Authors: Jun Tian Speaker: J.H. Liu

Slides:



Advertisements
Similar presentations
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
Advertisements

1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A reversible data hiding method by histogram shifting in high quality medical images Author: Li-Chin Huang, Lin-Yu Tseng, Min-Shiang Hwang Source: The.
Reversible watermarking Wu Dan Introduction Difference expansion Histogram bin shifting.
Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Binary & Decimal numbers = 3* * *10 + 5*1 = 3* * * *10 0 Decimal system: Ten digits: 0,1,2,3,…,9 Example:
Consecutive Numbers Algebra I.
Reversible Image Watermarking Using Interpolation Technique Source: IEEE Transcation on Information Forensics and Security, Vol. 5, No. 1, March 2010 Authors:
Reversible Data Embedding Using Difference Expansion IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No. 8, Aug. 2003, page(s):
Objectives: 1.Be able to determine if an equation is in explicit form or implicit form. 2.Be able to find the slope of graph using implicit differentiation.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Reversible watermarking Wu Dan Introduction What?
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
Reversible Date Hiding Based on Histogram Modification of pixel Differences IEEE Transactions on circuits and systems for video technology, VOL. 19, NO.
1 Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform Source : IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 13, NO. 8,
A lossless data hiding scheme based on three- pixel block differences Ching-Chiuan Lin and Nien-Lin Hsueh Pattern Recognition, Vol. 41(4), April 2008 Pages.
CEC 220 Digital Circuit Design Binary Arithmetic & Negative Numbers Fri, Aug 28 CEC 220 Digital Circuit Design Slide 1 of 14.
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
1 Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform Source : IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 13, NO. 8,
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
Efficient Huffman Decoding Aggarwal, M. and Narayan, A., International Conference on Image Processing, vol. 1, pp. 936 – 939, 2000 Presenter :Yu-Cheng.
(k, n)-Image Reversible Data Hiding
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Source: IEEE Transactions on Circuits and Systems for Video Technology Vol.26.
Source: The Journal of Systems and Software, Volume 67, Issue 2, pp ,
Image camouflage by reversible image transformation
Consecutive Integer Problems
Reversible Data Hiding in JPEG Images using Ordered Embedding
Source : Signal Processing, Volume 133, April 2017, Pages
1. Be able to add and subtract rational functions.
Source :Journal of visual Communication and Image Representation
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
Source : Signal Processing, vol. 150, pp ,  September 2018
Yongjian Hu, Member, IEEE, Heung-Kyu Lee, Kaiying Chen, and Jianwei Li
A Restricted Region-based Data-hiding Scheme
Source: Information Sciences, 2018, accpeted.
Source : Signal Processing, vol. 126, pp ,  November 2016
Counting Elements of Disjoint Sets: The Addition Rule
Skewed Histogram Shifting for Reversible Data Hiding using a Pair of Extreme Predictions Source: IEEE Transactions on Circuits and Systems for Video Technology(
Source: IEEE Access, Vol. 6, Dec. 2017, pp
Sourse: IEEE Transactions on Circuits and Systems for Video Technology
Data hiding based Hamming code
Reversible Data Hiding in JPEG Images
Source : Journal of Visual Communication and Image Representation, vol
Skewed Histogram Shifting for Reversible Data Hiding using a Pair of Extreme Predictions Source: IEEE Transactions on Circuits and Systems for Video Technology(
Dynamic embedding strategy of VQ-based information hiding approach
Authors:Tae-Yun Chung; Min-Suk Hong; Young-Nam Oh;
Source : Journal of Visual Communication and Image Representation, vol
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
Chair Professor Chin-Chen Chang Feng Chia University
Data hiding method using image interpolation
EarthTour Presentations
Chair Professor Chin-Chen Chang Feng Chia University
Counting Elements of Disjoint Sets: The Addition Rule
Partial reversible data hiding scheme using (7, 4) hamming code
New Framework for Reversible Data Hiding in Encrypted Domain
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection Source: Multimedia.
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Sourse: Information Sciences, Vol. 494, pp , August 2019
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Dynamic improved pixel value ordering reversible data hiding
An Efficient Spatial Prediction-Based Image Compression Scheme
LSB matching revisited
Sourse: arXiv preprint, arXiv: , 2018 (Submit to IEEE Trans
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
A Restricted Region-based Data-hiding Scheme
Adopting secret sharing for reversible data hiding in encrypted images
Reversible data hiding in encrypted binary images by pixel prediction
Presentation transcript:

Authors: Jun Tian Speaker: J.H. Liu Reversible Data Embedding Using Difference Expansion IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No. 8, Aug. 2003, page(s): 890 -- 896 Authors: Jun Tian Speaker: J.H. Liu

