1 A HIGH-CAPACITY STEGANOGRAPHY SCHEME FOR JPEG2000 BASELINE SYSTEM Liang Zhang, Haili Wang, and Renbiao Wu, Senior Member, IEEE 1 IEEE TRANSACTIONS ON.

Slides:



Advertisements
Similar presentations
QR Code Recognition Based On Image Processing
Advertisements

Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Hongliang Li, Senior Member, IEEE, Linfeng Xu, Member, IEEE, and Guanghui Liu Face Hallucination via Similarity Constraints.
A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan.
1 Single Reference Frame Multiple Current Macroblocks Scheme for Multiple Reference IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY Tung-Chien.
Image deblocking using local segmentation By Mirsad Makalic Supervisor: Dr. Peter Tischer.
Notes by Shufang Wu Embedded Block Coding with Optimized Truncation - An Image Compression Algorithm Notes by Shufang Wu
Image and Video Compression
Still Image Conpression JPEG & JPEG2000 Yu-Wei Chang /18.
CS Spring 2012 CS 414 – Multimedia Systems Design Lecture 8 – JPEG Compression (Part 3) Klara Nahrstedt Spring 2012.
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
IMAGE COMPRESSION USING BTC Presented By: Akash Agrawal Guided By: Prof.R.Welekar.
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Multiple Image Watermarking Applied to Health Information Management
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
Bit-4 of Frequency Domain-DCT Steganography Technique 1 Nedal M. S. Kafri and Hani Y. Suleiman Networked Digital Technologies, NDT '09. First International.
8. 1 MPEG MPEG is Moving Picture Experts Group On 1992 MPEG-1 was the standard, but was replaced only a year after by MPEG-2. Nowadays, MPEG-2 is gradually.
1 Embedding Compression in Chaos- Based Cryptography 嵌入壓縮功能到混亂加密法 IEEE Transactions on Circuits and Systems—II: Express Briefs, VOL. 55, NO. 11, NOV
Low-Power H.264 Video Compression Architecture for Mobile Communication Student: Tai-Jung Huang Advisor: Jar-Ferr Yang Teacher: Jenn-Jier Lien.
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
ECE643 Course Project, Fall /21/20081 Optimum histogram pair based image lossless data embedding By G. Xuan, Y. Q. Shi, etc. Summarized By: Zhi.
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Introduction to Steganalysis Schemes Multimedia Security.
Wireless communications and mobile computing conference, p.p , July 2011.
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP Yongfeng Huang;Rui Miao Department of Electronic Engineering,
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
Benchmarking steganographic and steganalysis techniques Electronic Imaging of SPIE 2005 Authors:Kharrazi, Mehdi, Husrev T. Sencar, and Nasir Memon Department.
Palette Partition Based Data Hiding for Color Images Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, and Chien-Ting Huang Speaker : Yu-Chiang Li.
JPEG - JPEG2000 Isabelle Marque JPEGJPEG2000. JPEG Joint Photographic Experts Group Committe created in 1986 by: International Organization for Standardization.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Advanced Science and Technology Letters Vol.35(Security 2013), pp Image Steganograpy via Video Using Lifting.
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
Speaker: Po-Kai Shen Advisor: Tsai-Rong Chang Date: 2010/11/16 1 Steganalysis of LSB matching based on statistical modeling of pixel difference distributions.
1 Robust and transparent watermarking scheme for colour images Speaker : Po-Hung Lai Adviser : Chih-Hung Lin Date :
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
1 Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems Adviser: Chih-Hung Lin Speaker : Chia-Wei Chang Date:2009/10/06.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
1 Commutative Encryption and Watermarking in Video Compression Ieee Transactions On Circuits And Systems For Video Technology, Vol. 17, No. 6, June 2007.
SIMD Implementation of Discrete Wavelet Transform Jake Adriaens Diana Palsetia.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
Evaluation of Gender Classification Methods with Automatically Detected and Aligned Faces Speaker: Po-Kai Shen Advisor: Tsai-Rong Chang Date: 2010/6/14.
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
MP3 and AAC Trac D. Tran ECE Department The Johns Hopkins University Baltimore MD
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
Presenting: Yossi Salomon Noa Reiter Guides: Dr. Ofer Hadar Mr. Ehud Gonen.
An improved SVD-based watermarking scheme using human visual characteristics Chih-Chin Lai Department of Electrical Engineering, National University of.
Advisor: Chang, Chin-Chen Student: Chen, Chang-Chu
Source: IEEE Signal Processing Letters (Accepted)2016
FHTW Wavelet Based Video Compression Using Long Term Memory Motion-Compensated Prediction and Context-based Adaptive Arithmetic Coding D.Marpe, H.L.Cycon,
Robustness Evaluation of Perceptual Watermarks
Source : Signal Processing, Volume 133, April 2017, Pages
Increasing Watermarking Robustness using Turbo Codes
Presenter by : Mourad RAHALI
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
A Data Hiding Scheme Based Upon Block Truncation Coding
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding Scheme Using Two Steganographic Images
Data hiding method using image interpolation
Dynamic embedding strategy of VQ-based information hiding approach
Information Hiding and Its Applications
Digital Steganography Utilizing Features of JPEG Images
A Data Hiding Scheme Based Upon Block Truncation Coding
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Department of Computer Science, University of Central Florida ,Orlando
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

