Title of On the Implementation of a Information Hiding Design based on Saliency Map A.Basu, T. S. Das and S. K. Sarkar/ Jadavpur University/ Kolkata/ India/

Slides:



Advertisements
Similar presentations
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Advertisements

H IGH CAPACITY WATERMARKING H YPERSPECTRAL I MAGES AUTHENTICATION Mehdi Fallahpour Jordi Serra-Ruiz David Megías.
Watermarking Techniques Digital Rights Seminar © April 28, 2006 Mahmoud El-Gayyar.
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Efficient Bit Allocation and CTU level Rate Control for HEVC Picture Coding Symposium, 2013, IEEE Junjun Si, Siwei Ma, Wen Gao Insitute of Digital Media,
Fifth International Conference on Information
Chinese University of Hong Kong Department of Information Engineering A Capacity Estimate Technique for JPEG-to-JPEG Image Watermarking Peter Hon Wah Wong.
A Review on: Spread Spectrum Watermarking Techniques
A Model of Saliency-Based Visual Attention for Rapid Scene Analysis Laurent Itti, Christof Koch, and Ernst Niebur IEEE PAMI, 1998.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
1 Hiding Data in Images by Simple LSB Substitution Source: Pattern Recognition, Vol. 37, pp , 2004 Authors: Chi-Kwong Chan and L.M. Cheng Speaker:
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Nguyen Thi Huong Lien - Hirota Lab 1/10 Echo Hiding using Exponential Time-spread Echo Kernel (ETEK-EH) and Its Applications to Audio Digital Watermarking.
Reversible medical image watermarking based on wavelet histogram shifting Source: Authors: Reporter: Date: The Imaging Science Journal, Vol. 59, No. 1,
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
Lossless Watermarking for Image Authentication: A New Framework and an Implementation IEEE TRANSACTIONS ON IMAGE PROCESSING APRIL 2006 C.M.Chen.
黃文中 Introduction The Model Results Conclusion 2.
Bit-4 of Frequency Domain-DCT Steganography Technique 1 Nedal M. S. Kafri and Hani Y. Suleiman Networked Digital Technologies, NDT '09. First International.
Sadaf Ahamed G/4G Cellular Telephony Figure 1.Typical situation on 3G/4G cellular telephony [8]
1 Wave Steganography Approach by Modified LSB 2009 Adviser: 吳坤熹 Student: 陳奕君 Presentation Data:2013/11/5 Second International Conference on Emerging Trends.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Data hiding in Least Significant Bit (LSB) Speaker: Feng Jen-Bang ( 馮振邦 )
ECE643 Course Project, Fall /21/20081 Optimum histogram pair based image lossless data embedding By G. Xuan, Y. Q. Shi, etc. Summarized By: Zhi.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
by Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik
1 資訊隱藏技術之研究 The Study of Information Hiding Mechanisms 指導教授: Chang, Chin-Chen ( 張真誠 ) 研究生: Lu, Tzu-Chuen ( 呂慈純 ) Department of Computer Science and Information.
A lossless data hiding scheme based on three- pixel block differences Ching-Chiuan Lin and Nien-Lin Hsueh Pattern Recognition, Vol. 41(4), April 2008 Pages.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
1 Security of fragile watermarking scheme for image authentication Authors: K. C. Liao, W. B. Lee, and C. W. Liao Source: The Imaging Science Journal,
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
Biologically Inspired Vision-based Indoor Localization Zhihao Li, Ming Yang
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
(k, n)-Image Reversible Data Hiding
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
DONE BY S.MURALIRAJAN M.NIRMAL
Image camouflage by reversible image transformation
Increasing Watermarking Robustness using Turbo Codes
Source :Journal of visual Communication and Image Representation
Reversible data hiding scheme based on significant-bit-difference expansion Sourse: IET Image Processing ( Volume: 11, Issue: 11, ), Pages 1002.
QR Code Authentication with Embedded Message Authentication Code
A Digital Watermarking Scheme Based on Singular Value Decomposition
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images Source: Symmetry, vol. 8, no. 6, June.
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Yongjian Hu, Member, IEEE, Heung-Kyu Lee, Kaiying Chen, and Jianwei Li
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
A Restricted Region-based Data-hiding Scheme
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Dynamic embedding strategy of VQ-based information hiding approach
Information Hiding and Its Applications
Chair Professor Chin-Chen Chang Feng Chia University
Chair Professor Chin-Chen Chang Feng Chia University
New Framework for Reversible Data Hiding in Encrypted Domain
Novel Multiple Spatial Watermarking Technique in Color Images
An imperceptible spatial domain color image watermarking scheme
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
A Restricted Region-based Data-hiding Scheme
Presentation transcript:

