1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

Slides:



Advertisements
Similar presentations
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
Advertisements

A Secret Information Hiding Scheme Based on Switching Tree Coding Speaker: Chin-Chen Chang.
Chinese University of Hong Kong Department of Information Engineering A Capacity Estimate Technique for JPEG-to-JPEG Image Watermarking Peter Hon Wah Wong.
1 A Unified Rate-Distortion Analysis Framework for Transform Coding Student : Ho-Chang Wu Student : Ho-Chang Wu Advisor : Prof. David W. Lin Advisor :
1 An Efficient Mode Decision Algorithm for H.264/AVC Encoding Optimization IEEE TRANSACTION ON MULTIMEDIA Hanli Wang, Student Member, IEEE, Sam Kwong,
BIN LI, HOUQIAN LI, LI LI, AND JINLEI ZHANG IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL.23, NO.9, SEPTEMBER
A Review on: Spread Spectrum Watermarking Techniques
Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.
Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Data Hiding in Image and Video Part I: Fundamental Issues and Solutions ECE 738 Class Presentation By Tanaphol Thaipanich
Low-Power H.264 Video Compression Architecture for Mobile Communication Student: Tai-Jung Huang Advisor: Jar-Ferr Yang Teacher: Jenn-Jier Lien.
Sub pixel motion estimation for Wyner-Ziv side information generation Subrahmanya M V (Under the guidance of Dr. Rao and Dr.Jin-soo Kim)
Color Image Watermarking Using Multidimensional Fourier Transforms Adviser : Chih-Hung Lin Speaker : Ming-Rui Chen Date : 2009/10/27 Received : December.
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
1 A HIGH-CAPACITY STEGANOGRAPHY SCHEME FOR JPEG2000 BASELINE SYSTEM Liang Zhang, Haili Wang, and Renbiao Wu, Senior Member, IEEE 1 IEEE TRANSACTIONS ON.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
Quantization Watermarking Design and Analysis of Digital Watermarking, Information Embedding, and Data Hiding Systems Brian Chen, Ph. D. Dissertation,
by Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Data Hiding in Image and Video: Part II—Designs and Applications Min Wu, Heather Yu, and Bede Liu.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
1 Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems Adviser: Chih-Hung Lin Speaker : Chia-Wei Chang Date:2009/10/06.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
1 Commutative Encryption and Watermarking in Video Compression Ieee Transactions On Circuits And Systems For Video Technology, Vol. 17, No. 6, June 2007.
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
Vishnu Vardhan Reddy Mukku Mav ID : Under the guidance of.
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
Presenting: Yossi Salomon Noa Reiter Guides: Dr. Ofer Hadar Mr. Ehud Gonen.
Watermarking Scheme Capable of Resisting Sensitivity Attack
Advisor: Chang, Chin-Chen Student: Chen, Chang-Chu
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Source: IEEE Transactions on Circuits and Systems for Video Technology Vol.26.
Lossy Compression of DNA Microarray Images
2018/9/16 Distributed Source Coding Using Syndromes (DISCUS): Design and Construction S.Sandeep Pradhan, Kannan Ramchandran IEEE Transactions on Information.
Reversible Data Hiding in JPEG Images using Ordered Embedding
Source : Signal Processing, Volume 133, April 2017, Pages
Watermarking for Image Authentication ( Fragile Watermarking )
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Source :Journal of visual Communication and Image Representation
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
A Data Hiding Scheme Based Upon Block Truncation Coding
Contrast and Brightness Adjusted Images
Source: Information Sciences, 2018, accpeted.
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Source:. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
Reversible Data Hiding in JPEG Images
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
A Data-Hiding Technique with Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking IEEE Trans. On Signal Processing, April 2003 Multimedia Security.
Author: Minoru Kuribayashi, Hatsukazu Tanaka
A Data-Hiding Technique With Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
New Framework for Reversible Data Hiding in Encrypted Domain
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
Blind Reversible Authentication Based on PEE and CS Reconstruction
Source: IEEE Transactions on Circuits and Systems,
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Dynamic improved pixel value ordering reversible data hiding
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
Rich QR Codes With Three-Layer Information Using Hamming Code
Presentation transcript:

1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 9, NO. 3, APRIL 2007 Receiver October 6, 2005;revised August 1, 2006 Adviser: Chih-Hung Lin Speaker: Shau-Shiang Hung Date : 98/10/13

2 Outline Author Introduction Related Work: LUT Embedding Proposed Hash-Based Randomized Embedding Optimizing HRE Against JPEG Attack Experimental Result Conclusion

3 Authors

4 Author(1) In 1995,recived the B.E in electrical engineering from the Sichuan University, China. In 2001,recived the M.E in signal processing engineering form the Tongji University, China. Since 2002, pursuing the Ph.D. degree in Electrical and Computer Engineering, Stevens Institute of Technology, Hoboken, NJ. Now, Working in the MSyNC Lab under the guidance of Prof. K. P. Subbalakshmi. Ning Liu

5 Author(2) Palak Amin In 2003, received the B.E. and the M.E. in computer engineering form Stevens Institute of Technology, Hoboken, NJ. Now he is currently pursuing the Ph.D.

