High-capacity Reversible Data-hiding for LZW Codes

Slides:



Advertisements
Similar presentations
Four score and seven years ago our fathers brought forth on this continent, a new nation, conceived in Liberty, and dedicated to the proposition that all.
Advertisements

In Pictures The Gettysburg Address Photo by Tim EvansonTim Evanson.
What should be done with 7,000+ deceased soldiers after a battle?
American History Museum Walkthrough. Bombing of Fort McHenry during the War of 1812.
1861 – 1865 Timeline & Photo Presentation
Gettysburg Address Four score and seven years ago, our fathers brought forth upon this continent a new nation: conceived in liberty, and dedicated to the.
The Gettysburg Address Four score and seven years ago our fathers brought forth on this continent, a new nation, conceived in Liberty, and dedicated.
BIRE Pre-Meeting May 16,  Develop shared understanding of Tier I instruction for grade-level reading  Work through one example of how to work.
Lempel-Ziv-Welch (LZW) Compression Algorithm
Richardson 3040 PowerPoint Rules Rule 1 Everything should enhance the content of the presentation Regions of Tennessee.
The Civil War: The North Advances. 3.Civil War and Reconstruction a.Identify and analyze the technological, social, and strategic aspects of the Civil.
Type on Slide Slides. IgneousSedimentaryMetamorphic.
By Karissa Lynn Montag The Lincoln Museum is Located in Springfield Illinois. In one room there is Lincoln’s house and you can dress up as Lincoln or.
Improving Your Communication Skills & Speaking in Turbulent Situations.
Links in XHTML Please use speaker notes for additional information!
LINCOLN’S GETTYSBURG ADDRESS Lincoln gave the battle a higher meaning. The war has a purpose. These men died to make Americans live up to their own beliefs-
The Call For Change Supplemental Information 20. MCS Intervention Strategy Repeated Reading Readers’ Theater 1. Choose a script. Choose a prepared script,
Visual Aids Communication delivered over multiple channels is more efficient than communication over a single channel –More likely the whole message.
15,000 spectators were in attendance The Gettysburg Address.
15,000 spectators were in attendance The Gettysburg Address.
Lincoln’s Gettysburg Address Given November 19, 1863 on the battlefield near Gettysburg, Pennsylvania, U.S.A.
Battle Hymn for Gettysburg Music adapted/arr. by Teresa Jennings Music K-8, Vol.19, Num.3 © 2009 Plank Road Publishing, Inc. All Rights Reserved- used.
Civil War, pt3. Andersonville Prison Libby Prison.
Abraham Lincoln He was born on February 12, 1809 in Hodgenville Kentucky. He is the 16 th President of the United States of America He was in office from.
Last lecture: Point Estimation A point estimator is function of the observations in a random sample which is used to estimate an unknown parameter. A point.
“EVERY SPEECH IS A RHYMELESS, METERLESS VERSE.” -WINSTON CHURCHILL Power Poetry.
1/9/14 O CO: Evaluate Lincoln’s efforts to abolish slavery and to end the Civil War. O QW: O Read and analyze the quotes from Lincoln’s letters.
The Civil War Antietam Gettysburg. What does Secession mean? What was Fort Sumter? Who took control of it? Who was the confederate commander at the Battle.
The Gettysburg Address By Zoe and Bryony. Information Abraham Lincoln wrote and read the famous speech It was spoken at the dedication of the soldiers'
Gettysburg Picture Analysis- Gallery Walk Civil War Picture Analysis- With a partner- Use post-it notes to analyze and annotate the photos. Put the post-its.
People Cannot Choose a Representative Sample Carla L. Hill Marist College.
% The percent sign is computer language for: Get ready, here comes something you want or OK that is all you needed A “%” should be at the beginning and.
Computer Skills and Applications 8th Grade
Lempel-Ziv-Welch (LZW) Compression Algorithm
Presentation Purpose 6.01 Understand business uses of presentation software and methods of distribution Presentation Purpose.
Did Lincoln free the slaves? Or did the slaves free themselves?
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
Lempel-Ziv-Welch (LZW) Compression Algorithm
Lempel-Ziv-Welch (LZW) Compression Algorithm
warm-up: Complete on your own sheet of paper.
Raise your hand if… you have ever read an entire paragraph, passage, or page only to realize that you have absolutely no clue what you just read.
BATTLE WHERE/WHEN OPPONENTS
Information Steganography Using Magic Matrix
Chair Professor Chin-Chen Chang Feng Chia University
Raise your hand if… you have ever read an entire paragraph, passage, or page only to realize that you have absolutely no clue what you just read.
VUS.7c The Civil War The Emancipation Proclamation and the principles outlined in Lincoln’s Gettysburg Address.
Four score and seven years ago our fathers brought forth on this continent, a new nation, conceived in Liberty, and dedicated to the proposition that all.
7X Tuesday Gettysburg to Appomattox
Gettysburg Picture Analysis- Gallery Walk
Hiding Data in a Color Palette Image with Hybrid Strategies
The Gettysburg Address
Embedding Secrets Using Magic Matrices
Raise your hand if… you have ever read an entire paragraph, passage, or page only to realize that you have absolutely NO clue what you just read.
Presentation Purpose 6.01 Understand business uses of presentation software and methods of distribution Presentation Purpose.
A Restricted Region-based Data-hiding Scheme
The Gettysburg Address
Information Steganography Using Magic Matrix
Raise your hand if… you have ever read an entire paragraph, passage, or page only to realize that you have absolutely no clue what you just read.
7X Monday The Tide of War Turns
Rhetorical Devices…SPEECHES!
Four score and seven years ago our fathers brought forth on this continent, a new nation, conceived in Liberty, and dedicated to the proposition that all.
De-clustering and Its Application to Steganography
Information Hiding Techniques Using Magic Matrix
Steganographic Systems for Secret Messages
8X Thursday Gettysburg to Appomattox
Lempel-Ziv-Welch (LZW) Compression Algorithm
A Restricted Region-based Data-hiding Scheme
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

