1 Data Hiding Watermarking for Halftone Images Ming Sun Fu, Student Member, IEEE, and Oscar C. Au, Senior Member, IEEE, IEEE TRANSACTIONS ON IMAGE PROCESSING,

Slides:



Advertisements
Similar presentations
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
Advertisements

1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Reversible data hiding based on histogram shifting scheme Reporter: Date: Wan-Yu Lu 2012/12/13.
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
2005/6/16 by pj 1 Hiding Biometric Data Hiding Biometric Data IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 25, NO. 11, NOVEMBER.
Chih-Hsing Lin, Jia-Shiuan Tsai, and Ching-Te Chiu
» Copying images is easy » Distributing images is easy » But what if we want to protect our rights to an image?
Enhanced images watermarking based on amplitude modulation Image and Vision Computing, 24 (2006), 111 – 119 Authors :T. Amornraksa, K. Janthawongwilai.
1 High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
Image Quilting for Texture Synthesis and Transfer Alexei A. Efros1,2 William T. Freeman2.
Distributed Video Coding. Outline Distributed video coding Lossless compression Lossy compression Low complexity video encoding Distributed image coding.
Motion Estimation Using Low- Band-Shift Method for Wavelet- Based Moving Picture Hyun-Wook Park, Senior Member, IEEE, and Hyung-Sun Kim IEEE Transactions.
Jacinto C. Nascimento, Member, IEEE, and Jorge S. Marques
INTERPOLATED HALFTONING, REHALFTONING, AND HALFTONE COMPRESSION Prof. Brian L. Evans Collaboration.
Huijuan Yang, Alex C. Kot, IEEE Fellow IEEE Transactions on Multimedia, Vol. 9, No. 3, Apr Multimedia Security Final Project R 葉容瑜 R
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
REVERSIBLE AND HIGH- CAPACITY DATA HIDING IN MEDICAL IMAGES 報告學生:翁偉傑 1 Published in IET Image Processing Received on 25th June 2008 Revised on 15th June.
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Half-Tone Watermarking Multimedia Security. 2 Outline Half-tone technique Watermarking Method Measurement Robustness Conclusion.
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
Immune Genetic Algorithms By Jeremy Moreau. References Licheng Jiao, Senior Member, IEEE, and Lei Wang, “A Novel Genetic Algorithm Based on Immunity,”
Multiple-description iterative coding image watermarking Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 20, No. 4, pp , 2010.
Reversible Date Hiding Based on Histogram Modification of pixel Differences IEEE Transactions on circuits and systems for video technology, VOL. 19, NO.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Reversible Data Hiding for Point-Sampled Geometry JOURNAL OF INFORMATION SCIENCE AND ENGINEERING Vol. 23, pp , 2007 PENG-CHENG WANG AND CHUNG-MING.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Halftone Visual Cryptography
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
Advisor: Chang, Chin-Chen Student: Chen, Chang-Chu
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
Advisor: Chin-Chen Chang1, 2 Student: Yi-Hui Chen2
A new data transfer method via signal-rich-art code images captured by mobile devices Source: IEEE Transactions on Circuits and Systems for Video Technology,
Mean value based reversible data hiding in encrypted images
Separable and error-free reversible data hiding in encrypted images
Yongjian Hu, Member, IEEE, Heung-Kyu Lee, Kaiying Chen, and Jianwei Li
基於邊緣吻合向量量化編碼 法之資訊隱藏 張 真 誠 逢甲大學 講座教授 中正大學 榮譽教授、合聘教授 清華大學 合聘教授
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding
Data Hiding Watermarking for Halftone Images
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Authors:Tae-Yun Chung; Min-Suk Hong; Young-Nam Oh;
Partial reversible data hiding scheme using (7, 4) hamming code
A Data-Hiding Technique with Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Steganography in halftone images: conjugate error diffusion
Digital Watermarking for Image Authentication with Localization
Data hiding method using image interpolation
Data Hiding Watermarking for Halftone Images
Source: Signal Processing: Image Communication 16 (2001) pp
Partial reversible data hiding scheme using (7, 4) hamming code
A Data-Hiding Technique With Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
New Framework for Reversible Data Hiding in Encrypted Domain
Novel Multiple Spatial Watermarking Technique in Color Images
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Blind Reversible Authentication Based on PEE and CS Reconstruction
Halftone Image Data Hiding with Block-Overlapping Parity Check
Using Association Rules as Texture features
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Hidden Digital Watermarks in Images
Dynamic improved pixel value ordering reversible data hiding
Source : Digital Signal Processing. Vol. 73, pp , Feb
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
A Quadratic-Residue-based Fragile Watermarking Scheme
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Reversible data hiding in encrypted binary images by pixel prediction
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

1 Data Hiding Watermarking for Halftone Images Ming Sun Fu, Student Member, IEEE, and Oscar C. Au, Senior Member, IEEE, IEEE TRANSACTIONS ON IMAGE PROCESSING, Vol. 11, No. 4, Apr. 2002, pp

2 Outline Introduction Data Hiding without Original Multitone Image (DHST, DHPT, DHSPT) Data Hiding with Original Multitone Image (DHED, MDHED) Conclusions

3 Introduction Halftone images Error diffusion Jarvis kernel and Steinberg kernel

4 Data Hiding without Original Multitone Image (DHST, DHPT, DHSPT) Data Hiding Self Toggling(DHST) use seed generate a set of N pseudo-random location. embedded 0 or 1 ( 1 bit ) simple & error correction coding “ salt-and-pepper ” noise intensity being about 128 location [ 10, 752, 950,... ] hiding bit stream [ halftone image Ex. 150 * 150

5 Data Hiding without Original Multitone Image (DHST, DHPT, DHSPT) Data Hiding Pair Toggling(DHPT) slave pixel is chosen randomly. two errors are introduced instead of one complexity is slightly larger than DHST fewer “ salt-and-pepper ” noise M=

6 Data Hiding without Original Multitone Image (DHST, DHPT, DHSPT) Data Hiding by Smart Pair Toggling(DHSPT) Candidate is Min [con after (m,n)] Define 2 2x0x x0x0 11

7 Data Hiding without Original Multitone Image (DHST, DHPT, DHSPT) Data Hiding by Smart Pair Toggling(DHSPT) Ex. before after 1+2+2= = X 0 = X 0 = = 12

8 Data Hiding without Original Multitone Image (DHST, DHPT, DHSPT) W( f(X 0, X master ) + f(X 0, X master ) ) = 2 before after vertical or horizontal master w(i) = 2  con before (m, n) + con after (m, n) = 10 other master w(i) = 1  con before (m, n) + con after (m, n) = 11 X master =1X 0 =0 X master =1X 0 =1 - -

9 Data Hiding without Original Multitone Image (DHST, DHPT, DHSPT) con before = =8  con after =11-8= con before =2+2+1=5  con after =10-5=5 con before =0  con after =10-0=

10 Data Hiding with Original Multitone Image (DHED, MDHED) Error diffusion

11 Data Hiding with Original Multitone Image (DHED, MDHED) Error diffusion

12 Data Hiding with Original Multitone Image (DHED, MDHED) Error diffusion

13 Data Hiding with Original Multitone Image (DHED, MDHED) Data Hiding Error Diffusion

14 Data Hiding with Original Multitone Image (DHED, MDHED) Modified Data Hiding Error Diffusion

15 Conclusions 4096/(512*512)=1.6 % 28900/(512*512)=11 %

16 Conclusions 隱藏少量資料時 不見得取得優勢 隱藏多量資料時 good choice 28900/4096 = 7 倍 Steinberg 皆優於 Jarvis kernel