Reversible Data Hiding for Point-Sampled Geometry JOURNAL OF INFORMATION SCIENCE AND ENGINEERING Vol. 23, pp.1889-1900, 2007 PENG-CHENG WANG AND CHUNG-MING.

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Queen’s University, Kingston, Canada
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Watermarking 3D Objects for Verification Boon-Lock Yeo Minerva M. Yeung.
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
1 影像偽裝術的最新發展 張真誠 逢甲大學 講座教授 中正大學 榮譽教授 清華大學 合聘教授 Watermarking 2. Image authentication 3. Secret sharing 4. Visual cryptography 5. Steganography.
Extended Gaussian Images
3D Shape Histograms for Similarity Search and Classification in Spatial Databases. Mihael Ankerst,Gabi Kastenmuller, Hans-Peter-Kriegel,Thomas Seidl Univ.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
Fifth International Conference on Information
Robust Mesh Watermarking Emil Praun Hugues Hoppe Adam Finkelstein.
Geometric Modeling Surfaces Mortenson Chapter 6 and Angel Chapter 9.
A Novel Scheme for Hybrid Digital Video Watermarking By Pat P. W. Chan Supervised by Michael R. Lyu 2/2/2004 Computer Science and Engineering Department.
Digital Watermarking Parag Agarwal
Mathematical fundamentals of 3D computer graphics 1.1 Manipulating three-dimensional structures 1.2 Vectors and computer graphics 1.3 Rays and computer.
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
A public fragile watermarking scheme for 3D model authentication Chang-Min Chou, Din-Chang Tseng Computer-Aided Design Vol. 38 (Nov. 2006) 1154–1165 Reporter:
Digital Image Processing Lecture 20: Representation & Description
Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Reversible medical image watermarking based on wavelet histogram shifting Source: Authors: Reporter: Date: The Imaging Science Journal, Vol. 59, No. 1,
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
REVERSIBLE AND HIGH- CAPACITY DATA HIDING IN MEDICAL IMAGES 報告學生:翁偉傑 1 Published in IET Image Processing Received on 25th June 2008 Revised on 15th June.
Bit-4 of Frequency Domain-DCT Steganography Technique 1 Nedal M. S. Kafri and Hani Y. Suleiman Networked Digital Technologies, NDT '09. First International.
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
3D polygonal meshes watermarking using normal vector distributions Suk-Hawn Lee, Tae-su Kim, Byung-Ju Kim, Seong-Geun Kwon.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
A Novel Technique for Image Authentication in Frequency Domain using Discrete Fourier Transformation Technique (IAFDDFTT) Malaysian Journal of Computer.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
An Efficient Information Hiding Algorithm for Polygon Models EUROGRAPHICS 2005 Chung-Ming Wang and Yu-Ming Cheng Reporter: T. Y. Chen 9 March 2007.
ECE643 Course Project, Fall /21/20081 Optimum histogram pair based image lossless data embedding By G. Xuan, Y. Q. Shi, etc. Summarized By: Zhi.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
A lossless data hiding scheme based on three- pixel block differences Ching-Chiuan Lin and Nien-Lin Hsueh Pattern Recognition, Vol. 41(4), April 2008 Pages.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Advanced Science and Technology Letters Vol.35(Security 2013), pp Image Steganograpy via Video Using Lifting.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Secure blind image steganographic technique using discrete fourier transformation Faisal Alturki, Department of Electronic Engineering College of Technological.
多媒體網路安全實驗室 Source: IEICE Trans. Fundamentals, Vol. E90-A, No. 4, April 2007, pp Authors:Hong Lin Jin, Masaaki Fujiyoshi, Hitoshi Kiya Speaker:Cheng.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
3D mesh watermarking Wu Dan Introduction Spatial domain (00 EG) Transformed domain (02 EG) K=D-A; (D ii is a degree of vertex v i, A is an.
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
Digital Watermarking and Its Applications
Advisor: Chang, Chin-Chen Student: Chen, Chang-Chu
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
(k, n)-Image Reversible Data Hiding
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Information Hiding Technology: Current Research and Future Trend
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
A Secret Information Hiding Scheme Based on Switching Tree Coding
Image Watermarking Chu, Hsi-Cheng.
Increasing Watermarking Robustness using Turbo Codes
Chair Professor Chin-Chen Chang Feng Chia University
A Data Hiding Scheme Based Upon Block Truncation Coding
Parag Agarwal Digital Watermarking Parag Agarwal
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
Data hiding method using image interpolation
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Data hiding method using image interpolation
Partial reversible data hiding scheme using (7, 4) hamming code
Novel Multiple Spatial Watermarking Technique in Color Images
Source: IEICE-Transactions on Info and Systems
Recent Developments in Information Hiding
Lossless Data Hiding in the Spatial Domain for High Quality Images
Rich QR Codes With Three-Layer Information Using Hamming Code
Adopting secret sharing for reversible data hiding in encrypted images
Presentation transcript:

Reversible Data Hiding for Point-Sampled Geometry JOURNAL OF INFORMATION SCIENCE AND ENGINEERING Vol. 23, pp , 2007 PENG-CHENG WANG AND CHUNG-MING WANG Reporter: 陳德祐 2008/2/22

