Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.

Slides:



Advertisements
Similar presentations
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Advertisements

Fifth International Conference on Information
Enhanced images watermarking based on amplitude modulation Image and Vision Computing, 24 (2006), 111 – 119 Authors :T. Amornraksa, K. Janthawongwilai.
Fast vector quantization image coding by mean value predictive algorithm Authors: Yung-Gi Wu, Kuo-Lun Fan Source: Journal of Electronic Imaging 13(2),
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
Recover the tampered image based on VQ indexing Source: Signal Processing, Volume 90, Issue 1, Jan. 2010, pp Authors: Chun-Wei Yang and Jau-Ji.
1 Hiding Data in Images by Simple LSB Substitution Source: Pattern Recognition, Vol. 37, pp , 2004 Authors: Chi-Kwong Chan and L.M. Cheng Speaker:
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Reversible Image Watermarking Using Interpolation Technique Source: IEEE Transcation on Information Forensics and Security, Vol. 5, No. 1, March 2010 Authors:
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
1 An Efficient VQ-based Data Hiding Scheme Using Voronoi Clustering Authors:Ming-Ni Wu, Puu-An Juang, and Yu-Chiang Li.
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Multiple-description iterative coding image watermarking Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 20, No. 4, pp , 2010.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Palette Partition Based Data Hiding for Color Images Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, and Chien-Ting Huang Speaker : Yu-Chiang Li.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
1 Security of fragile watermarking scheme for image authentication Authors: K. C. Liao, W. B. Lee, and C. W. Liao Source: The Imaging Science Journal,
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
Palette Partition Based Data Hiding for Color Images
Source: The Journal of Systems and Software, Volume 67, Issue 2, pp ,
A New Image Compression Scheme Based on Locally Adaptive Coding
Image camouflage by reversible image transformation
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Source :Journal of visual Communication and Image Representation
A Data Hiding Scheme Based Upon Block Truncation Coding
A Digital Watermarking Scheme Based on Singular Value Decomposition
A Digital Watermarking Scheme Based on Singular Value Decomposition
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
Source: Pattern Recognition, Vol. 38, Issue 11, December 2005, pp
Reversible Data Hiding Scheme Using Two Steganographic Images
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Data hiding method using image interpolation
Dynamic embedding strategy of VQ-based information hiding approach
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Information Hiding and Its Applications
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
Zhe-Ming Lu, Chun-He Liu, Dian-Guo Xu, Sheng-He Sun,
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Data hiding method using image interpolation
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
A Semi-blind Watermarking Based on Discrete Wavelet Transform
Novel Multiple Spatial Watermarking Technique in Color Images
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
On SVD-based watermarking algorithm
An imperceptible spatial domain color image watermarking scheme
A Data Hiding Scheme Based Upon Block Truncation Coding
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Predictive Grayscale Image Coding Scheme Using VQ and BTC
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
A New Image Compression Scheme Based on Locally Adaptive Coding
A Quadratic-Residue-based Fragile Watermarking Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May 4, 2005

Outline Introduction The proposed method Experimental results Conclusions

Introduction Watermarking Technology Colored Visual Cryptography

Watermarking Technology primitive image watermark stego-image Good digital watermarking : 1. Perceptual invisible 2. Security 3. Blindness 4. Multiple watermarks 5. Robustness

Colored Visual Cryptography

Colored Visual Cryptography (cont.)

The proposed method The primitive gray-level image “Lena”Colored watermark

The proposed method (cont.)

Random

The proposed method (cont.) Range of mean value Mask [0, 63] [64, 127] [128, 191] [192, 255] Mean:186 The color Masks of four kinds of mean values

coding table The proposed method (cont.)

Experimental Results Share image 1Share image 2

Experimental Results The recovered image from two share images

Experimental Results (cont.) ( a ) The cropping attacked “Lena” ( b ) The recovered image from two share images of cropped “Lena”

Experimental Results (cont.) ( a ) The blurring attacked “Lena” ( b ) The recovered image from two share images of blurred “Lena”

Experimental Results (cont.) ( b ) The recovered image from two share images of sharpened “Lena” ( a ) The sharpening attacked “Lena”

Conclusions Provide high robustness by using Visual Cryptography technique in Digital Watermarking. Keep the quality of primitive image.

Watermarking Technology Based on BTC Method Author: Hsien-Chu Wu, Chwei-Shyong Tsai, I-Su Lee Speaker: I-Su Lee Date: May 4, 2005

Outline Introduction The Proposed method Experimental results Conclusions

Block Truncation Coding, BTC ×512 Mean = ( … )/16 = 191 M1 = ( )/7 = 204 M0 = ( )/9 = 181 <191  0 >191  bitmap

BTC decompression bitmap <191  0 >191  1 0   Mean = ( … )/16 = 191 M1 = ( )/7 = 204 M0 = ( )/9 = 181

The Proposed method 8-bit grayscale image binary watermark

Codebook design min distance 128×128cover-image codebook

Codebook design (cont.) codebook codebook0 codebook1 0 1

Watermark Embedding codebook0 codebook1 cover-image binary watermark 0 1 stego-image cover-image binary watermark

Watermark Extraction (cont.) stego-image codebook0 codebook1 0 1 binary watermark

Experimental results (a) Lena(b) Girl(c) F16 (d) Pepper(e) Splash(f) Tiffany

Experimental results (cont.) Cover-imagestego-image (unit:dB) BTC compression image (unit:dB) Lena Girl F Peppers Splash Tiffany Comparison results (PSNR)

Experimental results (cont.) (a) cropping attack watermark bit correct rate = watermark bit correct rate = (b) cropping attack

Experimental results (cont.) bit correct rate = bit correct rate = watermark (c) cropping attack (d) cropping attack

Experimental results (cont.) bit correct rate = bit correct rate = watermark (e) sharpening attack (f) blurring attack

Experimental results (cont.) Cover image Lena Girl F Peppers Splash Tiffany Average Correct rate of six kinds of attacked watermark (a) cropping attack (b) cropping attack (c) cropping attack (d) cropping attack (f) sharpening attack (g) blurring attack

Conclusions The proposed method can embed watermark in compressed images directly. It is simple and efficient to embed waterm ark in images with using BTC. Stego-image has good image quality.