1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University

Slides:



Advertisements
Similar presentations
1 影像偽裝術的最新發展 張真誠 逢甲大學 講座教授 中正大學 榮譽教授 清華大學 合聘教授 Watermarking 2. Image authentication 3. Secret sharing 4. Visual cryptography 5. Steganography.
Advertisements

1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
A Novel steganographic method for JPEG images by Vasiliy Sachnev - Introduction  JPEG compression  Steganography - Block based steganography method (F5)
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Data hiding in Least Significant Bit (LSB) Speaker: Feng Jen-Bang ( 馮振邦 )
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
1 A Steganographic Scheme for Secure Communications Based on the Chaos and Eular Theorem Der-Chyuan Lou and Chia-Hung Sung IEEE Transactions on Multimedia,
1 Adaptive Data Hiding in Palette images by Color Ordering and Mapping With Security Protection Authors: Chih-Hsuan Tzeng, Zhi-Fang Yang, and Wen-Hsiang.
1 資訊隱藏技術之研究 The Study of Information Hiding Mechanisms 指導教授: Chang, Chin-Chen ( 張真誠 ) 研究生: Lu, Tzu-Chuen ( 呂慈純 ) Department of Computer Science and Information.
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
人力資源報告 Image and Signal Processing 1 Steganography Using Sudoku Revisited Wien Hong, Tung-Shou Chen, Chih-Wei Shiu Department of Information Management,
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
Digital Watermarking and Its Applications
Advisor: Chang, Chin-Chen Student: Chen, Chang-Chu
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
基於龜殼魔術矩陣的隱寫技術及其衍生的研究問題
影像偽裝術 Dr. Chin-Chen Chang
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
(k, n)-Image Reversible Data Hiding
Information Hiding Technology: Current Research and Future Trend
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
Advisor: Chin-Chen Chang1, 2 Student: Yi-Hui Chen2
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Recent Developments on Multimedia and Secure Networking Technologies
Information Steganography Using Magic Matrix
Chair Professor Chin-Chen Chang Feng Chia University
Chair Professor Chin-Chen Chang Feng Chia University
指導教授: Chang, Chin-Chen (張真誠)
Hiding Data in a Color Palette Image with Hybrid Strategies
A Study of Digital Image Coding and Retrieving Techniques
Embedding Secrets Using Magic Matrices
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
A Restricted Region-based Data-hiding Scheme
Some Novel Steganographic Methods for Digital Images
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding Scheme Using Two Steganographic Images
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Information Steganography Using Magic Matrix
Data hiding based Hamming code
Dynamic embedding strategy of VQ-based information hiding approach
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Information Hiding and Its Applications
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
Chair Professor Chin-Chen Chang Feng Chia University
Recent Developments on Multimedia and Secure Networking Technologies
Chair Professor Chin-Chen Chang Feng Chia University
Novel Multiple Spatial Watermarking Technique in Color Images
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection Source: Multimedia.
De-clustering and Its Application to Steganography
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Information Hiding Techniques Using Magic Matrix
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Recent Developments in Information Hiding
Steganographic Systems for Secret Messages
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Lossless Data Hiding in the Spatial Domain for High Quality Images
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University 1

2 Secrets Sender Receiver Internet Data Embedding ‧ Steganography - prison problem ‧ Reversible data hiding - Medical image - Military image -Quality and capacity Secrets

… …… 255 p2p2 p1p Magic Matrix Zhang, X. P. and Wang, S. Z., “Efficient Steganographic Embedding by Exploiting Modification Direction,” IEEE communications letters, vol. 10, no. 11, pp. 1-3, Nov., n=2, F(2, 3)=3 s=1 (p 1 ', p 2 ') = (2, 2) F(p 1, p 2 ) = (1*p 1 + 2*p 2 ) mod (2n+1)

4 Data Hiding Using Sudoku (1/8)  Spatial domain data embedding  Sudoku  A logic-based number placement puzzle

5 Data Hiding Using Sudoku (2/8)  Property Possible solutions: 6,670,903,752,021,072,936,960 (i.e. ≈ 6.671×10 21 ) A Sudoku grid contains nine 3 × 3 matrices, each contains different digits from 1 to 9. Each row and each column of a Sudoku grid also contain different digits from 1 to 9.