Outline Data Embedding Conclusions Reversible Data Hiding Difference Expansion Expandable Changeable Difference Expansion Decoding Expandable decoding Changeable decoding Conclusions

Data Embedding Reversible data hiding 1

Difference Expansion One of data embedding methods Basic case: h = x – y l = (x + y) / 2 x=l + h /2 + LSB(h) y=l - h /2 Hint : There divide(/) is integer divide. For example, x/y meaning floor(x/y). +3 -2 x=206 y=201 average l= 203 2

Difference Expansion One of data embedding methods Basic case: h = x – y l = (x + y) / 2 x=l + h /2 + LSB(h) y=l - h /2 Hint : There divide(/) is integer divide. For example, x/y meaning floor(x/y). +3 -2 x=206 y=201 average l= 203 If h is odd, bit will lost with h /2. We must return it into x . 2

Difference Expansion - method location map L Case1. expandable : h’ = 2×h + b 1 h = x - y Case2. changeable : bitstream C 0 Case3. non-changeable 0 bitstream C = collection of LSBs(h) Expandable : |h’| = |2xh+b| ≦ min(2(255-l),2xl-1) Changeable : |h’| = |2x(h/2)+b| ≦ min(2(255-l),2xl-1) 3

Expandable 1st step: h’ = hx2 + secret bit (b) 2nd step: x’ = l + h’/2 + LSB(h’) y’ = l - h’/2 location map L = 1 l = 203 +6 -5 y’=198 x’=209 206 +3 -2 201 4

Expandable 1st step: h’ = hx2 + secret bit (b) 2nd step: x’ = l + h’/2 + LSB(h’) y’ = l - h’/2 location map L = 1 l = 203 b = 1 l=203 +6 -5 y’=198 x’=209 206 +3 -2 201 4

Expandable 1st step: h’ = hx2 + secret bit (b) 2nd step: x’ = l + h’/2 + LSB(h’) y’ = l - h’/2 location map L = 1 l = 203 b = 1 l=203 h’=5*2+1=11 +6 -5 y’=198 x’=209 206 +3 -2 201 4

Expandable 1st step: h’ = hx2 + secret bit (b) 2nd step: x’ = l + h’/2 + LSB(h’) y’ = l - h’/2 location map L = 1 l = 203 b = 1 l=203 h’=5*2+1=11 x’=203+11/2+11%2=209 y’=203-11/2=198 +6 -5 y’=198 x’=209 206 +3 -2 201 4

Changeable It is non-expandable x’, y’ will overflow or underflow with expandable method l = 223 +46 -46 y’=177 x’=292 246 +23 -23 200 5

Changeable It is non-expandable 1st step: h’ = (h/2)x2 + b 2nd step: lost bit(c) = LSB(h) 3rd step: x’ = l + h’/2 + LSB(h’) y’ = l - h’/2 location map L = 0 +23 -23 x=246 y=200 l = 223 5

Changeable It is non-expandable 1st step: h’ = (h/2)x2 + b 2nd step: lost bit(c) = LSB(h) 3rd step: x’ = l + h’/2 + LSB(h’) y’ = l - h’/2 location map L = 0 +23 -23 x=246 y=200 l = 223 There we will lost the LSB of h. 5

Changeable It is non-expandable 1st step: h’ = (h/2)x2 + b 2nd step: lost bit(c) = LSB(h) 3rd step: x’ = l + h’/2 + LSB(h’) y’ = l - h’/2 location map L = 0 +23 -23 x=246 y=200 l = 223 There we will lost the LSB of h. We record the LSBs of h at bitstream C. 5

Changeable It is non-expandable 1st step: h’ = (h/2)x2 + b 2nd step: lost bit(c) = LSB(h) 3rd step: x’ = l + h’/2 + LSB(h’) y’ = l - h’/2 location map L = 0 +23 -23 x=246 y=200 l = 223 There we will lost the LSB of h. We record the LSBs of h at bitstream C. +24 -23 x’=247 y’=200 5

Expandable decoding 1st step: get h’ = x’-y’ 2nd step: get b = LSB(h’) 3rd step: get h = h’/2 4th step: get x = l + h/2 + LSB(h) y = l - h/2 +6 -5 x‘= 209 y‘= 198 l = 203 6

Expandable decoding 1st step: get h’ = x’-y’ 2nd step: get b = LSB(h’) 3rd step: get h = h’/2 4th step: get x = l + h/2 + LSB(h) y = l - h/2 +6 -5 x’= 209 y‘= 198 l=(209+198)/2=203 h’=209-198=11 l = 203 6