High-capacity Reversible Data-hiding for LZW Codes Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University http://msn.iecs.fcu.edu.tw/~ccc

Outline Information Hiding Lempel-Ziv-Welch compression The proposed scheme Experimental results Conclusions

Information Hiding Receiver Reconstructed Information Sender Lincoln's Gettysburg Address Fourscore and seven years ago our fathers brought forth on this continent a new nation, conceived in liberty and dedicated to the proposition that all men are created equal. Now we are engaged in a great civil war, testing whether that nation, or any nation so conceived and so dedicated, can long endure. We are met on a great battlefield of that war. We have come to dedicate a portion of that field as a final resting place for those who here gave their lives that that nation might live. It is altogether fitting and proper that we should do this. Sender Compression Code: <1><2><3><2>… Cover Information Lincoln's Gettysburg Address Fourscore and seven years ago our fathers brought forth on this continent a new nation, conceived in liberty and dedicated to the proposition that all men are created equal. Now we are engaged in a great civil war, testing whether that nation, or any nation so conceived and so dedicated, can long endure. We are met on a great battlefield of that war. We have come to dedicate a portion of that field as a final resting place for those who here gave their lives that that nation might live. It is altogether fitting and proper that we should do this. Secret data: 011 Compression code <1><2><3><2>… Secret data: 011

Lempel-Ziv-Welch (LZW) compression Encode the string Dictionary index symbol 1 a 2 b 3 ab 4 ba 5 abb 6 baa 7 abbb 8 baaa a b a b b a a b b b a a a b b b LZW

LZW encoding rule is not in the Dictionary, and inserted as new symbol Encode the string a b a b b a a b b b a a a b b b Initial Dictionary index symbol 1 a 2 b output prefix Code(a) = 1 as LZW compression code last character b is remained for next symbol is not in the Dictionary, and inserted as new symbol ab

LZW encoding ab is not in the Dictionary, and inserted as new symbol Encode the string a b a b b a a b b b a a a b b b Dictionary index symbol 1 a 2 b 3 ab ab is not in the Dictionary, and inserted as new symbol output prefix Code(a)=1 Output <1>

LZW encoding ba is not in the Dictionary, and inserted as new symbol Encode the string a b a b b a a b b b a a a b b b Dictionary index symbol 1 a 2 b 3 ab 4 ba ba is not in the Dictionary, and inserted as new symbol output prefix Code(b)=2 Output <1><2>

LZW encoding abb is not in the Dictionary, and inserted as new symbol Encode the string a b a b b a a b b b a a a b b b Dictionary index symbol 1 a 2 b 3 ab 4 ba 5 abb abb is not in the Dictionary, and inserted as new symbol output prefix Code(ab)=3 Output <1><2><3>

LZW encoding baa is not in the Dictionary, and inserted as new symbol Encode the string a b a b b a a b b b a a a b b b Dictionary index symbol 1 a 2 b 3 ab 4 ba 5 abb 6 baa baa is not in the Dictionary, and inserted as new symbol output prefix Code(ba)=4 Output <1><2><3><4>

LZW encoding abbb is not in the Dictionary, and inserted as new symbol Encode the string a b a b b a a b b b a a a b b b Dictionary index symbol 1 a 2 b 3 ab 4 ba 5 abb 6 baa 7 abbb abbb is not in the Dictionary, and inserted as new symbol output prefix Code(abb)=5 Output <1><2><3><4><5>

LZW encoding baaa is not in the Dictionary, and inserted as new symbol Encode the string a b a b b a a b b b a a a b b b Dictionary index symbol 1 a 2 b 3 ab 4 ba 5 abb 6 baa 7 abbb 8 baaa baaa is not in the Dictionary, and inserted as new symbol output prefix Code(baa)=6 Output <1><2><3><4><5><6>

