High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:

Slides:



Advertisements
Similar presentations
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
Advertisements

1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:
Enhanced images watermarking based on amplitude modulation Image and Vision Computing, 24 (2006), 111 – 119 Authors :T. Amornraksa, K. Janthawongwilai.
1 High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
1 Data Hiding Watermarking for Halftone Images Ming Sun Fu, Student Member, IEEE, and Oscar C. Au, Senior Member, IEEE, IEEE TRANSACTIONS ON IMAGE PROCESSING,
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
Reversible Image Watermarking Using Interpolation Technique Source: IEEE Transcation on Information Forensics and Security, Vol. 5, No. 1, March 2010 Authors:
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Half-Tone Watermarking Multimedia Security. 2 Outline Half-tone technique Watermarking Method Measurement Robustness Conclusion.
1 An Efficient VQ-based Data Hiding Scheme Using Voronoi Clustering Authors:Ming-Ni Wu, Puu-An Juang, and Yu-Chiang Li.
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
Multiple-description iterative coding image watermarking Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 20, No. 4, pp , 2010.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Palette Partition Based Data Hiding for Color Images Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, and Chien-Ting Huang Speaker : Yu-Chiang Li.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Halftone Visual Cryptography
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
1 Security of fragile watermarking scheme for image authentication Authors: K. C. Liao, W. B. Lee, and C. W. Liao Source: The Imaging Science Journal,
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Source: IEEE Transactions on Circuits and Systems for Video Technology Vol.26.
Image camouflage by reversible image transformation
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Source :Journal of visual Communication and Image Representation
Mean value based reversible data hiding in encrypted images
A Digital Watermarking Scheme Based on Singular Value Decomposition
Separable and error-free reversible data hiding in encrypted images
An efficient reversible data hiding method for AMBTC compressed images
Source: Pattern Recognition, Vol. 38, Issue 11, December 2005, pp
Source : Signal Processing, vol. 126, pp ,  November 2016
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Source: IEEE Access, Vol. 6, Dec. 2017, pp
Source: Signal Processing, Vol. 125, pp , August 2016.
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
A reversible and secure patient information hiding system for IoT driven e-health Source : International Journal of Information Management, Available online.
Data Hiding Watermarking for Halftone Images
Data hiding method using image interpolation
Dynamic embedding strategy of VQ-based information hiding approach
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Partial reversible data hiding scheme using (7, 4) hamming code
A Data-Hiding Technique with Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
Zhe-Ming Lu, Chun-He Liu, Dian-Guo Xu, Sheng-He Sun,
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Steganography in halftone images: conjugate error diffusion
Digital Watermarking for Image Authentication with Localization
Data hiding method using image interpolation
EarthTour Presentations
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
Source: Signal Processing: Image Communication 16 (2001) pp
Partial reversible data hiding scheme using (7, 4) hamming code
A Data-Hiding Technique With Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
Novel Multiple Spatial Watermarking Technique in Color Images
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
An imperceptible spatial domain color image watermarking scheme
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Dynamic improved pixel value ordering reversible data hiding
Source : Digital Signal Processing. Vol. 73, pp , Feb
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
A Quadratic-Residue-based Fragile Watermarking Scheme
Reversible data hiding in encrypted binary images by pixel prediction
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source: IEEE Transactions on Image Processing, Vol. 15, No. 6, pp. 1665-1679, June 2006 Date: 26/10/2006 Speaker: Ming-Ni Wu

Outline Introduction Error Diffusion PSNR for Halftone Images Data Hiding with Minimal-Error Bit Search (MEBS) Standard MEBS Modified MEBS Self-Decoding Mode Dot-Diffusion Self-Decoding Mode Color Halftone Image Self-Deconding Mode Robust Watermarking Conclusions

Introduction Error Diffusion (EDF) A gray level image A halftone image

Introduction to distribute the watermark into several EDF images (secret sharing) Error Diffusion and Data Hiding gray level images halftone images a bi-level watermark

Error diffusion (EDF) 255 80 100 95 200 150 130 72 137 160 110 63 121 143 90 54 TH=128, x=80 80<128=>x=0 Error=80-0=80 100+80*(7/16)=135 200+80*(3/16)=215 150+80*(5/16)=175 130+80*(1/16)=135 255 135 95 215 175 72 137 160 110 63 121 143 90 54 a grey level image x 7/16 3/16 5/16 1/16 x 7/48 6/48 3/48 5/48 1/48 Steinberg kernel Jarvis kernel

