Reversible Date Hiding Based on Histogram Modification of pixel Differences IEEE Transactions on circuits and systems for video technology, VOL. 19, NO.

Slides:



Advertisements
Similar presentations
作者:Soo-Chang Pei, Io-Kuong Tam
Advertisements

Reversible Data Hiding Based on Two-Dimensional Prediction Errors
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan.
A reversible data hiding method by histogram shifting in high quality medical images Author: Li-Chin Huang, Lin-Yu Tseng, Min-Shiang Hwang Source: The.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Piyu Tsia,Yu-Chen Hu,Hsiu-Lien Yen Signal Processing 日期 :1 月 4 號 報告者 : 許睿中.
Reversible data hiding based on histogram shifting scheme Reporter: Date: Wan-Yu Lu 2012/12/13.
Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Using quad smoothness to efficiently control capacity–distortion of reversible data hiding Chi-Nan Lin, Daniel J. Buehrer, Chin-Chen Chang, Tzu-Chuen Lu.
A Secure Remote User Authentication Scheme with Smart Cards Manoj Kumar 報告者 : 許睿中 日期 :
Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
Optimal Histogram-pair and Prediction-error Based Image Reversible Data Hiding 1 Computer Science, Tongji University, Shanghai, China 2 ECE, New Jersey.
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
Reversible watermarking Wu Dan Introduction What?
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
A lossless data hiding scheme based on three- pixel block differences Ching-Chiuan Lin and Nien-Lin Hsueh Pattern Recognition, Vol. 41(4), April 2008 Pages.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
1 LSB Matching Revisited Source: IEEE Signal Processing Letters (Accepted for future publication) Authors: Jarno Mielikainen Speaker: Chia-Chun Wu ( 吳佳駿.
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
Source: IEEE Signal Processing Letters (Accepted)2016
(k, n)-Image Reversible Data Hiding
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
Image camouflage by reversible image transformation
Advisor: Chin-Chen Chang1, 2
Reversible Data Hiding in JPEG Images using Ordered Embedding
Source : Signal Processing, vol. 150, pp ,  September 2018
Yongjian Hu, Member, IEEE, Heung-Kyu Lee, Kaiying Chen, and Jianwei Li
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
A Restricted Region-based Data-hiding Scheme
Source: Information Sciences, 2018, accpeted.
Source : Signal Processing, vol. 126, pp ,  November 2016
Skewed Histogram Shifting for Reversible Data Hiding using a Pair of Extreme Predictions Source: IEEE Transactions on Circuits and Systems for Video Technology(
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Improved joint reversible data hiding in encrypted images
Reversible Data Hiding
Source:. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL
Sourse: IEEE Transactions on Circuits and Systems for Video Technology
Source : Journal of Visual Communication and Image Representation, vol
Data hiding method using image interpolation
Skewed Histogram Shifting for Reversible Data Hiding using a Pair of Extreme Predictions Source: IEEE Transactions on Circuits and Systems for Video Technology(
Information Hiding and Its Applications
Source : Journal of Visual Communication and Image Representation, vol
High Capacity Data Hiding for Grayscale Images
Data hiding method using image interpolation
New Framework for Reversible Data Hiding in Encrypted Domain
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
Source: IEEE Transactions on multimedia, Vol. 21, No
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
Source: IEICE-Transactions on Info and Systems
De-clustering and Its Application to Steganography
Information Protection and Recovery with Reversible Data Hiding
Authors: Jun Tian Speaker: J.H. Liu
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Dynamic improved pixel value ordering reversible data hiding
An Efficient Spatial Prediction-Based Image Compression Scheme
LSB matching revisited
Lossless Data Hiding in the Spatial Domain for High Quality Images
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Reversible data hiding in encrypted binary images by pixel prediction
Presentation transcript:

Reversible Date Hiding Based on Histogram Modification of pixel Differences IEEE Transactions on circuits and systems for video technology, VOL. 19, NO. 6,JUNE 2009 Wei-Liang Tai, Chia-Ming Yeh, Chin-Chen Chang 報告者 : 許睿中 日期 :6.20

Outline Introductions Proposed Experimental results Conclusions

Introductions Ni et al. proposed ”Reversible data hiding” ◦ While multiple pairs of peak and minimum points can be used for embedding, the pure payload is still a little low. ◦ Multiple pairs of peak and minimum point must be transmitted to the recipient.

Proposed x i-1 : predictive pixel x i : original pixel x d peak 23 y Secret=101 y i =x i +b =2+1 =3

Proposed x i-1 : predictive pixel x i : original pixel x d peak Secret=101 y i =x i -1 =2-1 =1 213 y

Proposed peak

Proposed y 2 x d i =y i -x i-1 =3-2 =1 x i =y i -1 =3-1 =2 2 b=1

Proposed y peak 2 x d i =y i -x i-1 =4-2 =2 x i =y i -1 =4-1 =

Proposed-Binary Tree Structure Binary Tree Structure number of peak point=2 L

Proposed-Prevent Overflow or Underflow

Proposed-Embedding x d Secret=101 y i =x i -2 L =133-4 = L L+1 0 2L2L -2 L Embedding level L=2 y

Proposed-Embedding x d Secret=101 y i =x i +(d i +b) =139+(3+1) = L L+1 0 2L2L -2 L Embedding level L=2 y Secret=

Proposed-Embedding x d Secret=101 y i =x i +2 L =136+4 = L L+1 0 2L2L -2 L Embedding level L=2 y

Proposed-Embedding L L+1 0 2L2L -2 L 2 L+1 -2 L+1

Proposed-Extraction y x i =y i +2 L =128+4 = L L L+1 -2 L+1 Embedding level L=2 x 150 d i =y i -x i-1 = =

Proposed-Extraction y L L L+1 -2 L+1 Embedding level L=2 x 150 d i =y i -x i-1 = = b=

Experimental results

Conclusion In this letter, we have presented an efficient extension of the histogram modification technique by considering the differences between adjacent pixels rather than simple pixel value. One common drawback of virtually all histogram modification techniques is that they must provide a side communication channel for pairs of peak and minimum points. To solve this problem, we introduced a binary tree that predetermines the multiple peak points used to embed messages; thus, the only information the sender and recipient must share is the tree level L.