1 A HIGH-CAPACITY STEGANOGRAPHY SCHEME FOR JPEG2000 BASELINE SYSTEM Liang Zhang, Haili Wang, and Renbiao Wu, Senior Member, IEEE 1 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 18, NO. 8, AUGUST 2009 Received September 09, 2008; revised April 01, First published April 24, 2009; current version published July 10, Adviser: Chih-Hung Lin Speaker:Po-Kai Shen Date : 98/11/24

22 Outline 1.Author 2.Introduction 3.Jpeg2000 baseline coding system 4.Steganography based on twice bit-plane encoding 5.Redundancy evaluation 6.Synchronization information and scrambling measure 7.Simulation 8.Conclusion

33 Author(1)  Liang Zhang was born in He received the Ph.D. degree in electronic information engineering from Tianjin University, Tianjin, China, in  He is an Associate Professor. He is currently with the Tianjin Key Lab of Advanced Signal Processing in Civil Aviation University of China.  His current research interests include image processing, information hiding, and intelligent visual surveillance.

44 Author(2)  Haili Wang was born in  She is now a postgraduate specializing in signal processing.  Her current research interests include image processing and information hiding.

55 Author(3)  Renbiao Wu (M’95–SM’01) received the B.Sc. And M.Sc. degrees from Northwestern Polytechnic University, Xian, China, in 1988 and 1991, respectively, and the Ph.D. degree from Xidian University, Xian,in 1994, all in electrical engineering.  From May 1994 to February 1996, he was a Postdoctoral Fellow at the College of Marine Engineering, Northwestern Polytechnic University, where he was promoted to Associate Professor in December  From March 1996 to February 1997, he was a Visiting Scholar at the Center for Transportation Research, Virginia Polytechnic Institute and State University,Blacksburg.

66  From March 1997 to December 1998, he was a Visiting Scholar at the Department of Electrical and Computer Engineering, University of Florida,Gainesville.  Since January 1999, he has been with the Tianjin Key Lab for Advanced Signal Processing, Civil Aviation University of China, Tianjin, China, where he is currently a Chaired Professor and director of the lab. Author(3)

77  From August 2004 to January 2005, he was a Distinguished Research Scholar in the Department of Electrical and Electronic Engineering, Imperial College London, London, U.K. Dr. Wu was the recipient of the National Outstanding Young Investigator Award of China in  His research interests include space-time adaptive processing, adaptive arrays, feature extraction and image formation, spectral estimation and their applications to radar and wireless communication systems. Author(3)

88 Introduction 1)Modern information hiding technology is an important branch of information security. 2)Steganography three competing aspects : Capacity ‚Security ƒRobustness

99 Introduction 3)Section III shows procedures of JPEG2000 baseline system and points out the problem due to bitstream truncation. 4)Section IV describes the principle of twice bit-plane encoding and illustrates the operation procedures. 5)Section V gives a detailed description on redundancy evaluation, and explains how embedding points and their intensity are adjusted.

10 Introduction 6)Section VI, we define measures for synchronization and security. 7)Section VII shows the simulation results. 8)Section VIII draws a conclusion.

11 Jpeg2000 baseline coding system  JPEG2000 uses uniform scalar quantizers with enlarged “deadzones.”  Truncating the embedded bitstream associated with any given codeblock has the effect of quantizing the wavelet coefficients in that codeblock more coarsely.  That is to say, there still exists a lossy procedure after entropy encoding.

12 Steganography based on twice bit-plane encoding

13 Steganography based on twice bit-plane encoding 1)There are three sub-steps involved in the determination of embedding points and embedding intensity for a code block. 2)Scrambled synchronization information and secret messages are embedded into the selected embedding points from the lowest embed-allowed bit-plane to higher ones. 3)Secondary bit-plane encoding is operated after information embedding.