2 Outline Introduction Reversible Data Hiding Point-Sampled Geometry Proposed scheme Conclusions Comments

3 Reversible Information Hiding Scheme~Embedding (1/2) Embedding Payload Secret Key Cover Model Stego Model

4 Reversible Information Hiding Scheme~Extraction (2/2) Secret Key Recovered Payload Extraction Stego Model Recovered Model Reversibility : can exactly recover the original model

5 Classification of Information Hiding Spatial domain  Embed directly information in the spatial domain Geometry : coordinates of points Topology : connectivity among points Appearance attributes : color, normal, texture coordinate Transform domain  Exploit domain properties for information hiding DCT: Discrete Cosine Transform DFT: Discrete Fourier Transform DWT: Discrete Wavelet Transform

6 Requirements of Data Hiding Security  Any data hiding approach must be secure Capacity  The amount of payload as large as possible Robustness  Robustness against various attacks has been less important, because the goal is hide a secret message  Light robustness, such as translation, rotation, and uniform scaling Imperceptibility  Embedding process must be without loss of perceptual quality of the cover model

7 3D Models Representation Polygonal models Point-sampled geometries Parametric surfaces, e.g. non-uniform rational B-spline surfaces (NURBS) Constructive solid geometry (CSG) Voxels Motion data

8 Polygonal Model Vertex, or point Edge

9 Point-Sampled Geometry No edge information

10 The proposed scheme Require one integer and 25 floating points of memory

11 Embedding

12 Sorting Points for Each Axis

13 Interval Interval : State 3

14 Each interval is considered an i-state object.  Prior to data embedding, the i is set to 2.  Embedding d (c bits) into each interval, the i is changed from two to 2 c+1. 2 intervals r=0r=1 2 c intervals 2 c+1 intervals

15 Embedding d (c bits) into the interval, the new state The new X-coordinate value of P n+1 is r = 0  λ = X n +1 – X n n X 2  n X n P 2  n P Interval 1  n P 1  n X 0 1 n X 2  n X n P 2  n P Interval 1  n P 1  n X 01 r = 1  λ= X n +1 - ( X n +X n+2 )/2

16 Embed a Bit into the Interval Secret key : generate a random sequence of intervals State: r =0 Embed a Bit 1 (c=1) Reversibility New state >s = 01 (2) = 2 * = 1 (10) Left shift r = 0  λ = X n +1 – X n

17 Embed a Bit into the Interval State:r = 1 Embed a Bit 0 New state > 10 (2) = 2 * = 2 (10) Left shift r = 1  λ= X n +1 - ( X n +X n+2 )/2

18 Embedding model Stego keySecret Payload modelCover modelcover and payload Recovered modelcover of centergravity and axes X-Y-Z model stego Attacked Extraction onRegistrati model Stego model stego of centergravity and axes X-Y-Z model stego of volumebounding theoflength axis-X

19 Registration Correct the attacks of translation and rotation  Compute the 3 principal axes and gravity center of the attacked stego model  Translate the coordinates of the attacked stego model to its PCA-coordinate system  Translate the coordinates of the attacked stego model to the PCA-coordinate system of the stego model using the 3 principal axes and gravity center of the stego model Correct the attacks of uniform scaling  Compute the X -axis length of the bounding volume of the attacked stego model  Scale the attacked stego model so that the X -axis length of the scaled model is equal to the X -axis length of the stego model

20 Registration X Z Y Stego model Attacked stego model Registration PCA attacked -----> PCA stego Coordinate translation Attacked model ----> Stego model Scaling Compute PCA axes and centroid of attacked stego model Given PCA axes and centroid of stego model Compute X-axis length of the bounding box of attacked stego model Given X-axis length of the bounding box of stego model

21 Extraction

22 Extraction Find a sequence of intervals by the secret key, e.g. Extract a data bit from the interval by the X - coordinate value Restore the original X -coordinate value Repeat these steps for all the intervals

23 Extraction State = 2 (10) = 10 (2) A bit 0 has been previously embedded Original state = 1 λ

24 Data Capacity Model : m points Each axis : m/2 intervals Capacity = 3*m/2 bits= 1.5m bits Time complexity :

points points points points

26 Experimental Results Cover Number of points Data capacity (bits) RMS ratio PCA execution time (seconds) Embedding execution time (seconds) Extraction execution time (seconds) Dinosaur x Horse x Bunny x Venus x

27 Conclusions The first ones to propose reversible data hiding algorithms for point-sampled geometry Improvement on the capacity Using little information to recover the original model Robustness against translation, rotation, and uniform scaling

28 Comments Improve the capacity: 1.5m bits  3m bits  除 1st 不藏外,其他各點可依序 ( 亦可不依序 ) 藏 入 1 bit Distortion vs. capacity The capacity is high, but the scheme is not really reversible! (Euclidean distance  truncation error )

可逆的向量地圖 資料隱藏演算法 第十七屆全國資訊安全會議 2007 ISC

30 嵌入流程 ~ 訊息嵌入

31 嵌入流程 ~ 訊息嵌入

32 嵌入流程 ~ 訊息嵌入 Embed 1 Embed 0

33 嵌入流程 ~ 訊息嵌入

34