1 Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems Adviser: Chih-Hung Lin Speaker : Chia-Wei Chang Date:2009/10/06.

Slides:



Advertisements
Similar presentations
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
Advertisements

1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:
Improved PVO-based reversible data hiding Source: Digital Signal Processing, 2014 Authors: Fei Peng, Xiaolong Li,ng Reporter: Min-Hao Wu.
1 Hiding Data in Images by Simple LSB Substitution Source: Pattern Recognition, Vol. 37, pp , 2004 Authors: Chi-Kwong Chan and L.M. Cheng Speaker:
Reversible Image Watermarking Using Interpolation Technique Source: IEEE Transcation on Information Forensics and Security, Vol. 5, No. 1, March 2010 Authors:
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
1 A HIGH-CAPACITY STEGANOGRAPHY SCHEME FOR JPEG2000 BASELINE SYSTEM Liang Zhang, Haili Wang, and Renbiao Wu, Senior Member, IEEE 1 IEEE TRANSACTIONS ON.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
1 Adaptive Data Hiding in Palette images by Color Ordering and Mapping With Security Protection Authors: Chih-Hsuan Tzeng, Zhi-Fang Yang, and Wen-Hsiang.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Palette Partition Based Data Hiding for Color Images Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, and Chien-Ting Huang Speaker : Yu-Chiang Li.
A lossless data hiding scheme based on three- pixel block differences Ching-Chiuan Lin and Nien-Lin Hsueh Pattern Recognition, Vol. 41(4), April 2008 Pages.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
1 A Color Image Hidden in a Grey-Level Image IS&T Third European Conference on Colour in Graphics, Imaging, and Vision, CGIV’2006, pp. 226–231, (Leeds,
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
1 LSB Matching Revisited Source: IEEE Signal Processing Letters (Accepted for future publication) Authors: Jarno Mielikainen Speaker: Chia-Chun Wu ( 吳佳駿.
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
1 Security of fragile watermarking scheme for image authentication Authors: K. C. Liao, W. B. Lee, and C. W. Liao Source: The Imaging Science Journal,
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
Advisor: Chang, Chin-Chen Student: Chen, Chang-Chu
影像偽裝術 Dr. Chin-Chen Chang
Palette Partition Based Data Hiding for Color Images
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
A steganographic method for digital images using side match
Advisor: Chin-Chen Chang1, 2 Student: Yi-Hui Chen2
Reversible Information Hiding Techniques for Digital
Source :Journal of visual Communication and Image Representation
Reversible data hiding scheme based on significant-bit-difference expansion Sourse: IET Image Processing ( Volume: 11, Issue: 11, ), Pages 1002.
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images Source: Symmetry, vol. 8, no. 6, June.
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
An efficient reversible data hiding method for AMBTC compressed images
Source: Information Sciences, 2018, accpeted.
Source : Signal Processing, vol. 126, pp ,  November 2016
Improved joint reversible data hiding in encrypted images
Reversible Data Hiding
Reversible Data Hiding Scheme Using Two Steganographic Images
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Source: IEEE Access, Vol. 6, Dec. 2017, pp
Data hiding based Hamming code
Data hiding method using image interpolation
Dynamic embedding strategy of VQ-based information hiding approach
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
Chair Professor Chin-Chen Chang Feng Chia University
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Data hiding method using image interpolation
EarthTour Presentations
Chair Professor Chin-Chen Chang Feng Chia University
Partial reversible data hiding scheme using (7, 4) hamming code
Novel Multiple Spatial Watermarking Technique in Color Images
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection Source: Multimedia.
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Dynamic improved pixel value ordering reversible data hiding
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
A Quadratic-Residue-based Fragile Watermarking Scheme
Adopting secret sharing for reversible data hiding in encrypted images
Reversible data hiding in encrypted binary images by pixel prediction
Presentation transcript:

1 Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems Adviser: Chih-Hung Lin Speaker : Chia-Wei Chang Date:2009/10/06

2 Introduce of Authors Author:Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang and Hung- Min Sun. IEEE Transactions on Information Forensics and Security, vol. 3, no. 3, september C.-H. Yang is with the Department of Computer Science, National Pingtung University of Education, Pingtung, 900, Taiwan. C.-Y. Weng and H. M. Sun are with the Department of Computer Science, National Tsing-Hua University, Hsinchu, 300, Taiwan, R.O.C. S.-J. Wang, corresponding author, is with the Department of Information Management, Central Police University, Taoyuan, 333, Taiwan, R.O.C. Manuscript received November 1, 2007; revised March 12, Published August 13, 2008 (projected).

3 Outline Introduction Literature Review Proposed Method  Embedding Procedure  Data Extraction Experimental Results Conclusions

4 I.Introduction

5 embedding = Embedding

6 I.Introduction In 2003, Wu and Tsai proposed a “PVD”. In2004, Chang and Tseng proposed a side-match method. In 2005, Park et al. proposed a steganographic scheme based of neighboring pixels. In 2005, Wu et al. proposed the pixel-value differencing (PVD) and LSB replacement method.

7 I.Introduction LSB techniques PVD techniques Side-Match techniques

8 LSB method Fig.1:Wu et al.’s division of “lower level” and “higher level” (Div=15) 

9 II. Literature Review Wu et al.’s PVD and LSB

10 II. Literature Review Example =|56-47|=9 (lower-level) To embed =63,=40=23>Div=15 If level≠ level =55,=48=55-48=7

11 III.Proposed Method 2-3 Division and Division (a) (b) Fig. 2. Two dividing cases: (a) “lower level” and “higher level” and (b) “lower level,” “middle level,” and “higher level.”

12 III.Proposed Method 2-3 Division Division

13 III-1.Embedding steps for l-m-h

14 III-1.Embedding steps for l-m-h

15 III-1.Embedding steps for l-m-h Case6.1 =L-level ≠L-level Case6.2 =M-level =L-level Case6.3 =M-level =H-level Csae6.4 =H-level ≠H-level

16 III-1 Embedding Procedure Example =|64-47|=17 (middle-level) To embed 4-bit LSB =74,=32=42 =M-level =L-level =74,=48=|74-48|=26 After the modified LSB substitution is applied =58,=48=10

17 III-2.Data Extraction

18 There are 4 bits embedded in and 4 bits embedded in III-2.Data Extraction Example =74,=48=|74-48|=26 ‘s secret bits

19 IV.Experimental Results Fig. 3:Two cover images. (a)Elaine. (b) Baboon.

20 IV.Experimental Results

21 IV.Experimental Results

22 IV.Experimental Results

23 IV.Experimental Results

24 V.Conclusions some l - h divisions and l - m - h divisions both yielded higher capacity and higher PSNR. Embed secret data into gray images without making a perceptible distortion. Can be analyzed automatically, aiming to capture an adequate - - division satisfying the key requirements in information hiding. Experimental results show that our approach obtains both larger capacity and higher image quality than that of Wu et al.