Expandable decoding 1st step: get h’ = x’-y’ 2nd step: get b = LSB(h’) 3rd step: get h = h’/2 4th step: get x = l + h/2 + LSB(h) y = l - h/2 +6 -5 x‘= 209 y‘= 198 l=(209+198)/2=203 h’=209-198=11 b=11%2=1 l = 203 6

Expandable decoding 1st step: get h’ = x’-y’ 2nd step: get b = LSB(h’) 3rd step: get h = h’/2 4th step: get x = l + h/2 + LSB(h) y = l - h/2 +6 -5 x‘= 209 y‘= 198 l=(209+198)/2=203 h’=209-198=11 b=11%2=1 h=11/2=5 l = 203 6

Expandable decoding 1st step: get h’ = x’-y’ 2nd step: get b = LSB(h’) 3rd step: get h = h’/2 4th step: get x = l + h/2 + LSB(h) y = l - h/2 +6 -5 x’= 209 y‘= 198 l=(209+198)/2=203 h’=209-198=11 b=11%2=1 h=11/2=5 x=203+5/2+5%2 =203+2+1=206 y=203-5/2=201 l = 203 6

Expandable decoding 1st step: get h’ = x’-y’ 2nd step: get b = LSB(h’) 3rd step: get h = h’/2 4th step: get x = l + h/2 + LSB(h) y = l - h/2 +6 -5 x‘= 209 y‘= 198 l=(209+198)/2=203 h’=209-198=11 b=11%2=1 h=11/2=5 x=203+5/2+5%2 =203+2+1=206 y=203-5/2=201 l = 203 +3 -2 x = 206 y = 201 l = 203 6

Expandable decoding 1st step: get h’ = x’-y’ 2nd step: get b = LSB(h’) 3rd step: get h = h’/2 4th step: get x = l + h/2 + LSB(h) y = l - h/2 +6 -5 x‘= 209 y‘= 198 l=(209+198)/2=203 h’=209-198=11 b=11%2=1 h=11/2=5 x=203+5/2+5%2 =203+2+1=206 y=203-5/2=201 l = 203 Note: average l is never changed. +3 -2 x = 206 y = 201 l = 203 6

Changeable decoding 1st step: get h’ = x’ - y’ 2nd step: get b = LSB(h’) 3rd step: get h = h’- b + bitstream(c) 4th step: get x = l + h/2 + LSB(h) y = l - h/2 +24 -23 x’ = 247 y’ = 200 l = 223 7

Changeable decoding 1st step: get h’ = x’ - y’ 2nd step: get b = LSB(h’) 3rd step: get h = h’- b + bitstream(c) 4th step: get x = l + h/2 + LSB(h) y = l - h/2 +24 -23 x’ = 247 y’ = 200 l = 223 l=(247+200)/2=223 h’=247-200=47 7

Changeable decoding 1st step: get h’ = x’ - y’ 2nd step: get b = LSB(h’) 3rd step: get h = h’- b + bitstream(c) 4th step: get x = l + h/2 + LSB(h) y = l - h/2 +24 -23 x’ = 247 y’ = 200 l = 223 l=(247+200)/2=223 h’=247-200=47 b=47%2=1 7

Changeable decoding 1st step: get h’ = x’ - y’ 2nd step: get b = LSB(h’) 3rd step: get h = h’- b + bitstream(c) 4th step: get x = l + h/2 + LSB(h) y = l - h/2 +24 -23 x’ = 247 y’ = 200 l = 223 l=(247+200)/2=223 h’=247-200=47 b=47%2=1 h=47-1+0=46 7

Changeable decoding 1st step: get h’ = x’ - y’ 2nd step: get b = LSB(h’) 3rd step: get h = h’- b + bitstream(c) 4th step: get x = l + h/2 + LSB(h) y = l - h/2 +24 -23 x’ = 247 y’ = 200 l = 223 l=(247+200)/2=223 h’=247-200=47 b=47%2=1 h=47-1+0=46 x=223+(46/2)+46%2 =223+23+0=246 y=223-46/2=200 7

Changeable decoding 1st step: get h’ = x’ - y’ 2nd step: get b = LSB(h’) 3rd step: get h = h’- b + bitstream(c) 4th step: get x = l + h/2 + LSB(h) y = l - h/2 +24 -23 x’ = 247 y’ = 200 l = 223 l=(247+200)/2=223 h’=247-200=47 b=47%2=1 h=47-1+0=46 x=223+(46/2)+46%2 =223+23+0=246 y=223-46/2=200 +23 -23 x=246 y=200 l = 223 7

Conclusions Simple and efficient reversible embedding method. The method of location map L is not good enough. We may improve the method of location map anywise. The case of changeable is a kind of useless. 8