The Recent Developments in Visual Cryptography
Image camouflage by reversible image transformation
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Recent Developments on Multimedia and Secure Networking Technologies
Steganography with Digital Images
Chair Professor Chin-Chen Chang Feng Chia University
Chair Professor Chin-Chen Chang Feng Chia University
The Recent Developments in Visual Secret Sharing
A Digital Watermarking Scheme Based on Singular Value Decomposition
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
A Color Image Hidden in a
Hiding Data in a Color Palette Image with Hybrid Strategies
A Restricted Region-based Data-hiding Scheme
An efficient reversible data hiding method for AMBTC compressed images
Source: Pattern Recognition, Vol. 38, Issue 11, December 2005, pp
The New Developments in Visual Cryptography
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Some Novel Steganographic Methods for Digital Images
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Source: IEEE Access, Vol. 6, Dec. 2017, pp
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
Data hiding method using image interpolation
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
Recent Developments on Multimedia and Secure Networking Technologies
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Steganography in halftone images: conjugate error diffusion
Digital Watermarking for Image Authentication with Localization
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
Partial reversible data hiding scheme using (7, 4) hamming code
Novel Multiple Spatial Watermarking Technique in Color Images
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection Source: Multimedia.
Source: IEICE-Transactions on Info and Systems
Ming-Shi Wang *, Wei-Che Chen 11 November 2006 present: 沈雅楓
An Iterative Method for Lossless Data Embedding in BMP Images
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Image Based Steganography Using LSB Insertion Technique
Source : Digital Signal Processing. Vol. 73, pp , Feb
Improvements of Image Sharing with Steganography and Authentication
LSB matching revisited
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Lossless Data Hiding in the Spatial Domain for High Quality Images
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
Adopting secret sharing for reversible data hiding in encrypted images
Presentation transcript:

Secret image sharing with steganography and authentication Chang-Chou Lin, Wen Hsiang Tsai The Journal of Systems and Software Volume 73 , Issue 3 (November-December 2004) Reporter: 周美君

Outline Introduction Proposed scheme Experimental Results Conclusions

Secret sharing Shamir's secret sharing (1979) A secret integer value s for the (k, n)- threshold. F(x) = s + m1 × x + m2 × x2 + ... + mk-1 × xk-1 Choose freely: m1,…, mk-1 and x1…xk .(distinct) The ith secret sharing participant get the secret shares: (xi, F(xi)) Compute the secret value s as F(0).

An example of Shamir's secret sharing Ex: (2,3) threshold system (The secret key s =4) F(x) = 4 + 2x 3 shares: (1,6), (5,14), (8,20) x y F(x) (1,6) (5,14) (8,20) F(0)=4

Secret image sharing secret image recovery image …… shares

Proposed scheme Using (2, 3)-threshold Watermark signal p=1 Parity Check Secret image Camouflage images 27 31 28 61 60 59 58 200 198 197 60 F(xi) = 60 + m1 × xi

27 25 30 26 27 31 28 61 62 61 60 59 58 200 198 197 200 203 194 193 (∵ p=1, ∴parity check b=0) 27 0001 1111 27 25 30 26 01 0001 1011 0001 1100 110 010

27 25 30 26 61 62 27 0001 1001 61 0011 1110 0001 1110 0001 1010 0011 1110 0001 1110 Check the Parity Check (p=1) is correct or not. F(27) = s + m × 27 = 011100102 = 114 F(61) = s + m × 27 = 101101102 = 182 } F(0) = s = 60 60

Experimental results Gray images Cover Image Stego Image 39.21 39.16 Secret image Experimental results Gray images Cover Image Stego Image 39.21 39.16 39.16

Experimental results Color images Cover Image Stego Image 39.07 39.08 Secret image Experimental results Color images Cover Image Stego Image 39.07 39.08 39.08

Authentication-Tamper detection Experimental results Authentication-Tamper detection (a) (b) (c) The stego-image in which fragile watermark signals are embedded. The image with modifications added to (a). The result of authentication.

Conclusions Three levels of security Secret sharing Camouflage images Authentication The quality of recovery image is nearly lossless.