6 1 2 Data hiding using Sudoku (3/8) Review Zhang and Wang’s method (Embedding) Extracting function: … : … … … … … … … … … … … … :::::::::::: Magic Matrix Cover image Secret data: … Stego image p1p1 p2p2

… : … … … … … … … … … … … … :::::::::::: Magic Matrix Stego image Extracted secret data: p1p1 p2p2 Data hiding using Sudoku (4/8) Review Zhang and Wang’s method (Extracting)

8 Data hiding using Sudoku (5/8) - 1 Reference Matrix M

9 Data hiding using Sudoku (Embedding) (6/8) Cover Image Secret data: … d(, ) = ((8-8) 2 +(4-7) 2 ) 1/2 =3 d(, ) = ((9-8) 2 +(7-7) 2 ) 1/2 =1 d(, ) = ((6-8) 2 +(8-7) 2 ) 1/2 = Stego Image min.

10 Data hiding using Sudoku (Embedding) (7/8) Cover Image d(, ) = ((11-11) 2 +(15-12) 2 ) 1/2 =3 d(, ) = ((15-11) 2 +(12-12) 2 ) 1/2 =4 d(, ) = ((9-11) 2 +(14-12) 2 ) 1/2 = Stego Image min Secret data: …

11 Data hiding using Sudoku (Extracting) (8/8) Stego Image Extracted data: 27 9 =

12 Magic Matrix Duc, K., Chang, C. C., “A steganographic scheme by fully exploiting modification directions,” Technique Report of Feng-Chia University. r = F(p i, p j ) = ((t-1) × p i + t × p j ) mod t 2 t bits per pixel pair

13 Color retinal imageSegmented image

14 Wet Paper Coding Key Fridrich, J. Goljan, M., Lisonek, P. and Soukal, D., “Writing on Wet Paper,” IEEE Transactions on Signal Processing, vol. 53, no. 10, pp , 2005

15 Wet Paper Coding (2/2) Random Matrix LSB of Cover Image Secret Data 2130 Cover Image ×= ? The important area is marked as wet pixel Stego-image

16 Wet Paper Coding with XOR Operation Key Eight groups {31}, {35, 31, 32}, {34, 35, 33}, {32}, {33}, {35, 35}, {33, 33, 34}, {32, 32} At least one dry pixel Secrets: LSB(35) ⊕ LSB( 31) ⊕ LSB(32) 1 {35, 31, 33} LSB(31) 0 {30} Stego-pixels

Secret Extracting LSB(30) = 0 LSB(35) ⊕ LSB(31) ⊕ LSB(33) =1 LSB(34) ⊕ LSB(35) ⊕ LSB(33) = 0 LSB(33) = 1 LSB(32) = 0 LSB(35) ⊕ LSB(34) = 1 LSB(33) ⊕ LSB(33) ⊕ LSB(35)= 1 LSB(32) ⊕ LSB(33) = 1

18 Proposed Scheme (1/6) Key S = 3, 1, 2, 3, 1, 0, 0 Three types: - Restricted Pairs of Wet Pixels (RPW) - Non-restricted Pairs of Wet Pixels (NRPW) - Pairs of Dry Pixels (DP) Embeddable

19 35 (p 1, p 2 ) = (31, 35), n=2 Proposed Scheme (2/6) S=3 (p 1 ', p 2 ') = (33, 35) x y

20 Proposed Scheme (3/6) S=1 (p 1 ', p 2 ') = (31, 31) y x 32 (p 1, p 2 ) = (31, 32), n=2

21 32 (p 1, p 2 ) = (33, 32), n=2 Proposed Scheme (4/6) S=2 (p 1 ', p 2 ') = (34, 32)

Proposed Scheme (5/6) Key

S = 3, 1, 2, 3, 1, 0, r = F(p i, p j ) = ((t-1) × p i + t × p j ) mod t 2 t=2

24 Experimental Results (1/3) t= 2 (192 Kb) PSNR = t = 3 (304 Kb) PSNR = t = 4 (384 Kb) PSNR = t= 6 (496 Kb) PSNR = t = 8 (576 Kb) PSNR = Cover Image

25 Experimental Results (2/3)

26 Experimental Results (3/3) [3] Fridrich, J., Goljan, M., Lisonek, P. and Soukal, D., “Writing on wet paper,” IEEE Transactions on Signal Processing, vol. 53, no. 10, pp , 2005.

27 Conclusions  A novel steganographic technique with the fully exploiting modification (FEM) is proposed for digital images.  The experiments confirm that our proposed scheme can achieve the goals of high capacity and good visual quality.