Sourse: arXiv preprint, arXiv: , 2018 (Submit to IEEE Trans

Slides:



Advertisements
Similar presentations
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
Advertisements

1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
1 Adaptive Data Hiding in Palette images by Color Ordering and Mapping With Security Protection Authors: Chih-Hsuan Tzeng, Zhi-Fang Yang, and Wen-Hsiang.
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
Source: IEEE Signal Processing Letters (Accepted)2016
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Source: IEEE Transactions on Circuits and Systems for Video Technology Vol.26.
Source: IEEE Transactions on Information Forensics and Security, Vol
Reversible Data Hiding in JPEG Images using Ordered Embedding
Source : Signal Processing, Volume 133, April 2017, Pages
Reversible data hiding scheme based on significant-bit-difference expansion Sourse: IET Image Processing ( Volume: 11, Issue: 11, ), Pages 1002.
Mean value based reversible data hiding in encrypted images
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
Source: J. Vis. Commun. Image R. 41 (2016) 58–64
Source : Signal Processing, vol. 150, pp ,  September 2018
Separable and error-free reversible data hiding in encrypted images
Yongjian Hu, Member, IEEE, Heung-Kyu Lee, Kaiying Chen, and Jianwei Li
A Restricted Region-based Data-hiding Scheme
An efficient reversible data hiding method for AMBTC compressed images
Source: Information Sciences, 2018, accpeted.
Source : Signal Processing, vol. 126, pp ,  November 2016
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Improved joint reversible data hiding in encrypted images
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
Source: Signal Processing: Image Communication 64 (2018) 78-88
Source:. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
A reversible and secure patient information hiding system for IoT driven e-health Source : International Journal of Information Management, Available online.
Sourse: IEEE Transactions on Circuits and Systems for Video Technology
Data hiding based Hamming code
Reversible Data Hiding in JPEG Images
Data hiding method using image interpolation
Dynamic embedding strategy of VQ-based information hiding approach
Sourse: Multimedia Tools and Applications, 2018, pp 1–17
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
Chair Professor Chin-Chen Chang Feng Chia University
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Data hiding method using image interpolation
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
Chair Professor Chin-Chen Chang Feng Chia University
Partial reversible data hiding scheme using (7, 4) hamming code
New Framework for Reversible Data Hiding in Encrypted Domain
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
Source: IEEE Transactions on multimedia, Vol. 21, No
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
Secret Image Sharing Based on Encrypted Pixels
Information Protection and Recovery with Reversible Data Hiding
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Sourse: Information Sciences, Vol. 494, pp , August 2019
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Dynamic improved pixel value ordering reversible data hiding
Source : Digital Signal Processing. Vol. 73, pp , Feb
An Efficient Spatial Prediction-Based Image Compression Scheme
Lossless Data Hiding in the Spatial Domain for High Quality Images
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
A Restricted Region-based Data-hiding Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Adopting secret sharing for reversible data hiding in encrypted images
Reversible data hiding in encrypted binary images by pixel prediction
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Reversible Data Hiding in Encrypted Images based on MSB Prediction and Huffman Coding Sourse: arXiv preprint, arXiv:1812.09499, 2018 (Submit to IEEE Trans. Multimedia) Authors: Youzhi Xiang, Zhaoxia Yin and Xinpeng Zhang Speaker: Wang Xu Date: 2019/05/23

Outline Introduction Related work Proposed method Experiment results Conclusions

Embedded, encrypted image Introduction (1/2) Encrypted secret data Secret data Original image Encrypted image Embedded, encrypted image

Embedded, encrypted image Introduction (2/2) Original image Secret data Embedded, encrypted image Secret data Original image

Related work – MED predictor 𝑞 𝑖,𝑁𝑊 𝑞 𝑖,𝑁 𝑞 𝑖,𝑊 𝑝 𝑖 192 191 176 99 103 101 75 182 70 177

Proposed method – Label map generation 136 150 147 156 136 150 147 𝑞 𝑖 𝑝 𝑖 Different bit 𝑝 𝑖 : 150 1 1 Label = 4 𝑞 𝑖 : 156 1 1 Same bits Ignore bits

Proposed method – Image encryption Bit level encryption Calculate the encrypted pixel

Proposed method – Label map coding and embedding (1/4) Static Huffman codings

Proposed method – Label map coding and embedding (2/4) 1110 𝑝 𝑖 : 176 1 1 𝑞 𝑖 : 150 1 1 Auxiliary information Encrypted 𝑞 𝑖 1 1 Label embedded 𝑞 𝑖 1 1

Proposed method – Label map coding and embedding (3/4) 100 𝑝 𝑖 : 148 1 1 𝑞 𝑖 : 150 1 1 Encrypted 𝑞 𝑖 1 Label embedded 𝑞 𝑖 1 1 1 Additional data embedding

Proposed method – Label map coding and embedding (4/4) First row the length of the auxiliary information: 20 bits + Reference pixels Prediction area label map: 32bits First column

Proposed method – Data hiding First row Reference pixels Secret data Auxiliary information First column

Proposed method – Data Extraction and Image Recovery Label map information Image recover First row Auxiliary information Unpredictable area Secret data Auxiliary information First column Data extract Secret data

Experiment results (1/7)

Experiment results (2/7)

Experiment results (3/7)

Experiment results (4/7) [23] P. Bas, T. Filler, and T. Pevný, “Break our steganographic system—The ins and outs of organizing BOSS,” in Proc. 13th Int. Conf., pp. 59–70, May, 2011. Available: http://dde.binghamton.edu/download/ [24] P. Bas and T. Furon. Image Database of BOWS-2. Accessed: Jun. 20, 2017. [Online]. Available: http://bows2.ec-lille.fr/ [25] G. Schaefer and M. Stich, “UCID: An uncompressed color image database,” Proc. SPIE Electronic Imaging, Storage and Retrieval Methods and Applications for Multimedia, vol. 5307, pp. 472–480, 2003. Available: http://vision.doc.ntu.ac.uk/

Experiment results (5/7) [20] P. Puteaux and W. Puech, “An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images[J],” IEEE Trans. Inf. Forensics Security, vol. 13, no. 7, pp. 1067–1681, Jan, 2018. [21] Y. Puyang, Z. Yin, and Z. Qian, “Reversible Data Hiding in Encrypted Images with Two-MSB Prediction,” IEEE International Workshop on Information Forensics and Security (WIFS), 2018. [22] S .Yi and Y. Zhou, “Separable and Reversible Data Hiding in Encrypted Images using Parametric Binary Tree Labeling[J],” IEEE Transactions on Multimedia, PP(99):1-1, 2018.

Experiment results (6/7)

Experiment results (7/7)

Conclusions The proposed method has greatly improved the embedding capacity compared to the most advanced algorithms.

Thanks