Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp. 1681-1689 Authors: Yulin Wang and Alan Pearmain.

Slides:



Advertisements
Similar presentations
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
Advertisements

Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:
Watermarking For Image Authentication Presented by San-Hao Wang.
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
Huijuan Yang, Alex C. Kot, IEEE Fellow IEEE Transactions on Multimedia, Vol. 9, No. 3, Apr Multimedia Security Final Project R 葉容瑜 R
DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999.
1 Hiding Data in Images by Simple LSB Substitution Source: Pattern Recognition, Vol. 37, pp , 2004 Authors: Chi-Kwong Chan and L.M. Cheng Speaker:
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
Reversible medical image watermarking based on wavelet histogram shifting Source: Authors: Reporter: Date: The Imaging Science Journal, Vol. 59, No. 1,
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Palette Partition Based Data Hiding for Color Images Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, and Chien-Ting Huang Speaker : Yu-Chiang Li.
1 Commutative Encryption and Watermarking in Video Compression 交換式加密及浮水印法應用在視頻壓縮 IEEE Transactions on Circuits and Systems for Video Technology, VOL. 17,
Data Hiding in Image and Video: Part II—Designs and Applications Min Wu, Heather Yu, and Bede Liu.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
多媒體網路安全實驗室 Source: IEICE Trans. Fundamentals, Vol. E90-A, No. 4, April 2007, pp Authors:Hong Lin Jin, Masaaki Fujiyoshi, Hitoshi Kiya Speaker:Cheng.
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
1 Security of fragile watermarking scheme for image authentication Authors: K. C. Liao, W. B. Lee, and C. W. Liao Source: The Imaging Science Journal,
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
Watermarking Scheme Capable of Resisting Sensitivity Attack
A steganographic method for digital images using side match
Source: The Journal of Systems and Software, Volume 67, Issue 2, pp ,
Image Watermarking Chu, Hsi-Cheng.
Reversible Data Hiding in JPEG Images using Ordered Embedding
Source : Signal Processing, Volume 133, April 2017, Pages
Watermarking for Image Authentication ( Fragile Watermarking )
Feature Space Based Watermarking in Multi-Images
High-capacity image hiding scheme based on vector quantization
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images Source: Symmetry, vol. 8, no. 6, June.
Separable and error-free reversible data hiding in encrypted images
Source: Pattern Recognition, Vol. 38, Issue 11, December 2005, pp
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
A reversible and secure patient information hiding system for IoT driven e-health Source : International Journal of Information Management, Available online.
Reversible Data Hiding in JPEG Images
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Data hiding method using image interpolation
Source: Pattern Recognition Letters, Article In Press, 2007
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Data hiding method using image interpolation
Partial reversible data hiding scheme using (7, 4) hamming code
Novel Multiple Spatial Watermarking Technique in Color Images
An Algorithm for Removable Visible Watermarking
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Blind Reversible Authentication Based on PEE and CS Reconstruction
Source: IEICE-Transactions on Info and Systems
Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images Source: Symmetry, Vol. 10, No. 8, pp. 318.
An imperceptible spatial domain color image watermarking scheme
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Authors: J.J. Murillo-Fuentes
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Source : Digital Signal Processing. Vol. 73, pp , Feb
Lossless Data Hiding in the Spatial Domain for High Quality Images
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
A Quadratic-Residue-based Fragile Watermarking Scheme
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Presentation transcript:

Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain Speaker: Nan-I Wu ( 吳男益 ) Date: 2004/11/25( 四 )

Introduction Blind watermark technique: recover the watermark without using original host data. The proposed method base on relative modulation of the pixel value/DCT coefficient value by referring to its estimated one. One is based on the estimation of pixel luminance in spatial domain Another based on the estimation of block DCT AC coefficients.

The proposed scheme 1 (Spatial Domain) For a nature image, the luminance value of one pixel normally has a relation with its neighbor L Real The mean luminance value: Lmean

The embedding algorithm Embed an one-bit watermark into 3 x 3 sub-block Embedded bit is ‘1’ L Real ≥ L mean + ∆ 1 Embedded bit is ‘0’ L Real < L mean - ∆ 2 As experienced values, ∆ 1 and ∆ 2 are selected as 5- 10% of L Real

The extracting algorithm If L Real ≥ L mean extract bit ‘1’ If L Real < L mean extract bit ‘0’

The proposed scheme 2 (Frequency Domain) RGB to Y C b C r Y = R G B R=100 G=80 B= = 0.299* * *120

DCT The proposed scheme 2 (Frequency Domain)

The embedding algorithm Block1 DC1 Block2 DC2 Block3 DC3 Block4 DC4 Block5 DC5 Block6 DC6 Block7 DC7 Block8 DC8 Block9 DC AC(0,1)= x (DC 4 -DC 6 )/8 Select every nine 8 x 8 blocks as one group, in which 5 watermark bits can be embedded

The embedding algorithm Block1 DC1 Block2 DC2 Block3 DC3 Block4 DC4 Block5 DC5 Block6 DC6 Block7 DC7 Block8 DC8 Block9 DC AC(0,1)= x (DC 4 -DC 6 )/8 Set AC i ≥ AC’ i + ∆ to embed bit ‘1’ Set AC i ≤ AC’ i - ∆ to embed bit ‘0’ ∆ can be chosen as 5-15% of the original AC i value

The embedding algorithm Block1 DC1 Block2 DC2 Block3 DC3 Block4 DC4 Block5 DC5 Block6 DC6 Block7 DC7 Block8 DC8 Block9 DC AC(1,0)= x (DC 2 -DC 8 )/8 Set AC i ≥ AC’ i + ∆ to embed bit ‘1’ Set AC i ≤ AC’ i - ∆ to embed bit ‘0’

The embedding algorithm Block1 DC1 Block2 DC2 Block3 DC3 Block4 DC4 Block5 DC5 Block6 DC6 Block7 DC7 Block8 DC8 Block9 DC AC(0,2)= x (DC 4 +DC 6 – 2 x DC 5 )/8 Set AC i ≥ AC’ i + ∆ to embed bit ‘1’ Set AC i ≤ AC’ i - ∆ to embed bit ‘0’

The embedding algorithm Block1 DC1 Block2 DC2 Block3 DC3 Block4 DC4 Block5 DC5 Block6 DC6 Block7 DC7 Block8 DC8 Block9 DC AC(2,0)= x (DC 2 +DC 8 – 2 x DC 5 )/8 Set AC i ≥ AC’ i + ∆ to embed bit ‘1’ Set AC i ≤ AC’ i - ∆ to embed bit ‘0’

The embedding algorithm Block1 DC1 Block2 DC2 Block3 DC3 Block4 DC4 Block5 DC5 Block6 DC6 Block7 DC7 Block8 DC8 Block9 DC AC(1,1)= x (DC 1 +DC 9 – DC 3 - DC 7 )/8 Set AC i ≥ AC’ i + ∆ to embed bit ‘1’ Set AC i ≤ AC’ i - ∆ to embed bit ‘0’

The extracting algorithm The original image is not require for the watermark bit detection, only the comparison of the relative value between AC i and its estimated value AC’ i is needed. If AC i > AC’ i, then the extracted bit is ‘1’, If AC i < AC’ i, then the extracted bit is ‘0’. Of course, if AC i =AC’ i, there is uncertainly about whether the watermark bit is a ‘1’ or ‘0’.

Experimental Results

Conclusion This paper presents a kind of estimation based blind image watermarking technique. Our DCT technique achieves the optimal trade-off among imperceptibility capacity and robustness.