A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan.

Slides:



Advertisements
Similar presentations
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Advertisements

Reversible Data Hiding Based on Two-Dimensional Prediction Errors
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A reversible data hiding method by histogram shifting in high quality medical images Author: Li-Chin Huang, Lin-Yu Tseng, Min-Shiang Hwang Source: The.
多媒體網路安全實驗室 Source:International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH- MSP),2010 Sixth. Authors:Hsiang-Cheh.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Reversible Data Hiding ECE643 Digital Image Processing (I) Course Project Professor: Yun Q. Shi Su Yu 12/02/2011.
Piyu Tsia,Yu-Chen Hu,Hsiu-Lien Yen Signal Processing 日期 :1 月 4 號 報告者 : 許睿中.
Reversible data hiding based on histogram shifting scheme Reporter: Date: Wan-Yu Lu 2012/12/13.
Vishnu Vardhan Reddy Mukku Mav ID : Under the guidance of.
Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
Reversible Image Watermarking Using Interpolation Technique Source: IEEE Transcation on Information Forensics and Security, Vol. 5, No. 1, March 2010 Authors:
Reversible Color Image Watermarking in YCoCg-R Color Space Aniket Roy under the supervision of Dr. Rajat Subhra Chakraborty.
Lossless Watermarking for Image Authentication: A New Framework and an Implementation IEEE TRANSACTIONS ON IMAGE PROCESSING APRIL 2006 C.M.Chen.
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
Reversible watermarking Wu Dan Introduction What?
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
Reversible Date Hiding Based on Histogram Modification of pixel Differences IEEE Transactions on circuits and systems for video technology, VOL. 19, NO.
1 Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform Source : IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 13, NO. 8,
Palette Partition Based Data Hiding for Color Images Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, and Chien-Ting Huang Speaker : Yu-Chiang Li.
A lossless data hiding scheme based on three- pixel block differences Ching-Chiuan Lin and Nien-Lin Hsueh Pattern Recognition, Vol. 41(4), April 2008 Pages.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
Vishnu Vardhan Reddy Mukku Mav ID : Under the guidance of.
Advisor: Chang, Chin-Chen Student: Chen, Chang-Chu
Source: IEEE Signal Processing Letters (Accepted)2016
(k, n)-Image Reversible Data Hiding
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Source: IEEE Transactions on Circuits and Systems for Video Technology Vol.26.
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
Reversible Data Hiding in JPEG Images using Ordered Embedding
Source :Journal of visual Communication and Image Representation
Reversible data hiding scheme based on significant-bit-difference expansion Sourse: IET Image Processing ( Volume: 11, Issue: 11, ), Pages 1002.
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
Yongjian Hu, Member, IEEE, Heung-Kyu Lee, Kaiying Chen, and Jianwei Li
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
Source: Information Sciences, 2018, accpeted.
Source : Signal Processing, vol. 126, pp ,  November 2016
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding
Reversible Data Hiding Scheme Using Two Steganographic Images
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Source:. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL
Source: Signal Processing, Vol. 125, pp , August 2016.
A reversible and secure patient information hiding system for IoT driven e-health Source : International Journal of Information Management, Available online.
Reversible Data Hiding in JPEG Images
Source : Journal of Visual Communication and Image Representation, vol
Information Hiding and Its Applications
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Source : Journal of Visual Communication and Image Representation, vol
High Capacity Data Hiding for Grayscale Images
New Framework for Reversible Data Hiding in Encrypted Domain
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
Blind Reversible Authentication Based on PEE and CS Reconstruction
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection Source: Multimedia.
Source: IEICE-Transactions on Info and Systems
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Dynamic improved pixel value ordering reversible data hiding
Lossless Data Hiding in the Spatial Domain for High Quality Images
A Quadratic-Residue-based Fragile Watermarking Scheme
Presentation transcript:

A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan

Outline Histogram Shifting on Pixel Differences  HS for single layer embedding  HS for multi-layer embedding Two-Step Embedding Framework (TSE) Improvement for Reduction the Location Map  Traditional location map generation  The improvement scheme for reduction location map size Embedding Process Extraction Process Experimental Results

Histogram shifting algorithm Traditional histogram shifting algorithm (HS) Traditional histogram shifting algorithm is based on the pixel values, which utilizes the redundancy of the host image statistical information to hide secret data, the sketch map is shown as follows. Grayscale value Frequency Peak point Lowest point non-zero point situation Zero point Grayscale value Frequency Grayscale value Frequency Peak point zero point situation Frequency Zero point Peak point w Embedding

Note: 1) The extraction is performed in the reverse order as the embedding process. 2) The side information (peak/zero points) should be additionally transmitted to the receiver for reversible recovery.——No blind 3) The histogram shifting is extended to the pixel differences or predictive errors to improve the performance

Histogram shifting on the pixel differences d Frequency Histogram shifting d’d’ Pixel differences calculation ‘d’ Generate the histogram of pixel differences Generate the marked pixel differences ‘d’’ Generate the marked pixel values ‘y’ Note: 1)P and Z should be additional transmitted to the receiver. 2)The process represents the single layer embedding

Multi-layer embedding When the size of secret data is large, the generated stego-image (stego-differences) is repeatedly considered as a new cover image (cover differences) to perform a new round histogram shifting to hide more message. The multi-layer embedding is described as follows. Stego- image Pixel differences Original image 1 th layer …… m th layer Marked pixel differences P1,Z1P1,Z1 Pm,ZmPm,Zm Note: the side information {P i,Z i | 1≤i ≤m} should be additional transmitted

