資訊偽裝術 張真誠 講座教授 多媒體暨網路安全實驗室

Slides:



Advertisements
Similar presentations
A Secret Information Hiding Scheme Based on Switching Tree Coding Speaker: Chin-Chen Chang.
Advertisements

CSE 589 Applied Algorithms Spring 1999 Image Compression Vector Quantization Nearest Neighbor Search.
Side match vector quantization. 2 preface To compress image, using VQ, usual method is to encode blocks indepentently. However, there are many interblock.
Vector Quantization. 2 outline Introduction Two measurement : quality of image and bit rate Advantages of Vector Quantization over Scalar Quantization.
Fast vector quantization image coding by mean value predictive algorithm Authors: Yung-Gi Wu, Kuo-Lun Fan Source: Journal of Electronic Imaging 13(2),
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
1 An Efficient VQ-based Data Hiding Scheme Using Voronoi Clustering Authors:Ming-Ni Wu, Puu-An Juang, and Yu-Chiang Li.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
1 資訊隱藏技術之研究 The Study of Information Hiding Mechanisms 指導教授: Chang, Chin-Chen ( 張真誠 ) 研究生: Lu, Tzu-Chuen ( 呂慈純 ) Department of Computer Science and Information.
Palette Partition Based Data Hiding for Color Images Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, and Chien-Ting Huang Speaker : Yu-Chiang Li.
A Fast LBG Codebook Training Algorithm for Vector Quantization Presented by 蔡進義.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Advisor: Chang, Chin-Chen Student: Chen, Chang-Chu
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
基於龜殼魔術矩陣的隱寫技術及其衍生的研究問題
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
An Image Database Retrieval Scheme Based Upon Multivariate Analysis and Data Mining Presented by C.C. Chang Dept. of Computer Science and Information.
隱 像 術 張真誠 國立中正大學資訊工程研究所.
隱 像 術 張真誠 國立中正大學資訊工程研究所.
A Secret Information Hiding Scheme Based on Switching Tree Coding
Data Mining and Its Applications to Image Processing
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
Chapter 3 向量量化編碼法.
A New Image Compression Scheme Based on Locally Adaptive Coding
Chapter 3:Cryptography (16M)
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Information Steganography Using Magic Matrix
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Source :Journal of visual Communication and Image Representation
Chair Professor Chin-Chen Chang Feng Chia University
High-capacity image hiding scheme based on vector quantization
Advisor: Chin-Chen Chang1, 2 Student: Wen-Chuan Wu2
指導教授: Chang, Chin-Chen (張真誠)
A Data Hiding Scheme Based Upon Block Truncation Coding
第七章 資訊隱藏 張真誠 國立中正大學資訊工程研究所.
Hiding Data in a Color Palette Image with Hybrid Strategies
A Study of Digital Image Coding and Retrieving Techniques
Embedding Secrets Using Magic Matrices
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
An Innovative Steganographic Scheme Based on Vector Quantization
An Innovative Steganographic Scheme Based on Vector Quantization
第 四 章 VQ 加速運算與編碼表壓縮 4-.
Reversible Data Hiding Scheme Using Two Steganographic Images
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
Information Steganography Using Magic Matrix
Dynamic embedding strategy of VQ-based information hiding approach
Chair Professor Chin-Chen Chang Feng Chia University
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Hiding Information in VQ Index Tables with Reversibility
Information Hiding and Its Applications
Zhe-Ming Lu, Chun-He Liu, Dian-Guo Xu, Sheng-He Sun,
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
第 十 章 隱像術.
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
A Virtual Image Cryptosystem Based upon Vector Quantization
EarthTour Presentations
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
De-clustering and Its Application to Steganography
A New Method for Tamper Detection and Recovery
A Data Hiding Scheme Based Upon Block Truncation Coding
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Predictive Grayscale Image Coding Scheme Using VQ and BTC
Information Hiding Techniques Using Magic Matrix
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Steganographic Systems for Secret Messages
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
A New Image Compression Scheme Based on Locally Adaptive Coding
Presentation transcript:

資訊偽裝術 張真誠 講座教授 多媒體暨網路安全實驗室 http://www.cs.ccu.edu.tw/~ccc http://filter.cs.ccu.edu.tw

CCC

Vector Quantization (VQ) Concept Encoding and Decoding

Vector Quantization (VQ) Image compression technique Image w h Index table Vector Quantization Encoder

標準向量量化編碼法

Original image (512*512 pixels) 機密影像 機密影像 (64*64 pixels) Original image (512*512 pixels)

