Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University

Slides:



Advertisements
Similar presentations
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
Advertisements

A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan.
Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
IMAGE COMPRESSION USING BTC Presented By: Akash Agrawal Guided By: Prof.R.Welekar.
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
A lossless data hiding scheme based on three- pixel block differences Ching-Chiuan Lin and Nien-Lin Hsueh Pattern Recognition, Vol. 41(4), April 2008 Pages.
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
Hamming Code In 1950s: invented by Richard Hamming
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
(k, n)-Image Reversible Data Hiding
Image camouflage by reversible image transformation
Reversible Data Hiding in JPEG Images using Ordered Embedding
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Source :Journal of visual Communication and Image Representation
Chair Professor Chin-Chen Chang Feng Chia University
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
A Data Hiding Scheme Based Upon Block Truncation Coding
Hiding Data in a Color Palette Image with Hybrid Strategies
A Study of Digital Image Coding and Retrieving Techniques
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
A Restricted Region-based Data-hiding Scheme
Image Coding and Compression
An efficient reversible data hiding method for AMBTC compressed images
Some Novel Steganographic Methods for Digital Images
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding
Reversible Data Hiding Scheme Using Two Steganographic Images
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Source: IEEE Access, Vol. 6, Dec. 2017, pp
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
Data hiding method using image interpolation
Dynamic embedding strategy of VQ-based information hiding approach
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Hiding Information in VQ Index Tables with Reversibility
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Data hiding method using image interpolation
Chair Professor Chin-Chen Chang Feng Chia University
Partial reversible data hiding scheme using (7, 4) hamming code
Novel Multiple Spatial Watermarking Technique in Color Images
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection Source: Multimedia.
Scalable light field coding using weighted binary images
A Data Hiding Scheme Based Upon Block Truncation Coding
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Department of Computer Science, University of Central Florida ,Orlando
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Lossless Data Hiding in the Spatial Domain for High Quality Images
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
Presentation transcript:

Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University Hiding Secret Image in Absolute Moment Block Truncation Code By Using a Block-Selection Scheme Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University

AMBTC(Absolute moment block truncation coding) Divide the image into 4 ×4, Calculate the block average : = Calculate the absolute value of the retained momentum of the block : α Calculate the high and low mean value of the reconstruction order: l = h = Average=100 High mean value = 160; Low mean value = 64

The (7, 4) Hamming code to hide secret data into the AMBTC image An image vector of 7 digits can be used to hide 3 digits of secret data by change a single digit. The parity check matrix H is multiplied with the image vector to obtain a 3 digits vector. This vector is then taking exclusive-OR with the 3 digits secret data to get the 3 digits syndrome. This syndrome indicates which digit in the image vector to be change. Fig. 1 The coding process of the (7, 4) Hamming code Fig. 2 The decoding process of the (7, 4) Hamming code

The Block Selection Scheme The cover image Lena , the image size is 512x512, the use of AMBTC calculated average difference value of the high and low average coding block, resulting in a 128x128 difference blocks to difference compressed image histogram . Quantity Lena image using AMBTC Difference of value Calculate block difference histogram

Select image dithering Try to embed the secret image into the cover image. Actually, the size of the secret image is 256 × 256, because the size of the corresponding cover image is 512 × 512. In order to increase the embedding capacity, we quantize the grayscale secret image into a binary image. Dithering is applied to enhance the visual quality of binary images. Binary images using dithering technique

Block Selection The embedded binary image: 256x256 bits Hiding capacity of a 4x4 image block: 3x2 bits The total number of blocks required: (256x256) / (3x2) = 10923 blocks The total number of blocks in the cover image: (512/4)x(512/4)=128x128=16384 blocks Hiding Efficiency: 10923/16384 = 67%

Block Selection Select the candidate blocks in the increasing order of difference value until we get 10923 accumulated blocks in total. The final value of in-block difference is the threshold Bth of selection. In most cases, there are multiple candidates with the same threshold value Bth. For the candidate blocks at the threshold difference, we select them in the raster scan order on the block array until we get the enough accumulated number and record the coordinates (bx, by) of the final block.

Secret image embedding and extraction To hide the secret image, the coordinates of the final block (bx, by) are first encoded into two binary 8-bits, and two zeros are added to form two 9-bits elements and merge into one 18-bits. The 18-bits is embedded in the first three reserved blocks in the cover image. A secret image of size 256x256 is arranged to form a number of bits of 65536. To embed 10923 = 65538/6 blocks, two 0 bits will have to be attached. Each image block is divided into an upper group and a lower group Incoming seven pixels in the upper and lower groups

Secret image embedding and extraction (continued) Extraction process: The secret image extracting process is in the reverse order. We decode the first three blocks to find the coordinates of the final block (bx, by) and find its in-block difference by using its high-value and low value. Then, we scan the blocks of the whole cover image to find the blocks that meet the embedding criterion and decode the secret data.

The Experimental Results In our experiment, the secret image of size 256x256 is shown in Fig. 1. To condense the information required to send, it is quantized to binary image and enhanced by the dithering technique. The resulting image to transmit is also shown in the figure. To compare with other methods, the cover image is a Lena image of size 512x512. The AMBTC compressed image is shown in Fig2. The stego images produced by using the Chang’s method and our method are also given. . (a) AMBTC compressed image (b) The Chang’s stego image Fig. 1 (c) The proposed stego image Fig2

The Experimental Results(continued) Test both algorithms on the other images(Fig. 3). The PSNR for different test images are given in Table I. In all test images, the PSNR of the stego images produced by our algorithm are very close to the cover images. Fig.3

The Experimental Results(continued) In addition, the secret image is attempted as a color image, and the hidden image RGB is separately subjected to the dithering technique, as shown in Fig.4. The cover image is a color Lena image with a size of 512x512 and its hidden color image is as shown in Figure.5. The comparison result is shown in Table 2. (a) AMBTC compressed image (b) The Chang’s stego image (c) The proposed stego image Fig.4 Fig.5

Conclusions In this paper, we try to embed a secret image into a AMBTC compressed cover image by using the (7,4) Hamming code method. The secret image is quantized and dithered to get a condensed image with an acceptable visual quality. Then, we leverage 67% of the cover image’s hiding capacity to embed the secret image. The proposed block selection scheme successfully improved the PSNR value of the stego image and therefore could hardly be detected. Experiments show that our method works equally well in the color image application.

References [1]Edward J. Delp and O. Robert Mitchell, “Image Compression Using Block Truncation Coding,” IEEE Trans. Communications, pp. 1335-1342, Vol. COM-27, No. 9, SEPTEMBER 1979. [2]Maximo D. Lema and O. Robert Mitchell, “Absolute Moment Block Truncation Coding and Its Application to Color Images,” IEEE Trans. Communications, pp. 1148-1157, Vol. COM-32, No. 10, OCTOBER 1984. [3]J.C. Chuang and C.C. Chang, “Using a simple and fast image compression algorithm to hide secret information,” International Journal of Computers & Applications, Vol. 28, No. 4, pp. 329-333, 2006. [4]C.C. Chang, Y.J. Liu, and S.T. Nguyen, Hiding Secret Information in Block Truncation Code Using Dynamic Programming Strategy, Proceedings of 6th International Graphic and Image Processing, vol. 9443, Beijing, China, 2014. [S]. Lin and D. J. Costello, Jr., Error Control Coding, Fundamentals and Applications, Englewood Cliffs, NJ: Prentice-Hall, 1983. [6] McAndrew, Wang, and Tseng, Introduction to Digital Image Processing with MATLAB, Thomson Learning, 2004.