Reporter :Chien-Wen Huang Date :2009.10.24 Information Sciences, Vol. 176, No. 22, Nov. 2006, pp. 3393-3408 Received 29 December 2004; received in revised.

Slides:



Advertisements
Similar presentations
CHEN XIAOYU HUANG. Introduction of Steganography A group of data hiding technique,which hides data in undetectable way. Features extracted from modified.
Advertisements

Reversible Data Hiding Based on Two-Dimensional Prediction Errors
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A reversible data hiding method by histogram shifting in high quality medical images Author: Li-Chin Huang, Lin-Yu Tseng, Min-Shiang Hwang Source: The.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
Reversible Image Watermarking Using Interpolation Technique Source: IEEE Transcation on Information Forensics and Security, Vol. 5, No. 1, March 2010 Authors:
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
1 An Efficient VQ-based Data Hiding Scheme Using Voronoi Clustering Authors:Ming-Ni Wu, Puu-An Juang, and Yu-Chiang Li.
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Palette Partition Based Data Hiding for Color Images Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, and Chien-Ting Huang Speaker : Yu-Chiang Li.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
1 Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems Adviser: Chih-Hung Lin Speaker : Chia-Wei Chang Date:2009/10/06.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
1 LSB Matching Revisited Source: IEEE Signal Processing Letters (Accepted for future publication) Authors: Jarno Mielikainen Speaker: Chia-Chun Wu ( 吳佳駿.
1 Security of fragile watermarking scheme for image authentication Authors: K. C. Liao, W. B. Lee, and C. W. Liao Source: The Imaging Science Journal,
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
Advisor: Chang, Chin-Chen Student: Chen, Chang-Chu
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
Palette Partition Based Data Hiding for Color Images
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
A steganographic method for digital images using side match
Data Mining and Its Applications to Image Processing
Advisor: Chin-Chen Chang1, 2 Student: Yi-Hui Chen2
Reversible Data Hiding in JPEG Images using Ordered Embedding
Source : Signal Processing, Volume 133, April 2017, Pages
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Source :Journal of visual Communication and Image Representation
Chair Professor Chin-Chen Chang Feng Chia University
指導教授: Chang, Chin-Chen (張真誠)
A Data Hiding Scheme Based Upon Block Truncation Coding
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images Source: Symmetry, vol. 8, no. 6, June.
Hiding Data in a Color Palette Image with Hybrid Strategies
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
A Restricted Region-based Data-hiding Scheme
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding Scheme Using Two Steganographic Images
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Source : Journal of Visual Communication and Image Representation, vol
Data hiding method using image interpolation
Dynamic embedding strategy of VQ-based information hiding approach
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Information Hiding and Its Applications
Digital Steganography Utilizing Features of JPEG Images
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
Chair Professor Chin-Chen Chang Feng Chia University
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
EarthTour Presentations
Chair Professor Chin-Chen Chang Feng Chia University
Partial reversible data hiding scheme using (7, 4) hamming code
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
De-clustering and Its Application to Steganography
A Data Hiding Scheme Based Upon Block Truncation Coding
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Lossless Data Hiding in the Spatial Domain for High Quality Images
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
A Restricted Region-based Data-hiding Scheme
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised form 24 January 2006; accepted 3 February

1. Introduction 2. Related Work 3. The Proposed Methods  Hiding bitmap files  Hiding general data files 4. Experimental Results 5. Discussion and Conclusions 2

The most well-known steganographic technique-LSB. RLE (Run-Length Encoding)  Compression standard in fax transmissions and bitmap-file coding. Two efficient data hiding methods by run-length encoding.  BRL and GRL 3

 Wu and Tsai’s steganographic method 4

 Chang and Tseng’s steganographic method 5

RLE  Example1 : AAAAABBBBAA 5A4B2A  Example2:

 The host image is partitioned into non-overlapping consecutive two-pixel blocks by zigzag scanning. 7

Hiding bitmap files  BRL hides the run value in and the run count in.  The range that the remainder of modulo k falls in – namely from 0 to (k-1) Thus,the definition of sign is as follows: 8

 The hiding process of BRL is formulated as follows:  The extraction scheme is as follows: 9

 Example:k=5, hiding secret bits: (3,1) (5,0) (4,1) (V 1, C 1 ) = (12, 8), (V 2, C 2 ) = (2, 3), (V 3, C 3 ) = (240, 254). [LSB match] 1.8 -> 3 =8+x mod k = 3-1 x=-1 or 4 [LSB replace] > 1 =12+1=13 RLE 10

Hiding general data files  In GRL, the value of is the number of 1’s in, and the value of is the sequential order of combinations by.  The following mapping function f, where is set to be zero if n is smaller than k : 11

 the value of can be obtained from using  The recursive function : 12

 Example: Six secret bits are to be embedded in the pair of original pixels (43, 58) N(1)=1,N(2)=1,N(3)=2,N(4)=2,N(5)=

 The extraction process of (45,53) and n= S 5 S 4 S 3 S 2 S 1 S 0 s 0 :s 5 s 5 =C(5,3)=10<13  ’1’ num =13-10=3 14 s 0 :s 4 s 4 =C(4,2)=6>3  ’0’ s 0 : s 3 s 3 =C(3,2)=3 ≦ 3  ’1’ num = 3-3 = 0 s 0 :s 2 s 2 =‘0’ ; s 0 :s 1 s 1 =‘0’, s 0 =‘1’

15

16

Comparison of PSNR and capacities using Lena as the cover image. 17

Comparison of PSNR and capacities using Baboon as the cover image. 18

No need to refer to the original image during the extraction process. Probably be extended to embedding secret data in compressed images using VQ or JPEG techniques. 19