Source : Digital Signal Processing. Vol. 73, pp , Feb

Slides:



Advertisements
Similar presentations
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
Advertisements

1 Self-Recovery Fragile Watermarking Scheme with Variable Watermark Payload Fan Chen, Hong-Jie He, Yaoran Huo, Hongxia Wang Southwest Jiaotong University,
Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery Source: Pattern Recognition, Vol. 41, Issue 2,
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
(r, n)-Threshold Image Secret Sharing Methods with Small Shadow Images Xiaofeng Wang, Zhen Li, Xiaoni Zhang, Shangping Wang Xi'an University of Technology,
Recover the tampered image based on VQ indexing Source: Signal Processing, Volume 90, Issue 1, Jan. 2010, pp Authors: Chun-Wei Yang and Jau-Ji.
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Phen-Lan Lin, Chung-Kai Hsieh, and Po-Whei Huang
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
1 Security of fragile watermarking scheme for image authentication Authors: K. C. Liao, W. B. Lee, and C. W. Liao Source: The Imaging Science Journal,
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
Watermarking Scheme Capable of Resisting Sensitivity Attack
Source: The Journal of Systems and Software, Volume 67, Issue 2, pp ,
Advisor: Chin-Chen Chang1, 2 Student: Yi-Hui Chen2
Image camouflage by reversible image transformation
Reversible Data Hiding in JPEG Images using Ordered Embedding
Source : Signal Processing, Volume 133, April 2017, Pages
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Mean value based reversible data hiding in encrypted images
Source : Signal Processing, vol. 150, pp ,  September 2018
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images Source: Symmetry, vol. 8, no. 6, June.
Separable and error-free reversible data hiding in encrypted images
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
Source: Pattern Recognition, Vol. 38, Issue 11, December 2005, pp
Source: Information Sciences, 2018, accpeted.
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Improved joint reversible data hiding in encrypted images
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Source: Signal Processing, Vol. 125, pp , August 2016.
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
Source : Journal of Visual Communication and Image Representation, vol
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Dynamic embedding strategy of VQ-based information hiding approach
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Source : Journal of Visual Communication and Image Representation, vol
Sourse: Multimedia Tools and Applications, 2018, pp 1–17
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
Chair Professor Chin-Chen Chang Feng Chia University
A new chaotic algorithm for image encryption
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Digital Watermarking for Image Authentication with Localization
Data hiding method using image interpolation
Chair Professor Chin-Chen Chang Feng Chia University
Partial reversible data hiding scheme using (7, 4) hamming code
New Framework for Reversible Data Hiding in Encrypted Domain
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
Blind Reversible Authentication Based on PEE and CS Reconstruction
Ming-Shi Wang *, Wei-Che Chen 11 November 2006 present: 沈雅楓
An imperceptible spatial domain color image watermarking scheme
Sourse: Information Sciences, Vol. 494, pp , August 2019
Dynamic improved pixel value ordering reversible data hiding
LSB matching revisited
Sourse: arXiv preprint, arXiv: , 2018 (Submit to IEEE Trans
Lossless Data Hiding in the Spatial Domain for High Quality Images
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
A Quadratic-Residue-based Fragile Watermarking Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Reversible data hiding in encrypted binary images by pixel prediction
Presentation transcript:

Fast fragile watermark embedding and iterative mechanism with high self-restoration performance Source : Digital Signal Processing. Vol. 73, pp. 83-92, Feb. 2018. Authors : Sergio Bravo-Solorio, Felix Calderon, Chang-Tsun Li, Asoke K. Nandi. Speaker : Si-Liang He Date : 2019/4/25 山東大學

Outline Introduction Related work Proposed scheme Experimental results Conclusions

+ → → Introduction Authentication code Recovery information Detection & Recovery →

Related work - Tornado code 𝑐 1 , 𝑐 2 , 𝑐 3 , 𝑐 4 , 𝑐 5 = 10100 = 1 0 1 0 0 𝑐 1 + 𝑐 3 + 𝑐 5 𝑚𝑜𝑑 2=0 𝑀 1 × 1 0 1 0 0 = 0 0 1 𝑀 1 = 1 0 0 0 1 0 1 0 1 0 1 1 1 1 1 𝑀 2 × 1 0 1 0 0 = 1 1 1 𝑀 2 = 0 1 1 0 0 1 1 0 1 0 1 0 1 1 0 (Modulo-2)

Related work - Tornado code 𝑐 5 =0

Proposed scheme flowchart

Proposed scheme – embedding Authentication bits 32 bits = row num + column num + NumofBlock ⊕ 32 bits = hash(reference bits) L = 160 & block size = 8×8: 3 LSB = 8*8*3 = 192 bits 160 reference bits + 32 authentication bits

Experimental results

Experimental results [24] X. Zhang, S. Wang, Z. Qian, G. Feng, “Reference sharing mechanism for watermark self-embedding,” IEEE Trans. Image Process, Vol. 20, Issue. 2, pp. 485-495, Feb. 2011.

Experimental results [6] C. Qin, P. Ji, X. Zhang, J. Dong, J. Wang, “Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy,” Signal Process, Vol. 138, pp. 280-293, Sep. 2017. [18] C. Qin, H. Wang, X. Zhang, X. Sun, “Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode,” Information Sciences, Vol. 373, pp. 233-250, Dec. 2016 [23] X. Zhang, S. Wang, Z. Qian, G. Feng, “Reference sharing mechanism for watermark self-embedding,” IEEE Trans. Image Process, Vol. 20, Issue. 2, pp. 485-495, Feb. 2011.

Conclusions The image quality of the restored image can be completely restored to the watermarked image. Average execution time is faster than other schemes.