14 Steganography based on twice bit-plane encoding  Ensured at the cost of increased computational complexity and slightly changed compression ratio.

15 Redundancy evaluation  Where is the quantized wavelet coefficient with the bits lowerthan the highest no-zero bit are replaced by zeros.  The parameter is the quantization step of the wavelet coefficient. The parameter assumes a value between 0 and 1. According to, a typical value of is 0.7. The result of the first step is denoted as (1)

16 Redundancy evaluation  In the second step, the neighborhood masking effect is exploited to process the wavelet coefficients as the following:(2)  The neighborhood contains wavelet coefficients within a window of N by N, centered at the current position.  The parameter is the total number of wavelet coefficients in the neighborhood. (2)

17 Redundancy evaluation  The parameter assumes a value between 0 and 1, together with, is used to control the strength of embedding intensity adjustment due to neighborhood masking.  The symbol denotes the neighboring wavelet coefficients greater than or equal to 16, and all its bits lower than the highest no-zero bit are set to be zeros. (2)

18 Redundancy evaluation (3) (4)  In the third step, a weighting factor about brightness sensitivity is used in the processing.  The symbol denotes the subband at resolution level.and with orientation.  The symbol denotes the wavelet coefficient located at in subband.  The levels of discrete wavelet decomposition is k.

19 Redundancy evaluation  The pixel value has a dynamic range of [ -128, 127]. The local average brightness is normalized by dividing 128. Then the result of the third step,, is given by (5)  Quantization redundancy is calculated by the following equation: (6)  The redundancy of the wavelet coefficient can be measured by.

20 Redundancy evaluation  Use the wavelet coefficients with not less than 2 to carry message bits.  The rule of adjustment on embedding points and intensity is as follows: 1)If, then this candidate embedding point should be removed. 2)If, then the embedding capacity of this point is determined to be n bits.

21 Synchronization information and scrambling measure  The first part of the synchronization information is a 2-bit flag that indicates whether a certain code block contains secret message.  The second part of the synchronization information is a 12-bit fragment that indicates the length of the secret message embedded in this code block.

22 Synchronization information and scrambling measure  The third part of the synchronization information is a 12-bit fragment that indicates the length of the secret message embedded in this code block.

23 Synchronization information and scrambling measure  A 64-bit secret key is used as a seed to generate a sequence of pseudo random binary numbers, which is used to scramble the message bits.  N is the total number of message bits.  The symbol denotes the message bit, and the binary number of the pseudo random sequence. The operator ⊕ denotes binary addition. The scrambled message bits, denoted as, are to be embedded into selected wavelet coefficients.

24 Simulation Fig. 6. (a)Original image used as cover media. (b)the binary logo image used as secret message.

25 Simulation  In the first step, the lowest embed-allowed bit-plane of each code block is determined.  In the second step, the wavelet coefficients with magnitudes not less than a given threshold are chosen as candidate embedding points.  In the third step, the candidate embedding points are adjusted image adaptively based on redundancy evaluation to increase hiding capacity  In the fourth step, we embed message bits into the selected wavelet coefficients and finish encoding the stego-image

26 Simulation  The threshold is set to 16  The parameters in those equations are set to be: N=5, α=0.7, β=0.2  Evaluation results for wavelet coefficients A, B, and D are as follows:

27 Simulation 1)If, then this candidate embedding point should be removed. 2)If, then the embedding capacity of this point is determined to be n bits. B: D:

28 Simulation  Experiment shows that information hiding has caused slight change on PSNR (Peak Signal to Noise Ratio) and the actual compression ratio.

29 Simulation  In order to test and measure the effectiveness on hiding capacity enlargement, we simply bypass the redundancy evaluation for comparison. Two methods are tested in the experiments.  Method 1: With redundancy evaluation.  Method 2: Without redundancy evaluation.

30 Simulation Fig. 10. (a) Crown (b) Baboon TABLE I HIDING CAPACITY OF THE THREE TEST IMAGES ( A compression ratio of 0.8 bits per pixel )

31 Simulation Fig. 11. Hiding capacity of different compression ratios.

32 Simulation Fig. 12. Four images in the database

33 Simulation Fig. 13. ROC curves tested on different payloads.

34 Simulation  The detector does work only if the message length greatly exceeds the hiding capacity.  The proposed steganography scheme can be considered undetectable in the situation of lower payloads than hiding capacity.

35 Conclusion  The contributions of this work are mainly focused on dealing with two problems: bitstream truncation and redundancy measurement.

36 備註( 1 )