1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.

Slides:



Advertisements
Similar presentations
1 影像偽裝術的最新發展 張真誠 逢甲大學 講座教授 中正大學 榮譽教授 清華大學 合聘教授 Watermarking 2. Image authentication 3. Secret sharing 4. Visual cryptography 5. Steganography.
Advertisements

A Secret Information Hiding Scheme Based on Switching Tree Coding Speaker: Chin-Chen Chang.
1 視覺密碼學 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University ( 清華大學 ) National Chung Cheng University ( 中正大學 ) Feng Chia University (
Digital Watermarking Parag Agarwal
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
1 資訊隱藏技術之研究 The Study of Information Hiding Mechanisms 指導教授: Chang, Chin-Chen ( 張真誠 ) 研究生: Lu, Tzu-Chuen ( 呂慈純 ) Department of Computer Science and Information.
Palette Partition Based Data Hiding for Color Images Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, and Chien-Ting Huang Speaker : Yu-Chiang Li.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
Digital Watermarking and Its Applications
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
基於龜殼魔術矩陣的隱寫技術及其衍生的研究問題
影像偽裝術 Dr. Chin-Chen Chang
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Information Hiding Technology: Current Research and Future Trend
Image Watermarking Chu, Hsi-Cheng.
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Recent Developments on Multimedia and Secure Networking Technologies
Information Steganography Using Magic Matrix
Chair Professor Chin-Chen Chang Feng Chia University
Chair Professor Chin-Chen Chang Feng Chia University
Chair Professor Chin-Chen Chang Feng Chia University
A Data Hiding Scheme Based Upon Block Truncation Coding
第七章 資訊隱藏 張真誠 國立中正大學資訊工程研究所.
Hiding Data in a Color Palette Image with Hybrid Strategies
A Study of Digital Image Coding and Retrieving Techniques
Parag Agarwal Digital Watermarking Parag Agarwal
Embedding Secrets Using Magic Matrices
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
A Restricted Region-based Data-hiding Scheme
Some Novel Steganographic Methods for Digital Images
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding Scheme Using Two Steganographic Images
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Information Steganography Using Magic Matrix
Dynamic embedding strategy of VQ-based information hiding approach
Chair Professor Chin-Chen Chang Feng Chia University
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Hiding Information in VQ Index Tables with Reversibility
Information Hiding and Its Applications
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
Chair Professor Chin-Chen Chang Feng Chia University
Recent Developments on Multimedia and Secure Networking Technologies
Chair Professor Chin-Chen Chang Feng Chia University
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
Partial reversible data hiding scheme using (7, 4) hamming code
Novel Multiple Spatial Watermarking Technique in Color Images
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
De-clustering and Its Application to Steganography
A Data Hiding Scheme Based Upon Block Truncation Coding
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Information Hiding Techniques Using Magic Matrix
Recent Developments in Information Hiding
Steganographic Systems for Secret Messages
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University

2 Multimedia (Watermarking) Classifications: Visible watermarking Invisible watermarking Robust watermarking Semi-fragile watermarking Fragile watermarking

3 Multimedia (Watermarking) (Cont.) Visible watermarking Easy to embed Clear to see watermark

4 Multimedia (Watermarking) (Cont.) Invisible watermarking Requirements: Good visual quality of watermarked image Robustness Watermarking Watermarked imageOriginal image Watermark

5 Multimedia (Image authentication) Requirements: Detect the tampered area Try to restore the tampered area Solutions: Hamming codes Image Tampered imageDetected imageRestored image

6 Multimedia (Secret sharing) Classification: Meaningless shadows Meaningful shadows Meaningless shadows Requirements: Unexpected user can not see the secret image Good visual quality of reconstructed secret image

7 Multimedia (Secret sharing) (Cont.) Shadow size: 256  256 Image size: 512  512 Sharing Reconstructing PSNR=24 dB (2,4)-threshold secret sharing scheme

8 Multimedia (Secret sharing) (Cont.) Meaningful shadows Requirements: Good visual quality of stego image Secret image extraction and reconstruction Solutions: Applying steganography techniques Applying image authentication mechanisms

9 Multimedia (Secret sharing) (Cont.) Secret image Stego-image Hiding Reconstructed secret image Reconstructing (n,2)-threshold secret sharing scheme Stego-image

10 Multimedia (Visual cryptography) Requirements: Secret message delivery Unexpected user can not see the message from an individual share Solutions: Using shadow patterns Using meaningful shadow images Using Circle Shares

11 Multimedia (Visual cryptography) (Cont.) Shadow 1Shadow 2 Secret Staking

12 Multimedia (Visual cryptography) (Cont.) Shadow 1Shadow 2 Secret Staking

13 Multimedia (Visual cryptography) (Cont.) Share 1 Share 2 Secret 1 “ VISUAL ” Secret 2 “ SECRET ” Staking Rotating 40 o

