Source: IEEE Access. (2019/05/13). DOI: /ACCESS

Slides:



Advertisements
Similar presentations
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Advertisements

Reversible Data Hiding Based on Two-Dimensional Prediction Errors
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan.
A reversible data hiding method by histogram shifting in high quality medical images Author: Li-Chin Huang, Lin-Yu Tseng, Min-Shiang Hwang Source: The.
Reversible watermarking Wu Dan Introduction Difference expansion Histogram bin shifting.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Improved PVO-based reversible data hiding Source: Digital Signal Processing, 2014 Authors: Fei Peng, Xiaolong Li,ng Reporter: Min-Hao Wu.
Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
Reversible Image Watermarking Using Interpolation Technique Source: IEEE Transcation on Information Forensics and Security, Vol. 5, No. 1, March 2010 Authors:
Optimal Histogram-pair and Prediction-error Based Image Reversible Data Hiding 1 Computer Science, Tongji University, Shanghai, China 2 ECE, New Jersey.
Lossless Watermarking for Image Authentication: A New Framework and an Implementation IEEE TRANSACTIONS ON IMAGE PROCESSING APRIL 2006 C.M.Chen.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
Reversible watermarking Wu Dan Introduction What?
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
Reversible Date Hiding Based on Histogram Modification of pixel Differences IEEE Transactions on circuits and systems for video technology, VOL. 19, NO.
Palette Partition Based Data Hiding for Color Images Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, and Chien-Ting Huang Speaker : Yu-Chiang Li.
A lossless data hiding scheme based on three- pixel block differences Ching-Chiuan Lin and Nien-Lin Hsueh Pattern Recognition, Vol. 41(4), April 2008 Pages.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
Source: IEEE Signal Processing Letters (Accepted)2016
(k, n)-Image Reversible Data Hiding
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Source: IEEE Transactions on Circuits and Systems for Video Technology Vol.26.
Reversible Data Hiding in JPEG Images using Ordered Embedding
Mean value based reversible data hiding in encrypted images
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
Separable and error-free reversible data hiding in encrypted images
Yongjian Hu, Member, IEEE, Heung-Kyu Lee, Kaiying Chen, and Jianwei Li
A Restricted Region-based Data-hiding Scheme
Source: Information Sciences, 2018, accpeted.
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Improved joint reversible data hiding in encrypted images
Reversible Data Hiding
Reversible Data Hiding Scheme Using Two Steganographic Images
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
Source:. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL
Source: IEEE Access, Vol. 6, Dec. 2017, pp
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Data hiding method using image interpolation
Sourse: Multimedia Tools and Applications, 2018, pp 1–17
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
Data hiding method using image interpolation
Partial reversible data hiding scheme using (7, 4) hamming code
New Framework for Reversible Data Hiding in Encrypted Domain
Novel Multiple Spatial Watermarking Technique in Color Images
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
Source: IEICE-Transactions on Info and Systems
Secret Image Sharing Based on Encrypted Pixels
Information Protection and Recovery with Reversible Data Hiding
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Sourse: Information Sciences, Vol. 494, pp , August 2019
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Dynamic improved pixel value ordering reversible data hiding
Sourse: arXiv preprint, arXiv: , 2018 (Submit to IEEE Trans
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Adopting secret sharing for reversible data hiding in encrypted images
Reversible data hiding in encrypted binary images by pixel prediction
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

High-Capacity Reversible Data Hiding in Encrypted Images by Bit Plane Partition and MSB Prediction Source: IEEE Access. (2019/05/13). DOI: 10.1109/ACCESS.2019.2916355. Authors:HAO-TIAN WU 1, (Senior Member, IEEE), ZHIYUAN YANG1,YIU-MING CHEUNG 2, (Fellow, IEEE), LINGLING XU1, AND SHAOHUA TANG1, (Member, IEEE) Speaker:Lin Li (李琳) Date: 2019/07/04

Outline Introduction Related works Proposed scheme Experimental results Conclusions

Introduction (1/3) 1.The growth of cloud-based applications 2.Data outsourcing is one of the fields where the users are dependent on cloud for processing and storage. 3.Security concern of the data, owners using encryption for the cover image. 4.For the sake of management (using timestamp, tagging, image source information, etc.) of the encrypted media, 5.The data hider embeds some additional data into the encrypted image. 6.To achieve security and reversibility, the technique of RDH is used in the encrypted.

Introduction (2/3)

Introduction (3/3) A flowchart of the proposed scheme applied with a stream cipher.

Related Works --RDH based on Bit Plane Partition prediction Method (1/4) ns nl nr ng Embed: Extract and Recover:

Related Works --RDH based on Bit Plane Partition prediction Method (2/4) [9] H.-T. Wu and J. Huang, ‘‘Reversible image watermarking on prediction errors by efficient histogram modification,’’ Signal Process., vol. 92, no. 12, pp. 3000–3009, Dec. 2012.

Related Works --RDH based on Bit Plane Partition prediction Method (3/4) Overflow or underflow: :

Related Works --RDH based on Bit Plane Partition prediction Method (4/4) PSNR: Decrease in PSNR value: Efficiency:

Related Works --The MSB Prediction Method (1/4) predictor Computed from the previous scanned neighbors Principle: prediction value is closed to original pixel value than the inverse pixel value [28] P. Puteaux and W. Puech, ‘‘An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images,’’ IEEE Trans. Inf. Forensics Security, vol. 13, no. 7, pp. 1670–1681, Jul. 2018.

Related Works --The MSB Prediction Method (2/4) ... 78 65 154 50 55 ... 78 64 154 50 55 Binary map ... … 1

Related Works --The MSB Prediction Method (3/4) One bit of message after encrypted Embedding into available pixel Message after encrypted: …01110… … 01100101 11110000 10110111 10001100 00010101 ...

Related Works --The MSB Prediction Method (4/4) High-capacity reversible data hiding approach with embedded of prediction errors Prediction error Original image I Error location binary map Modify and Flag the binary map Beginning flag End flag MSB in the image

Proposed Scheme (1/3) Does not introduce great visual distortions (b) Have less correlations between neighboring pixels. Illustration of bit plane partition on test image “Lena”. (a) The 8-bit image by setting the last two bit planes to zeros. (b) Image generated by multiplying the last two bit planes with 64.

Proposed Scheme (2/3) Divide I into two parts: the less significant bit planes and the more significant bit planes. Embed the bit values in I1 and the compressed location map and other auxiliary data into I2 by adopting the RDH algorithm in [9]. [9] H.-T. Wu and J. Huang, ‘‘Reversible image watermarking on prediction errors by efficient histogram modification,’’ Signal Process., vol. 92, no. 12, pp. 3000–3009, Dec. 2012. Bit plane partition of a grayscale image with the size of M × N.

Proposed Scheme (3/3) a). Predict the pixels in white with those in black. b). Change the prediction error to embed data. c). Apply the four prediction in succession. d). Modify a pixel at most by ±3. e). Pre-calculated and compressed a binary location map with the Lossless JBIG2 to prevent the overflow and underflow problem.

Experimental Result (1/6)

Experimental Result (2/6)

Experimental Result (3/6)

Experimental Result (4/6)

Experimental Result (5/6)

Experimental Result (6/6)

Conclusions The more significant bit planes are used to hide the data in the less significant bit planes. The redundancy in plain-text images is better utilized. Higher embedding capacity and better image quality can be simultaneously obtained. The MSB prediction method has been employed to further increase the embedding capacity. Hiding capacity outperforms the mentioned state-of-the-art approaches.

Thanks for your listening!