LSB matching revisited

Slides:



Advertisements
Similar presentations
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
Advertisements

1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
1 Hiding Data in Images by Simple LSB Substitution Source: Pattern Recognition, Vol. 37, pp , 2004 Authors: Chi-Kwong Chan and L.M. Cheng Speaker:
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP Yongfeng Huang;Rui Miao Department of Electronic Engineering,
Reversible Date Hiding Based on Histogram Modification of pixel Differences IEEE Transactions on circuits and systems for video technology, VOL. 19, NO.
1 Adaptive Data Hiding in Palette images by Color Ordering and Mapping With Security Protection Authors: Chih-Hsuan Tzeng, Zhi-Fang Yang, and Wen-Hsiang.
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
1 LSB Matching Revisited Source: IEEE Signal Processing Letters (Accepted for future publication) Authors: Jarno Mielikainen Speaker: Chia-Chun Wu ( 吳佳駿.
人力資源報告 Image and Signal Processing 1 Steganography Using Sudoku Revisited Wien Hong, Tung-Shou Chen, Chih-Wei Shiu Department of Information Management,
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
A Novel Full-Search Vector Quantization Algorithm Based on the Law of Cosines Author:Jarno Mielikainen, Student Member, IEEE Source:IEEE SIGNAL.
Source: IEEE Signal Processing Letters (Accepted)2016
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
A steganographic method for digital images using side match
Face recognition using improved local texture pattern
Advisor: Chin-Chen Chang1, 2 Student: Yi-Hui Chen2
Image camouflage by reversible image transformation
Source : Signal Processing, Volume 133, April 2017, Pages
Centrality Bias Measure for High Density QR Code Module Recognition
Reversible data hiding scheme based on significant-bit-difference expansion Sourse: IET Image Processing ( Volume: 11, Issue: 11, ), Pages 1002.
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images Source: Symmetry, vol. 8, no. 6, June.
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
A Color Image Hidden in a
A Restricted Region-based Data-hiding Scheme
Source: Pattern Recognition, Vol. 38, Issue 11, December 2005, pp
Source : Signal Processing, vol. 126, pp ,  November 2016
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Improved joint reversible data hiding in encrypted images
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
Data hiding based Hamming code
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
A High Embedding Capacity Approach to Adaptive Steganography
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Source: IEEE Signal Processing Letters, Vol. 14, No. 3, Mar. 2007, pp
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
Chair Professor Chin-Chen Chang Feng Chia University
A new chaotic algorithm for image encryption
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Steganography in halftone images: conjugate error diffusion
Data hiding method using image interpolation
EarthTour Presentations
Chair Professor Chin-Chen Chang Feng Chia University
Partial reversible data hiding scheme using (7, 4) hamming code
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Blind Reversible Authentication Based on PEE and CS Reconstruction
Source: IEICE-Transactions on Info and Systems
Secret image sharing with steganography and authentication
Using Association Rules as Texture features
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Sourse: Information Sciences, Vol. 494, pp , August 2019
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Dynamic improved pixel value ordering reversible data hiding
Source : Digital Signal Processing. Vol. 73, pp , Feb
Improvements of Image Sharing with Steganography and Authentication
Sourse: arXiv preprint, arXiv: , 2018 (Submit to IEEE Trans
Lossless Data Hiding in the Spatial Domain for High Quality Images
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
Source: Circuits and Systems for Video Technology,
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Reversible data hiding in encrypted binary images by pixel prediction
Presentation transcript:

LSB matching revisited Source: IEEE Signal Processing Letters, vol. 13, no. 5, May 2006, pp. 285-287. Authors: Jarno Mielikainen Speaker: Wei-Liang Tai

Outline Steganography LSB Replacement LSB Matching The Proposed Method Experimental Results Conclusions

Steganography Escape Alice Bob Warden

LSB Replacement 1 mi mi+1 120 121 01111000 01111001 xi xi+1 121 Cover image Secret Message 1 mi mi+1 120 121 01111000 01111001 xi xi+1 121 01111001 yi yi+1

LSB Matching 1 mi mi+1 120 121 01111000 01111001 xi xi+1 yi yi+1 Cover image Secret Message 1 mi mi+1 120 121 01111000 01111001 xi xi+1 120+1=121 (01111001) Or 120-1=119 (01110111) 121 (01111001) yi yi+1

The Proposed Method (1/5) Binary function Property 1: Property 2:

The Proposed Method (2/5) 120 130 01111000 10000010 xi xi+1 120 130 mi mi+1 yi yi+1

The Proposed Method (3/5) 120 130 01111000 10000010 xi xi+1 1 120 131 or 129 mi mi+1 yi yi+1

The Proposed Method (4/5) 120 130 01111000 10000010 xi xi+1 1 mi mi+1 121 130 yi yi+1

The Proposed Method (5/5) 120 130 01111000 10000010 xi xi+1 1 mi mi+1 119 130 yi yi+1

Experimental Results

Conclusions The number of changed pixel values is smaller It is immune against steganalysis