找出相近的Pairs

發現 d(CW0, CW8) > TH d(CW13, CW14) > TH 藏 1 藏 0 CW1 CW11 ,CW2 Unused CW0, CW8, CW13, CW14

4 4 Encode Unused CW0, CW8, CW13, CW14 Index Table Image Index Table

Secret message 1 0 1 0 1 0 0 1 0 1 1 1 1 0 0 1 1 1 1 1 1 1 1 Index Table Secret message CW1, CW2, CW4, CW5 CW6, CW7 CW11, CW3 CW15, CW10 CW12, CW9 藏 1 藏 0

Secret message: 1 0 1 0 1 0 0 1 0 1 1 1 1 0 0 1 1 1 1 1 1 1 1 Index Table Secret message CW1, CW2, CW4, CW5 CW6, CW7 CW11, CW3 CW15, CW10 CW12, CW9 藏 1 藏 0

Secret message: 1 0 1 0 1 0 0 1 0 1 1 1 1 0 0 1 1 1 1 1 1 1 1 Index Table Secret message

隱像術

隱像術 Introduction Virtual Image Cryptosystem Empirical Tests

Introduction Images have been widely used in our daily life. The image security has become an important issue in current computer world. Image cryptology is a very useful tool to defend the information security.

Apply the Traditional Cryptosystem on Images encryption decryption Original Image Cipher Image Decrypted Image

Problems The cipherimage is meaningless. Image size is huge. Image Camouflage(影像偽裝) Image size is huge. Image Compression(影像壓縮) The decrypted image containing a small distortion is usually acceptable. Vector Quantization(向量量化編碼法)

Virtual Image Cryptosystem Advantages: Camousflage Security Compression Acceleration Original Image Decrypted Image Virtual Image encryption decryption Cipher Image

Vector Quantization Encoder w VQ encoder h Codeword i k i ‧‧‧‧‧‧ ‧ ‧ Compressed Data (indices) Codebook Original Image

Vector Quantization Decoder w VQ decoder h Codeword i k i ‧‧‧‧‧‧ ‧ ‧ Compressed Data (indices) Codebook Decompressed image

The principle of the Virtual image cryptosystem Separate O into a set of vectors {O1,O2,O3,…,OnO}. Separate V into another set of vectors {V1,V2,V3,…,Vnv}. Let O be the original image. Let {V1,V2,V3,…,Vnv} be the codebook.

Encryption Randomly generate the transformed-origin G and the project-direction D. Project {V1,V2,V3,…,Vnv} to D based on G. Sort the projected results, and obtain {V’1,V’2,V’3,…,V’nv}.

Encryption (cont.) VQ encoder w h Codeword i i Relationship I k V’3 i ‧‧‧‧‧‧ ‧ ‧ Relationship I between O and V V’nV Codebook Virtual Image V Original Image O

Encryption (cont.) Encrypt w, h, no, G, and D into wc, hc, noc, Gc, and Dc by DES-like, respectively. Encrypt I into Ic, Where Ic=IXOR X and X is the bit-string containing G, D, G, D, … only. Hide wc, hc, noc, Gc, Dc and Ic into the pixels of V. Cipher Image Vc

Decryption VQ Decoder w h Codeword i i Relationship I between O and V k V’3 i ‧‧‧‧‧‧ ‧ ‧ Relationship I between O and V V’nV Codebook Virtual Image V Original Image O

Original Image Airplane Empirical Tests Test1: Original Image Airplane 512X512

Virtual Image Lena 256X256 Cipher Image Lena 256X256 PSNR=37.87 dB

Decrypted Image Airplane 512X512 PSNR=30.22 dB

Original Image Airplane Test2: Original Image Airplane 512X512

Virtual Image Lena 360X360 Cipher Image Lena 360X360 PSNR=45.13 dB

Decrypted Image Airplane 512X512 PSNR=30.22 dB

Original Image Peppers Test 3: Original Image Peppers 512X512

Virtual Image Lena 256X256 Cipher Image Lena 256X256 PSNR=37.60 dB

Decrypted Image Peppers 512X512 PSNR=29.91 dB

Original Image Peppers Test 4: Original Image Peppers 512X512

Virtual Image Boat 256X256 Cipher Image Boat 256X256 PSNR=37.74 dB

Decrypted Image Peppers 512X512 PSNR=30.31 dB

Security Analyses The camouflage is the first safeguard of our cryptosystem. Suppose the illegal users detect that the virtual image is fake: We have proven that none can break our cryptosystem by any attack.

Conclusions The advantages of our image cryptosystem: Camousflage Security Compression Acceleration This image cryptosystem is suitable for all applications of images; such as printer, scanner, and camera.