Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images Source: Symmetry, Vol. 10, No. 8, pp. 318.

Slides:



Advertisements
Similar presentations
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
Advertisements

Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Fast vector quantization image coding by mean value predictive algorithm Authors: Yung-Gi Wu, Kuo-Lun Fan Source: Journal of Electronic Imaging 13(2),
Recover the tampered image based on VQ indexing Source: Signal Processing, Volume 90, Issue 1, Jan. 2010, pp Authors: Chun-Wei Yang and Jau-Ji.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
A New Approach to Image Authentication Using Chaotic Map and Sudoku Puzzle 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia.
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
Der-Chyuan Lou and Jiang-Lung Liu,
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
Source: The Journal of Systems and Software, Volume 67, Issue 2, pp ,
Image camouflage by reversible image transformation
2003/04/291 Hiding data in images by optimal moderately- significant-bit replacement Wang, Ran-Zan, Lin, Chi-Fang, and Lin, Ja-Chen, IEE Electronics Letters,
Picode: A New Picture-Embedding 2D Barcode
A new data transfer method via signal-rich-art code images captured by mobile devices Source: IEEE Transactions on Circuits and Systems for Video Technology,
Reversible Data Hiding in JPEG Images using Ordered Embedding
Source : Signal Processing, Volume 133, April 2017, Pages
Small target detection combining regional stability
Centrality Bias Measure for High Density QR Code Module Recognition
Source :Journal of visual Communication and Image Representation
Reversible data hiding scheme based on significant-bit-difference expansion Sourse: IET Image Processing ( Volume: 11, Issue: 11, ), Pages 1002.
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
A Digital Watermarking Scheme Based on Singular Value Decomposition
Source: arXiv preprint arXiv:  (2018)
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Small target detection combining regional stability
An efficient reversible data hiding method for AMBTC compressed images
Source: Pattern Recognition, Vol. 38, Issue 11, December 2005, pp
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
Reversible Data Hiding in JPEG Images
Source : Journal of Visual Communication and Image Representation, vol
Dynamic embedding strategy of VQ-based information hiding approach
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Digital Steganography Utilizing Features of JPEG Images
Source : Journal of Visual Communication and Image Representation, vol
Sourse: Multimedia Tools and Applications, 2018, pp 1–17
Partial reversible data hiding scheme using (7, 4) hamming code
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Digital Watermarking for Image Authentication with Localization
Data hiding method using image interpolation
Partial reversible data hiding scheme using (7, 4) hamming code
Novel Multiple Spatial Watermarking Technique in Color Images
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
An Algorithm for Removable Visible Watermarking
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Source: IEEE Transactions on multimedia, Vol. 21, No
Blind Reversible Authentication Based on PEE and CS Reconstruction
Source: IEEE Transactions on Circuits and Systems,
An imperceptible spatial domain color image watermarking scheme
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Predictive Grayscale Image Coding Scheme Using VQ and BTC
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Dynamic improved pixel value ordering reversible data hiding
Source : Digital Signal Processing. Vol. 73, pp , Feb
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
A Quadratic-Residue-based Fragile Watermarking Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
Adopting secret sharing for reversible data hiding in encrypted images
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images Source: Symmetry, Vol. 10, No. 8, pp. 318 (1-17), Aug. 2018 Author: Wien Hong, Xiaoyu Zhou, Der-Chyuan Lou, Xiaoqin Huang and Cancan Peng Speaker: Su Guodong Date: 2019/05/16

Outline Introduction Related work Proposed scheme Experiments Conclusions

Introduction(1/2) Images 46.5 KB Compressed Original 3010 KB

Introduction(2/2) Tamper Authentication (Tamper detection)

Related work---AMBTC AMBTC compression code: ( h, l , bm ) 130 92 133 137 143 124 106 116 Low quantization level l: 122 bm 130 92 161 165 133 171 169 170 137 175 150 143 124 194 106 116 122 169 1 161 165 171 169 170 175 150 194 High quantization level h: 169 5

Proposed scheme(1/8) ---Generation of Authentication codes (ACs) AMBTC AC: ( a + b ) bits ( h, l , bm ) h 8-a a (hM )d ( a + b ) bits AC Hash function bm aca acb (lM )d 8-b b l

Proposed scheme(2/8)---Embedding of ACs AMBTC AC: ( a + b ) bits ( h, l , bm ) ( h’, l’, bm ) h 8-a a 8-a a (hM )d*2a +(aca )d (hM )d ( a + b ) bits AC (aca )d Hash function bm aca acb (acb )d (lM )d (lM )d*2b +(acb )d 8-b b 8-b b l

Proposed scheme(3/8)---Embedding of ACs AMBTC AC: ( 4 + 3 ) bits ( 169, 122 , ‘0011011101100100’ ) ( 166, 126 , ‘0011011101100100’ ) h 1010 1001 1010 0110 (hM )d*24 +(ac4 )d (hM )d =10 bm= ‘0011011101100100’ (ac4 )d = (0100)10=6 ( 0110 110) Hash function aca acb (ac3 )d = (110)10 = 6 (lM )d =15 (lM )d*23 +(ac3 )d 01111 010 01111 110 l

Proposed scheme(4/8)---Results of LSBR

Proposed scheme(5/8)---The MSBs Perturbation Technique (MSBP) AC: ( a + b ) bits Minimize: (h-h’) 2+(l-l’)2 ( h, l , bm ) ( h’, l’, bm ) h Nine combinations 8-a a 8-a a |(hM )d -(h’M )d |<=1 (h’M )d*2a +(ac’a )d (hM )d (h’M )d (ac’a )d Hash function bm aca acb (ac’b )d (l’M )d (lM )d (l’M )d*2b +(ac’b )d |(lM )d -(l’M )d |<=1 8-b b 8-b b l

Proposed scheme(6/8)---Results of MSBP

Proposed scheme(7/8)-The Authentication procedures First stage: ( h, l , bm ) h 8-a a (hM )d Untampered Yes ? Hash function = bm aca acb a b No (lM )d Tampered 8-b b l

Proposed scheme(8/8)-The Authentication procedures Second stage:

Experiments(1/5)

Experiments(2/5) Results of the first and second stage detections. (a) 1st stage, |ac| = 2; (b) 1st stage, |ac| = 4; (c) 1st stage incorrect detection (|ac| = 4); (d) 2nd stage, |ac| = 2; (e) 2nd stage, |ac| = 4; (f) 2nd stage incorrect detection (|ac| = 4).

Experiments(3/5)

Experiments(4/5) Second stage detection results of each method. Lin et al.’s method; (b) Li et al.’s method; (c) Zhong et al.’s method; (d) Proposed method.

Experiments(5/5)

Conclusions Proposed the MSBs Perturbation Technique to optimize the AMBTC compressed image quality Provided the 8-bit authentication code for high tampering detection rate Adjustable the authentication codes' generation

Thanks for your listening!