Improvement of Multi-bit Information Embedding Algorithm for Palette-Based Images Anu Aryal, Kazuma Motegi, Shoko Imaizumi and Naokazu Aoki Division of.

Slides:



Advertisements
Similar presentations
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Advertisements

Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
Multiple Image Watermarking Applied to Health Information Management
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
Low-Power H.264 Video Compression Architecture for Mobile Communication Student: Tai-Jung Huang Advisor: Jar-Ferr Yang Teacher: Jenn-Jier Lien.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Introduction to Steganalysis Schemes Multimedia Security.
An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP Yongfeng Huang;Rui Miao Department of Electronic Engineering,
1 A Steganographic Scheme for Secure Communications Based on the Chaos and Eular Theorem Der-Chyuan Lou and Chia-Hung Sung IEEE Transactions on Multimedia,
1 Adaptive Data Hiding in Palette images by Color Ordering and Mapping With Security Protection Authors: Chih-Hsuan Tzeng, Zhi-Fang Yang, and Wen-Hsiang.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Palette Partition Based Data Hiding for Color Images Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, and Chien-Ting Huang Speaker : Yu-Chiang Li.
A lossless data hiding scheme based on three- pixel block differences Ching-Chiuan Lin and Nien-Lin Hsueh Pattern Recognition, Vol. 41(4), April 2008 Pages.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Advanced Science and Technology Letters Vol.35(Security 2013), pp Image Steganograpy via Video Using Lifting.
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
1 Marco Carli VPQM /01/2007 ON BETWEEN-COEFFICIENT CONTRAST MASKING OF DCT BASIS FUNCTIONS Nikolay Ponomarenko (*), Flavia Silvestri(**), Karen.
1 Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems Adviser: Chih-Hung Lin Speaker : Chia-Wei Chang Date:2009/10/06.
多媒體網路安全實驗室 Source: IEICE Trans. Fundamentals, Vol. E90-A, No. 4, April 2007, pp Authors:Hong Lin Jin, Masaaki Fujiyoshi, Hitoshi Kiya Speaker:Cheng.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
影像偽裝術 Dr. Chin-Chen Chang
Structure Similarity Index
PERFORMANCE ANALYSIS OF VISUALLY LOSSLESS IMAGE COMPRESSION
Data Mining and Its Applications to Image Processing
Advisor: Chin-Chen Chang1, 2 Student: Yi-Hui Chen2
Image camouflage by reversible image transformation
A new data transfer method via signal-rich-art code images captured by mobile devices Source: IEEE Transactions on Circuits and Systems for Video Technology,
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Chair Professor Chin-Chen Chang Feng Chia University
Source :Journal of visual Communication and Image Representation
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
A Data Hiding Scheme Based Upon Block Truncation Coding
Hiding Data in a Color Palette Image with Hybrid Strategies
A Study of Digital Image Coding and Retrieving Techniques
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
Source: Information Sciences, 2018, accpeted.
Reversible Data Hiding Scheme Using Two Steganographic Images
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
Source: IEEE Access, Vol. 6, Dec. 2017, pp
Data hiding based Hamming code
Dynamic embedding strategy of VQ-based information hiding approach
A High Embedding Capacity Approach to Adaptive Steganography
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Digital Steganography Utilizing Features of JPEG Images
High Capacity Data Hiding for Grayscale Images
A Data-Hiding Technique with Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
Chair Professor Chin-Chen Chang Feng Chia University
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Image quality measures
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
EarthTour Presentations
Chair Professor Chin-Chen Chang Feng Chia University
A Data-Hiding Technique With Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
An Iterative Method for Lossless Data Embedding in BMP Images
A Data Hiding Scheme Based Upon Block Truncation Coding
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Dynamic improved pixel value ordering reversible data hiding
Department of Computer Science, University of Central Florida ,Orlando
Sourse: arXiv preprint, arXiv: , 2018 (Submit to IEEE Trans
Lossless Data Hiding in the Spatial Domain for High Quality Images
Rich QR Codes With Three-Layer Information Using Hamming Code
Presentation transcript:

Improvement of Multi-bit Information Embedding Algorithm for Palette-Based Images Anu Aryal, Kazuma Motegi, Shoko Imaizumi and Naokazu Aoki Division of Advanced Integration Science Chiba University, Japan 1 ISC 2015, 11 th September, 2015

Outline Background Current Research Results Conclusion 2

Outline Background Current Research Results Conclusion 3

Introduction  Steganography [1] is the art and science of hiding information by embedding it in some other data.  Unauthorized recipients unaware about the existence of embedded data. 4 [1] Kahn, D.: The history of steganography. In: Goos, G., Hartmanis, J. (eds.) The First International Workshop on Information Hiding. LNCS, vol.1174, pp.1-5, Springer, Heidelberg (1996).

Conventional method [2]  Embeds each k-bits message into pixels of 2 × 2 pixel matrix as shown in Fig. 1.  Based on embedding a message into the pixels by assigning a parity to each pixel matrix according to the Euclidean distance. Fig. 1. Embedded unit of Conventional Method [2]. 5 [2] Imaizumi, S., Ozawa, K.: Palette-Based Image Steganography for High-Capacity Embedding. Bull. Soc. Photogr. Imag. Japan, Vol.25, No. 1, pp.7-11 (2015).

Conventional method [2] contd. Drawbacks  At maximum, only 3/4 bit per pixel can be embedded.  Maximum embedded amount is smaller than those methods that embed one bit message into one pixel [3-6].  Tendency to occur large color difference that leads to image degradation. 6 [2] Imaizumi, S., Ozawa, K.: Palette-Based Image Steganography for High-Capacity Embedding. Bull. Soc. Photogr. Imag. Japan, Vol.25, No. 1, pp.7-11 (2015). [3] Tzeng, C.-H., Yang, Z.-F., Tsai, W.-H.: Adaptive data hiding in palette images by color ordering and mapping with security protection. IEEE Trans. Commun. 52(5), (2004). [4] Fridrich, J.: A new steganographic method for palette-based image. In: Proc. Of IS&T PICS, pp (1999). [5] Huy, P.T., Thanh, N.H., Thang, T.M., Dat, N.T.: On fastest optimal parity assignments in palette images. In: Intelligent Information and Database Systems,vol. 7197, pp (2012). [6] Inoue, K., Hotta, S., Takeichi, Y., Urahama, K.: A Steganographic Method for Palette-Based Images [in Japanese]. In: The Transactions of the Institute of Electronics, Information and Communication Engineers. A, vol. 82, no.11, pp (1999)

Motivation  High capacity of embedding.  Suppression of degradation of image quality.  Conventional method [2] has space to improve both. 7 [2] Imaizumi, S., Ozawa, K.: Palette-Based Image Steganography for High-Capacity Embedding. Bull. Soc. Photogr. Imag. Japan, Vol.25, No. 1, pp.7-11 (2015).

Outline Background Current Research Results Conclusion 8

Current Research Concept  Embed each k bit message into 1×3 pixel matrix as shown in Fig. 2.  Embed message into a limited color by controlling the index values. Fig. 2. Embedded unit of proposed method (k = 3). 9

Proposed Method (1) 1)Sorting the color palette. 1)Embedding of message. 10

Proposed Method (2) 1.Sorting color palette using CIEDE2000 [7]. 11  Find the darkest color in entries C i.  Set the increment j = j +1.  Calculate ∆ E 00 between initial entries C i and entries C’ j-1.  Indices are assigned to all the entries. [7] Colorimetry - Part 6: CIEDE2000 Colour-difference formula. ISO/CIE (2014).

Proposed Method (3) 2. Embedding of message.  Select 1×3 pixel matrix from the target image (message length is k = 3 bits) as shown in Fig. 2. Fig. 2. Embedded unit of proposed method (k = 3). 12

Proposed Method (4)  Calculate parity S n as S n = d 0(n) + d l(n) mod 4, where d l(n) indicates the index of pixel t l(n). Fig. 2. Embedded unit of proposed method (k = 3). 13

Proposed Method (5)  The value of S n can be controlled by changing the indices of p (n), t 0(n) and t 1(n) by +1 or -1. Fig. 2. Embedded unit of proposed method (k = 3). 14 PnPn SnSn Embedding Information w n Table 1. Example of P n, S n and embedded information w n.