Two-Step Embedding Framework Purpose : 1) To solve the issue of needing to transmit the side information additionally. —— No blind 2) To ensure the optimal peak/zero points selection among HS to improve the performance. TSE for single layer embedding A1 optimal selection histogram peak / zero points first LSB replacement Replaced LSBs Stego Image pixel differences Original image second Stego A2 Stego

TSE for multi-layer embedding Note: 1) TSE is employed in the final layer embedding; 2) The LSB substitution is performed on the stego-pixels. m th layer (TSE) A1 A2 Stego- image Pixel differences Original image 1 th layer …… (m-1) th layer Framework of two-step embedding for multi-layer embedding

The characteristic of TSE: 1) TSE is an improved LSB based scheme, which hides the side information in the LSBs of the chosen stego-pixels in A1 to achieve the blind requirement. 2) Without consuming some intact fixed area to hide side information in the traditional schemes, our scheme utilizes the LSB in the stego-pixels. 3) The flexible optimal peak/zero point ensures the better performance.

Improvement for Reduction the size of Location Map Location map: Due to the modification on the pixel differences to hide secret data, the marked differences may be not in the normal range [0, 255] for a 8-bit grayscale image. Thus the location map is needed to record the special overflow/underflowed pixels and embedded in the cover image together with the secret message. The location map can be recovered by the receiver to lossless restore the original image.

Traditional method for the location map generation Each layer HS embedding leads to at most 1 unit distortion between marked difference d i ’ and original difference d i. Thus, the difference between the stego-pixel and original pixel via m - layer embedding is The potentially overflowed/underflowed pixels (POPs) is in the range and should be specially handled as follows.

: POPs Cover image 1) Locate all the POPs in the interval 2) Use histogram narrowing technique (HN) to narrow the POPs to the middle grayscale value and generate a new narrowed cover image I’ 3) After m-layer embedding on the narrowed image I’, no overflow/underfow occurs. 4) Generate a same sized location map with ‘1’ and ‘0’ to indicate the narrowed pixels and non-narrowed pixels. 5) Compress the location map and hide the compressed version in the cover image.

General idea: we exchange the histogram narrowing technique into the final layer embedding process and only indicate the actually overflowed/underflowed pixels (AOPs), which is a subset of the POPs. Thus the improved location map with less ‘1’ in it will be easier to be compressed. The detailed TSE for the reduction of the location map is described as follows. Improvement for Reduction the size of Location Map

R_POPs in A2 w={w(1), w(2), w(3)} w(1) w(2) LM + SI POPs R_POPs in A1 A1 HS embedding LSB replacement HS embedding LM LSBs AOPs : POPs A1 A2 Cover image Pixel differences HS embedding A1 A2 w(3)+LSBs The sketch map of TSE for location map reduction

Embedding Process 1) Calculate the pixel differences 2) Determine the embedding layer ‘m’ 3) Identify the POPs in cover image with gray value in the range 4) Perform the front (m-1)-layer embedding 5) Implement the TSE in the final layer embedding. Note: Among the process, the compressed location map and side information for each layer are together hidden in the image in step 5. Moreover, the histogram narrowing technique is utilized in the same step.

Extraction Process 1) Divide the stego-image into A1 and A2 as did in embedding side, and collect the side information from the LSBs of the marked pixels in A1. 2) Decompress and generate the location map to indicate the actually overflowed/underflowed pixels (AOPs). Perform the inverse HN operation on the AOPs. 3) Perform the m-layer extraction operation in the inverse order and recover the original cover image.

The TSE framework extended to other prediction errors One prediction model: (a) (b) The multilayer embedding is iteratively performed between the ‘cross’ set and ‘round’ set. And the successive prediction utilizes the generated stego- pixels in opposite set. The (i+1) th layer embedding process is illustrated.

Experimental Results The Efficiency for Location Map Reduction between the traditional method and our improved scheme Where LM t and LM i denote the size of traditional and improved location map, respectively.

Cover image (512×512) chosen schemes Lena Traditional location map [18]20 Improved location map20 Overflow/UnderflowNNNNN E_Map-- Peppers Traditional location map [18] Improved location map Overflow/UnderflowYYYYY E_Map0%9.1%19.4%63.6%108.6% Baboon Traditional location map [18] Improved location map Overflow/UnderflowYYYYY E_Map600%633.3%785.7%755.6%935.3% F16 Traditional location map [18]20 Improved location map20 Overflow/UnderflowNNNNN E_Map-- Goldhill Traditional location map [18]20 Improved location map20 Overflow/UnderflowNNNNN E_Map-- Boat Traditional location map [18] Improved location map Overflow/UnderflowYYYYY E_Map11.1%50%73.9%112.9%282.1%

Comparison Between the TSE in Pixel Differences, in Predictive Errors and Other Schemes TSE_PD_TM: TSE + Pixel differences + traditional location map TSE_PD_IM: TSE + Pixel differences + improved location map TSE_PE_IM: TSE + prediction errors + improved location map [18] Tai W. L., Yeh C. M., Chang C. C.: Reversible Data Hiding Based on Histogram Modification of Pixel Differences. IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 6, pp (2009) [19] Luo L., Chen Z., Chen M., Zeng X., Xiong Z.: Reversible Image Watermarking Using Interpolation Technique. IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp.187–193 (2010) [13] Hwang J., Kim J., Choi J.: A Reversible Watermarking Based on Histogram Shifting. In: Proc. International Workshop on Digital Watermarking. pp Jeju Island, Korea (2006)

Conclusion 1) The proposed scheme exploits TSE to solve the problem of communicating side information. The TSE framework also ensures the adoption of optimal peak and zero point pair in each layer for high performance reversible data hiding. 2) An improved location map, which indicates only the actual overflow/underflow pixels, is constructed to facilitate the compression of location map and further increase the embedding capacity.

Thank you!