Error diffusion (experiments) Original error-diffused halftone images 512 512 PSNR=30.84 PSNR=27.15 PSNR=30.9

PSNR for Halftone Images Q 1 150 80 100 95 200 130 72 137 160 110 63 121 143 90 54 0.05 0.10 0.40 P Filter W Halftone image B Original gray level image 0.59 0.31 0.39 0.37 0.74 0.51 0.28 0.54 0.63 0.43 0.25 0.47 0.56 0.35 0.21 0.05*1+0.1*0+0.05*1+0.1*1+0.4*1+0.1*0+0.05*0+0.1*1+0.05*0 =0.8 Normalized image X

PSNR for Halftone Images -0.002 -0.001 0.006 -0.010 -0.03 -0.04 -0.004 0.011 0.033 0.042 0.022 -0.006 0.035 0.081 0.099 0.063 0.016 0.040 0.097 0.123 0.027 0.002 -0.003 0.013 0.053 0.073 0.049 0.014 -0.007 0.012 -0.005 7*7 filter

Standard MEBS X Y secret image 255 80 100 95 200 150 130 72 137 160 110 63 121 143 90 54 x2=80,80<128 =>x2’=0 y2=130,130>128=>y2’=1 Case 1: x2’=1, Error=80-255=-175 y2’=1, Error=130-255=-125 Total error =|-175|+|-125|=300 Case 2: x2’=0, Error=80-0=80 y2’=0, Error=130-0=130 =|80|+|130|=210 selected secret bit 1 Gray code X 130 120 100 70 145 85 50 80 87 75 63 66 Y 1 secret image

Standard MEBS (Experiments) watermarked images PSNR=25.46 PSNR=25.45 watermark capacity:50%

Standard MEBS (Experiments) watermarked images PSNR=28.9 PSNR=26.9 PSNR=28.95 watermark capacity:33%

Modified MEBS X Y secret image secret bit 1 Gray code 255 80 100 95 ERRth=128 x2=80,80<128 =>x2’= 0 y2=130,130>128=>y2’=1 Case 1: x2’=1, Error=80-255=-175=>-128 y2’=1, Error=130-255=-125 Total error =|-128|+|-125|=253 Case 2: x2’=0, Error=80-0=80 y2’=0, Error=130-0=130=>128 =|80|+|128|=208 selected secret bit 1 Gray code 255 80 100 95 200 150 130 72 137 160 110 63 121 143 90 54 X 130 120 100 70 145 85 50 80 87 75 63 66 Y 1 secret image

Modified MEBS The average ERRth value in TABLE II is 135.52

Modified MEBS (Experiments) watermarked images PSNR=26.95 PSNR=26.78 watermark capacity:50%

Dot-diffusion Self-Decoding Mode Dot Diffusion and Data Hiding gray level images halftone images a bi-level watermark

Dot-diffusion Self-Decoding Mode 16 60+70*(1/7)=70 50+70*(2/7)=70 80+70*(1/7)=90 90+70*(2/7)=110 90+70*(1/7)=100 16 16 16 … … 26 19 49 39 47 78 62 63 94 255 60 70 50 80 90 255 70 90 110 100 … … orthogonal factor=2 diagonal factor=1

Dot-diffusion Self-Decoding Mode (experiments) watermarked, 480*480, PSNR=25.39 capacity=50% watermark,240*480 Watermarked, 480*480, PSNR=28.84 capacity=33.3% watermark,160*480

Color Halftone Image Self-Deconding Mode B B Error Diffusion and Data Hiding a color image a color halftone image a bi-level watermark

Color Halftone Image Self-Deconding Mode (experiments) RGB 31.2 29.16 CMYK 30.92 29.56

Robust Watermarking 512 64 64 512 8 Each block can embed the same information bit. We can use the majority voting to recover the damaged portion. 8

Robust Watermarking (experiments) Tampering attack 92.65%

Robust Watermarking (experiments) Cropping attack 10% 20% 30% 40% 99.54% 97.45% 94.58% 90.41%

Robust Watermarking (experiments) Rotated attack (a)10° (i)95.87% (b)15° (j)94.12% (c)20° (k)92.55% (d)25° (l)91.24% (e)30° (m)90.65% (f)35° (n)90.14% (f)40° (o)89.94% (h)45° (p)89.92%

Conclusions A high-capacity data-hiding method in halftone image using the MEBS technique is proposed. The embedded halftone images are robust enough to survive under various attacks.