Proposed Method (6) PnPn SnSn Embedding Information w n Table 1. Example of P n, S n and embedded information w n. Index of p (n) = Even Index of p (n) = Odd 15 pnpn t 0(n) t 1(n) Target matrix Value of P n before and after embedding Index of p (n) ∆ E 00 DifferentChange by +1 or -1Smaller Difference between S n before and after embedding Index of t 0(n) and t 1(n) ∆ E 00 2Change by +1 or -1Smaller Difference between S n before and after embedding Index of t 0(n) or t 1(n) ∆ E 00 1Change by +1 or -1Smallest Difference between S n before and after embedding Index of t 0(n) or t 1(n) 0Not changed

Proposed Method (7)  Embedded message w n can be extracted after calculating P n and S n.  Performs embedding process only when all ∆ E 00 values for the pixels of matrix become 5.0 or less else not.  Steps are repeated until all the messages are embedded. 16

Proposed Method (8) Fig. 3. Color blocks and isolated colors.  Each block has been generated by delimiting colors when ∆E 00 >

Proposed Method (9) Proposed Method Conventional Method [2] Fig. 4. Matrix arrangement for maximum amount of embedded bits. Fig. 5. Matrix arrangement for minimum amount of embedded bits. Proposed Method Conventional Method [2]  Maximum amount of embedded bits.  Minimum amount of embedded bits. 18 [2] Imaizumi, S., Ozawa, K.: Palette-Based Image Steganography for High-Capacity Embedding. Bull. Soc. Photogr. Imag. Japan, Vol.25, No. 1, pp.7-11 (2015).

Outline Background Current Research Results Conclusion 19

Experimental Setups  Amount of embedded bits: 10,800 and 21,600 bits.  Used images: 256×256 pixels, 8-bit color bitmap images.  Number of images: 12  Image quality metrics: PSNR and SSIM. 20

Structural Similarity (SSIM) [8]  SSIM is introduced to measure the quality of distored images.  SSIM has Luminance Comparison l(x,y), Contrast comparison c(x,y) and Structure comparsion s(x, y). Therefore, 21 Fig. 6 Diagram of SSIM measurement system. [8] Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: From error visibility to structural similarity. In: IEEE Trans. on Image Processing.13 (4), pp (2004)

Simulation Result (I) Original (Pepper) 22 Proposed method (10,800 bits) SSIM = PSNR = Conventional method (10,800 bits) SSIM = PSNR = 36.58

Simulation Result (I) Original (Pepper) 23 Proposed method (21,600 bits) SSIM = PSNR = Conventional method (21,600 bits) SSIM = PSNR = 33.67

Simulation Result (III) Original (Balloon) 24 Proposed method (10,800 bits) SSIM = PSNR = Conventional method (10,800 bits) SSIM = PSNR = 40.73

Simulation Result (IV) Original (Balloon) 25 Proposed method (21,600 bits) SSIM = PSNR = Conventional method (21,600 bits) SSIM = PSNR = 37.68

Quantitative Evaluation (I) 10,800 bits 21,600 bits Fig. 7. Evaluation using PSNR. 26

Quantitative Evaluation (II) 10,800 bits 21,600 bits Fig. 8. Evaluation using SSIM. 27

Quantitative Evaluation (III) Embedded bitsProposed MethodConventional method [2] Maximum bits65, 28049,152 Minimum bits39,16821,675 Table 2. Maximum and minimum values of embedded bits.. 28 [2] Imaizumi, S., Ozawa, K.: Palette-Based Image Steganography for High-Capacity Embedding. Bull. Soc. Photogr. Imag. Japan, Vol.25, No. 1, pp.7-11 (2015).

Outline Background Current Research Results Conclusion 29

Conclusion  Enhances data embedding with larger capacity. - Maximum amount of embedded bits is 1.3 times and Minimum amount is 1.8 times more than conventional method.  Improves the image quality by suppressing image quality degradation. 30

31