LZW encoding final output Code(abbb)=7 Encode the string a b a b b a a b b b a a a b b b Dictionary index symbol 1 a 2 b 3 ab 4 ba 5 abb 6 baa 7 abbb 8 baaa final output Code(abbb)=7 Output <1><2><3><4><5><6><7> Compression Achieved Message codes Bits / Code Total Original 16 8 128 bits LZW message 7 3 21 bits

LZW decoding rule Output Symbol(5)= abb New symbol Decode the string <1><2><3><4><5><6><7> Dictionary index symbol 1 a 2 b 3 ab 4 ba 5 abb 6 baa 7 abbb 8 baaa Output a b ab ba abb baa abbb Output Symbol(5)= abb New symbol = previous output || a = baa

LZW decoding Initial output Symbol(1)=a Symbol(2)=b Insert symbol ab Decode the string <1><2><3><4><5><6><7> Dictionary index symbol 1 a 2 b 3 ab Output a b Initial output Symbol(1)=a Symbol(2)=b Insert symbol ab

LZW decoding Output Symbol(3)= ab New symbol = b || a a b ab Decode the string <1><2><3><4><5><6><7> Dictionary index symbol 1 a 2 b 3 ab 4 ba Output a b ab Output Symbol(3)= ab New symbol = b || a

LZW decoding Output Symbol(4)= ba New symbol = ab || b a b ab ba Decode the string <1><2><3><4><5><6><7> Dictionary index symbol 1 a 2 b 3 ab 4 ba 5 abb Output a b ab ba Output Symbol(4)= ba New symbol = ab || b

LZW decoding Output Symbol(5)= abb New symbol = ba || a a b ab ba abb Decode the string <1><2><3><4><5><6><7> Dictionary index symbol 1 a 2 b 3 ab 4 ba 5 abb 6 baa Output a b ab ba abb Output Symbol(5)= abb New symbol = ba || a

LZW decoding Output Symbol(6)= baa New symbol = abb || b Decode the string <1><2><3><4><5><6><7> Dictionary index symbol 1 a 2 b 3 ab 4 ba 5 abb 6 baa 7 abbb Output a b ab ba abb baa Output Symbol(6)= baa New symbol = abb || b

LZW decoding Output Symbol(7)= abbb New symbol = baa || a Decode the string <1><2><3><4><5><6><7> Dictionary index symbol 1 a 2 b 3 ab 4 ba 5 abb 6 baa 7 abbb 8 baaa Output a b ab ba abb baa abbb Output Symbol(7)= abbb New symbol = baa || a

The proposed scheme (1/5) Cover LZW decoder Cover LZW compression code Cover HCDH-LZW hiding scheme HCDH-LZW extracting scheme Secret Secret

The proposed scheme (2/5) Hiding phase Hiding concept : shrink prefix sp to hide secret n = length of sp hide d = log2 n bits in this LZW compression code Hiding rule v = value of d-bit secrets if v = 0, not change prefix sp else shrink prefix sp by v characters

The proposed scheme (3/5) Dictionary index symbol 1 a 2 b 3 ab 4 ba 5 abb Example: Encode the string a b a b b a a b b b a a a b b b prefix sp = a b n = 2 hide d = log2 n = 1 bit If secret bit =0, v=0 and not change prefix sp = a b If secret bit =1, v=1 and prefix sp = a Output <3> b <1>

The proposed scheme (4/5) Extracting phase Extracting concept : count decoded characters from following LZW compression code to extract secret sp’ = decompressed symbol of LZW code, c1c2c3… are the decoded string of following LZW codes Extracting rule if sp’|| c1c2c3..cv’ exists in the dictionary, length of secret = log2 n, n=length of sp’|| c1c2c3..cv’ and secret bits = binary form of v’

The proposed scheme (5/5) Dictionary index symbol 1 a 2 b 3 ab 4 ba 5 abb Example: Decode the string <1><2><3><2><1><5><2> Output a b ab b a abb sp’= b aabb is the decoded string of following LZW codes since b a exists in the dictionary, length of secret = log2 n =1, n=length of ba=2 v’= 1 and secret bits = binary form of v’ = 1

Simulation Cover message: “ababbaabbbaaabbb” Secret message: “0101000” Hiding Input Original LZW code Output Dictionary Hidden secret 1 a 2 b ab 1(a) 3 2(b) 4 ba bb 3(ab) 5 abb aa 4(ba) 6 7 bbb 5(abb) 8 abbb 9 7(aa) 10 aaa 8(abbb) 11 00 Extracting Input Output Dictionary Extracting secret 1 a 2 b 3 ab 4 ba 5 abb 6 7 aa 8 abbb 9 10 aaa 11 00

Experimental results (1/2)

Experimental results (2/2)

Conclusions Hide secrets in LZW compression codes High hiding-capacity Transmission codes still LZW compression codes Recovering cover information do not need extra message, like location map

Thanks for your listening