6 Author(3) K.P. Subbalakshmi An Assistant Professor in Electrical and Computer Engineering, Steven Institute of Technology, Hoboken, NJ. Research interests are in the areas of information and communication security, joint source channel coding.

7 Introduction

8 I. Introduction(1) DIGITAL data hiding application Optimal Data hiding

9 I. Introduction(2) A fundamental issue, “Tradeoff” Capacity,robustness, and distortion. Another equally important parameter Security of the hide data.

10 I. Introduction(3) In 1998, a lattice based embedding algorithm »(J. Chae, D. MukherJee, and B. Manjunath, “Color image embeddingusing multidimensional lattice structures,” in Proc. IEEE Int. Conf.Image Processing (ICIP’98), 1998.) In 2003, Using a look up table (LUT) »M. Wu, “Joint security and robustness enhancement for quantization based data embedding,” IEEE Trans. Circuits Syst. Video Technol., vol.13, pp. 831–841, Aug

11 I. Introduction(4) Propose an algorithm –Hash-based randomized embedding algorithm (HRE)

12 II. Related Work: LUT Embedding

13 II. Related Work: LUT Embedding(1)

14 For example, q=10, and LUT: Embed a “1” in a pixel value “78” II. Related Work: LUT Embedding(2)

15 II. Related Work: LUT Embedding(3) Although the closest multiple of 10 to 78 is 80,T(80)=0,the algorithm picks “60” as the watermarked pixel value. if Then,be embed

16 II. Related Work: LUT Embedding(4) The entropy rate The mean squared error of LUT (MSE A ), run r 

17 III. Proposed Hash-Based Randomized Embedding Algorithm

18 III. Proposed Hash-Based Randomized Embedding Algorithm(1) Encoder Framework

19 III. Proposed Hash-Based Randomized Embedding Algorithm(1.1) Partition the Host Sequence into Subsequences: –M=R/L, M = even

20 III. Proposed Hash-Based Randomized Embedding Algorithm(1.2)

21 III. Proposed Hash-Based Randomized Embedding Algorithm(1.3) Parameter Calculation: –If use SCS scheme –Else, if compensating for distortion due to JPGE attack OR

22 III. Proposed Hash-Based Randomized Embedding Algorithm(1.4) Embedding Process: –Parameter t. –For each –Embed one bit by using the SCS scheme

23 III. Proposed Hash-Based Randomized Embedding Algorithm(2) Decoder Framework Security Analysis –Attacker 1) Exhaustive search in the entire key space. 2) Statistical analysis from the probability distribution of the stego-sequence

24 III. Proposed Hash-Based Randomized Embedding Algorithm(3)

25 III. Proposed Hash-Based Randomized Embedding Algorithm(2.1) Attack 2) –Let –Entropy of X with hash function = With the 2L components in this table

26 III. Proposed Hash-Based Randomized Embedding Algorithm(2.2)

27 IV. Optimal HRE Against JPEG Attack

28 IV. Optimal HRE Against JPEG Attack(1) JPEG algorithm uses quantizers organized in a table, called the quantization table Q

29 IV. Optimal HRE Against JPEG Attack(2) A.Optimal Embedding for the JPEG Compression Attack. B.Optimization of 

30 IV. Optimal HRE Against JPEG Attack(3.1) A. Optimal Embedding for the JPEG Compression Attack –From quantization theory The uniform quantizer can be modeled as an additive uniform noise channel with variance

31 IV. Optimal HRE Against JPEG Attack(3.2) HRE is also uniform quantizer based Uniform nosie as Improve capacity in lower WNR range Assumption

32 IV. Optimal HRE Against JPEG Attack(3.2.1)

33 IV. Optimal HRE Against JPEG Attack(3.2.2)

34 IV. Optimal HRE Against JPEG Attack(3.2.3)

35 IV. Optimal HRE Against JPEG Attack(3.3) Uniform quantizer based embedding with DC –Two parameter: and

36 IV. Optimal HRE Against JPEG Attack(3.3.1)

37 IV. Optimal HRE Against JPEG Attack(3.3.2)

38 IV. Optimal HRE Against JPEG Attack(3.4) Depend on relation betweenand So there are two cases of

39 IV. Optimal HRE Against JPEG Attack(3.4) B. Optimization of   Case 1: And

40 IV. Optimal HRE Against JPEG Attack(3.4.1)

41 IV. Optimal HRE Against JPEG Attack(3.5) B. Optimization of   Case 2:

42 IV. Optimal HRE Against JPEG Attack(3.5.1)

43 V. Experimental Result

44 V. Experimental Result(1)

45 V. Experimental Result(2)

46 V. Experimental Result(3)

47 V. Experimental Result(4)

48 V. Experimental Result(5)

49 Conclusion

50 Conclusion(1) This HRE algorithm can be increased independent of capacity, robustness and embedding induced distortion The proposed HRE algorithm provides joint security and robustness improvement over the traditional quantization based embedding scheme and LUT algorithm.

51 Conclusion(2) Experimental results showed that the proposed scheme achieves the same embedding capacity as SCS against AWGN attack On the other hand, the algorithm causes 7 dB less distortion than STDM at fixed embedding rate and robustness against JPEG compression attack.