14 Multimedia (Steganography) Classification: The target of modification Frequency domain (e.g. DCT, DWT, DFT) Spatial domain (e.g. pixel values) Compression domain (e.g. VQ, LAC, SOC) Stego image restoration Irreversible data hiding Reversible data hiding

15 Multimedia (Steganography) (Cont.) Irreversible data hiding Requirements: High capacity Good visual quality of stego images Solutions: Using Sudoku Using wet paper codes concept Using Hamming codes

16 Multimedia (Steganography) (Cont.) Reversible Requirements: Fully reconstructing cover image Good visual quality of stego image High capacity Solutions: Data hiding in VQ indices Data hiding in LAC codes Data hiding in SOC codes …

17 Data Hiding Cover image Hiding system Secret message Stego image

18 Cover Carriers Image Video Sound Text

19 VQ Encoding Codebook Index table (100,125,…,150) Original Image … (20,65,…,110) (90,135,…,120) (120,155,…,80) (50,42,…,98) (49,117,…,25)

20 Previous Work of Steganography on VQ To find the closest pairs

21 Unused CW 0, CW 8, CW 13, CW CW 1 CW 11,CW 2,CW 3 CW 4, CW 5 CW 6, CW 7 CW 15, CW 10 CW 12, CW 9 d(CW 0, CW 8 ) > TH d(CW 13, CW 14 ) > TH

22 Index Table Unused CW 0, CW 8, CW 13, CW 14 Encode Index Table Original Image

23 A secret message: Index Table CW 1, CW 2, CW 4, CW 5 CW 6, CW 7 CW 11, CW 3 CW 15, CW 10 CW 12, CW Secret bits

24 A secret message: Index Table CW 1, CW 2, CW 4, CW 5 CW 6, CW 7 CW 11, CW 3 CW 15, CW 10 CW 12, CW Secret bits

25 A secret message: Index Table Secret bits

26 Zhang and Wang ’ s Method (Embedding) … : … … … … … … … … … … … … :::::::::::: Magic Matrix Cover image Secret data: … Stego image p1p1 p2p2

27 Zhang and Wang ’ s Method (Extracting) … : … … … … … … … … … … … … :::::::::::: Magic Matrix Stego image Extracted secret data: p1p1 p2p2

28 Sudoku A logic-based number placement puzzle

29 Sudoku (Cont.) Property Possible solutions: 6,670,903,752,021,072,936,960 (i.e. ≈ 6.671×10 21 ) A Sudoku grid contains nine 3 × 3 matrices, each contains different digits from 1 to 9. Each row and each column of a Sudoku grid also contain different digits from 1 to 9.

30 Data Hiding Using Sudoku - 1 Reference Matrix M

31 Data Hiding Using Sudoku (Embedding) (Cont.) Cover Image Stego Image Secret data: … d(, ) = ((8-8) 2 +(4-7) 2 ) 1/2 =3 d(, ) = ((9-8) 2 +(7-7) 2 ) 1/2 =1 d(, ) = ((6-8) 2 +(8-7) 2 ) 1/2 =2.24 min.

32 Data Hiding Using Sudoku (Embedding) (Cont.) Cover Image Stego Image d(, ) = ((11-11) 2 +(15-12) 2 ) 1/2 =3 d(, ) = ((15-11) 2 +(12-12) 2 ) 1/2 =4 d(, ) = ((9-11) 2 +(14-12) 2 ) 1/2 =2.83 min Secret data: …

33 Data Hiding Using Sudoku (Extracting) (Cont.) Stego Image Extracted data: 27 9 =

34 Experimental Results

35 Experimental Results (Cont.) The results of visual quality and Embedding capacity comparisons

36 (7, 4) Hamming Coding Encoding Data: p 1 p 2 d 1 p 3 d 2 d 3 d d 1  d 2  d 4 = p 1 1  1  1 = 1 d 1  d 3  d 4 = p 2 1  0  1 = 0 d 2  d 3  d 4 = p 3 1  0  1 = 0 d1 d2 d3 d4d1 d2 d3 d4 Encoded data Encoding p 1 p 2 d 1 p 3 d 2 d 3 d 4

37 (7, 4) Hamming Coding (Cont.) Error Detection Received data: Error Position Corrected data: Correcting Parity check matrix H Error bit

38 Matrix Coding Method Cover Image Parity check matrix H ( ) T = (1 1 1) T Secret data: …  Stego Image Embedding

39 Matrix Coding Method (Cont.) ( ) T = (1 1 0) T Extracted secret data: … Stego Image Extracting ■ 7 pixels embed 3 bits

40 “ Hamming+1 ” Method Cover Image Parity check matrix H ( ) T = (1 1 1) T Secret data: …  ( ) mod 2= 1 = ? or( ) mod 2= Stego Image Embedding

41 “ Hamming+1 ” Method (Cont.) ( ) T = (1 1 0) T Extracted secret data: … = ( ) mod 2= Stego Image Extracting ■ 8 pixels embed 4 bits