Title of On the Implementation of a Information Hiding Design based on Saliency Map A.Basu, T. S. Das and S. K. Sarkar/ Jadavpur University/ Kolkata/ India/ Swanirbhar Majumder/NERIST (Deemed University)/ Itanagar/ India/ In this paper, an adaptive spatial domain image watermarking scheme is proposed which embeds watermark information to the uneven bit depth salient image pixels. Watermarked image thus produced has better visual transparency with respect to human visual system (HVS) with high payload capacity. In proposed scheme, salient pixels are determined using the bottom- up Graph-Based Visual Saliency (GBVS) model. Experimental results reveal that proposed scheme has less perceptual error as well as improved robustness than existing spatial domain embedding scheme. The visual attention model consists of two steps: first forming activation maps on certain feature channels, and then normalizing them in a way which highlights conspicuity and admits combination with other maps. The model is simple and biologically plausible insofar as it is naturally parallelized The Performance Results with Comparisons:In this paper, a new spatial domain adaptive image watermarking scheme is proposed which embeds watermark information in the least significant bit depth pixels with respect to a well known selective visual attention model GBVS. It is experimentally shown for a significant percentage of images the saliency distribution of pixels remain same even after embedding in multiple bit plane LSB embedding. Experimental result also reveals that the perceptual transparency error due to embedding in proposed scheme is less than that of normal LSB embedding scheme. In the attacked environment, this blind proposed scheme can be easily used to make the method visually more robust. INTRODUCTION RESULT CONCLUSIONS REFERENCES Nov Kutter, M., et. Al. “Image watermarking techniques, Proceedings ofthe IEEE, Special Issue on Identification and Protection of Multimedia Information, Itti, L., Koch C., Niebur E.: A model of saliency based visual attention for rapid scene analysis, IEEE Trans. on PAMI, vol. 20, pp , O.LeMeur, D.Thoreau, P.LeCallet and D.Barba, A Spatio Temporal Model of the Selective Human Visual Attention, 4.Mickael Guironnet, Nathalie Guyader, Denis Pellerin and Patricia Ladret, Static and Dynamic Feature based Visual Attention Model: Comparison to Human Judgment. 5.Christopher Wing Hong Ngau, Li-Minn Ang and Kah Phooi Seng, Bottom-up Visual Saliency Map Using Wavelet Transform Domain, /10 ©2010 IEEE. 6.Arijit Sur, et. al, “A New Image Watermarking Scheme using Saliency Based Visual Attention Model”, IEEE /09/© C.C. Chang, et. al, Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy, Pattern Recognition 36 (2003) 1583– C.C. Chang,, et. al, A block based digital watermarks for copy protection of images, Proceedings of Fifth Asia-Pacific Conference on Communications/Fourth Optoelectronics and Communications Conference, Beijing, China, Vol. 2, 1999, pp. 977– Cheng-HsingYang, Inverted pattern approach to improve image quality of information hiding by LSB substitution, Pattern Recognition 41 (2008) 2674 – Chang-Lung Tsai,, et. al, Reversible data hiding and lossless reconstruction of binary images using pair-wise logical computation mechanism, Pattern Recognition 38 (2005) 1993 – WATERMARK ENCODER & DECODER Sl. No. MethodTPEPSNR Capacity (bpp) Salient Watermarking Model 1Sur et. al [6]14.88x10 -5 N.A Our Method Non Salient Watermarking Model 1 LSB substitution [7] N.A GA[8]N.A IP LSB [9]N.A Optimal LSB [9]N.A PWLC [10]N.A Sl.ParameterResult 1SNR dB 2MSE PSNR dB 4IF MD 7 6AD AVD NAD NMSE LMSE SER KLD UIQI SSIM MSSIM VSNR VIF PVIF IFC NQM WSNR SC PQS TPE Performance analysis results for imperceptibility:  CONTACT: Name: S. Majumder