Data hiding in Least Significant Bit (LSB) Speaker: Feng Jen-Bang ( 馮振邦 )

Slides:



Advertisements
Similar presentations
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Advertisements

Reversible Data Hiding Based on Two-Dimensional Prediction Errors
A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan.
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
1 Hiding Data in Images by Simple LSB Substitution Source: Pattern Recognition, Vol. 37, pp , 2004 Authors: Chi-Kwong Chan and L.M. Cheng Speaker:
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
1 A Steganographic Scheme for Secure Communications Based on the Chaos and Eular Theorem Der-Chyuan Lou and Chia-Hung Sung IEEE Transactions on Multimedia,
1 Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform Source : IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 13, NO. 8,
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Palette Partition Based Data Hiding for Color Images Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, and Chien-Ting Huang Speaker : Yu-Chiang Li.
A lossless data hiding scheme based on three- pixel block differences Ching-Chiuan Lin and Nien-Lin Hsueh Pattern Recognition, Vol. 41(4), April 2008 Pages.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
1 An LSB Substitution base Information Hiding Technique 國立彰化師範大學 資訊工程學系教授兼系主任 蕭如淵 (Ju-Yuan Hsiao) 中華民國九十四年十二月十六日.
1 LSB Matching Revisited Source: IEEE Signal Processing Letters (Accepted for future publication) Authors: Jarno Mielikainen Speaker: Chia-Chun Wu ( 吳佳駿.
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
2003/04/291 Hiding data in images by optimal moderately- significant-bit replacement Wang, Ran-Zan, Lin, Chi-Fang, and Lin, Ja-Chen, IEE Electronics Letters,
Advisor: Chin-Chen Chang1, 2
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Information Steganography Using Magic Matrix
Reversible data hiding scheme based on significant-bit-difference expansion Sourse: IET Image Processing ( Volume: 11, Issue: 11, ), Pages 1002.
A Data Hiding Scheme Based Upon Block Truncation Coding
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images Source: Symmetry, vol. 8, no. 6, June.
A Color Image Hidden in a
Embedding Secrets Using Magic Matrices
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
A Restricted Region-based Data-hiding Scheme
Some Novel Steganographic Methods for Digital Images
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding Scheme Using Two Steganographic Images
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Information Steganography Using Magic Matrix
Source: IEEE Access, Vol. 6, Dec. 2017, pp
Data hiding based Hamming code
Data hiding method using image interpolation
Dynamic embedding strategy of VQ-based information hiding approach
Reporter :Liang, Min-Chen Date :2003/05/06
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
Chair Professor Chin-Chen Chang Feng Chia University
Reporter :Liang, Min-Chen Date :2003/05/06
Reporter :Liang, Min-Chen Date :2003/05/06
Data hiding method using image interpolation
Chair Professor Chin-Chen Chang Feng Chia University
Source: Signal Processing: Image Communication 16 (2001) pp
Partial reversible data hiding scheme using (7, 4) hamming code
Novel Multiple Spatial Watermarking Technique in Color Images
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
Source: IEICE-Transactions on Info and Systems
A Data Hiding Scheme Based Upon Block Truncation Coding
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Information Hiding Techniques Using Magic Matrix
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Steganographic Systems for Secret Messages
Lossless Data Hiding in the Spatial Domain for High Quality Images
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
Adopting secret sharing for reversible data hiding in encrypted images
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Data hiding in Least Significant Bit (LSB) Speaker: Feng Jen-Bang ( 馮振邦 )

2 Outline Data Hiding by LSB Simple LSB LSB with Permutation Find Optimal Solution Use Genetic Algorithm Use Dynamic Algorithm Use Modulus Function Comparisons Comments

3 Data Hiding by LSB Extract does not need cover image Capacity is 1/8 – 1/2 PSNR is about Embedded by LSB Secret message Cover image Stego image Secret message Extract

4 Simple LSB 0 ( ) ( ) ( ) ( ) ( ) 2 Embedded with 6 (110) ( ) 2 Usually hidden in 1 to 4 bits k = ( ) 2 = (A 6 1) 16

5 LSB with Permutation Cover pixels: c 0, c 1, …, c n Secret pieces: s 0, s 1, …, s n k bits each Exchange values (0, 1, …, 2 k -1)  (v 0, v 1, …, v 2 k -1 ) Exchange positions Permutation keys: k 0, k 1 k 1 is relatively prime to n

6 LSB with Permutation Cover image Secret message (C 2) 16 = ( ) 2 k = 2 n = 4 Value permutation (0, 1, 2, 3)  (2, 0, 1, 3) k 0 = 1 k 1 = 3 ( ) 2  ( ) 2 value permu  ( ) 2 pos. permu  ( ) 2 i ’ = (1, 0, 3, 2) Stego image

7 Finding Optimal Solution Find the optimal solution of value permutation. k 0 and k 1 are keys Too much computation of exhausted method 2 k ! possible permutations Cover image Stego image Value permutation (0, 1, 2, 3)  (2, 0, 1, 3) Cover image Simple LSB Sum of square error = 6 Sum of square error = 7

8 Image Hiding by Optimal LSB Substitution and Genetic Algorithm Ran-Zan Wang, Chi-Fang Lin, and Ja-Chen Lin Pattern Recognition, Vol. 34, 2001, pp Use genetic algorithm to find nearly optimal solution of value permutations 10 random permus. Crossover Mutation Fitness function 10 pairs Reproduction P=0.1 Nearly optimal Solution

9 Image Hiding by Optimal LSB Substitution and Genetic Algorithm Crossover Mutation Fitness function is the sum of square errors.

10 Finding Optimal Least Significant Bit Substitution in Image Hiding by Dynamic Programming Strategy Chin-Chen Chang, Ju-Yuan Hsiao, and Chi-Shiang Chan Pattern Recognition, Vol. 36, 2003, pp Reduce complexity Find real optimal solution

11 Finding Optimal Least Significant Bit Substitution in Image Hiding by Dynamic Programming Strategy m i,j = sum of square errors that change j to i

12 Finding Optimal Least Significant Bit Substitution in Image Hiding by Dynamic Programming Strategy Optimal permutation (0, 2, 1, 3)

13 Use Modulus Functions A Simple and High-Hiding Capacity Method for Hiding Digit-by-Digit Data in Images Based on Modulus Function Chih-Ching Thien, Ja-Chen Lin. Pattern Recognition, Vol. 36, 2003, pp Hiding Data in Images by Simple LSB Substitution Chi-Kwong Chan, L.M. Cheng Pattern Recognition, Vol. 37, 2004, pp

14 Use Modulus Functions Cover pixel ( ) 2 Secret piece (110) 2 ( ) 2 Square error = 5 2 = 25 Consider ( ) 2 + (110) 2 - (1000) 2 = ( ) 2 Square error = 3 2 = 9 K = 3 If (r – s) > 2 k-1 c = c + 2 k If (r – s) < 2 k-1 c = c – 2 k r c s

15 Comparisons Schemes k Simple LSB GeneticDynamicModulus *

16 Comments The most simple and easy way A blind method Almost largest capacity Applied wildly