Halftone Visual Cryptography

Slides:



Advertisements
Similar presentations
作者:Soo-Chang Pei, Io-Kuong Tam
Advertisements

1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
Reversible data hiding based on histogram shifting scheme Reporter: Date: Wan-Yu Lu 2012/12/13.
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
1 視覺密碼學 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University ( 清華大學 ) National Chung Cheng University ( 中正大學 ) Feng Chia University (
1 High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
A Neural Network Approach for Visual Cryptography Tai-Wen Yue and Suchen Chiang IEEE 2000.
1 Data Hiding Watermarking for Halftone Images Ming Sun Fu, Student Member, IEEE, and Oscar C. Au, Senior Member, IEEE, IEEE TRANSACTIONS ON IMAGE PROCESSING,
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Half-Tone Watermarking Multimedia Security. 2 Outline Half-tone technique Watermarking Method Measurement Robustness Conclusion.
Reversible watermarking Wu Dan Introduction What?
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
1 A Steganographic Scheme for Secure Communications Based on the Chaos and Eular Theorem Der-Chyuan Lou and Chia-Hung Sung IEEE Transactions on Multimedia,
1 Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform Source : IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 13, NO. 8,
Introduction to Visual Cryptography
A lossless data hiding scheme based on three- pixel block differences Ching-Chiuan Lin and Nien-Lin Hsueh Pattern Recognition, Vol. 41(4), April 2008 Pages.
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
(k, n)-Image Reversible Data Hiding
Information Hiding Technology: Current Research and Future Trend
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Source: IEEE Transactions on Circuits and Systems for Video Technology Vol.26.
Visual Secret Sharing Chair Professor Chin-Chen Chang (張真誠)
A new data transfer method via signal-rich-art code images captured by mobile devices Source: IEEE Transactions on Circuits and Systems for Video Technology,
Source: Mobile Information Systems, vol. 2017, 2017.
Chair Professor Chin-Chen Chang Feng Chia University
Source: Signal Processing 109 (2015) 317–333
The Recent Developments in Visual Secret Sharing
Improved Visual Secret Sharing Scheme for QR Code Applications
The New Developments in Visual Cryptography
Reduction of blocking artifacts in DCT-coded images
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding
Reversible Data Hiding Scheme Using Two Steganographic Images
Source: Signal Processing: Image Communication 64 (2018) 78-88
Source:. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL
Source: Signal Processing, Vol. 125, pp , August 2016.
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
Data Hiding Watermarking for Halftone Images
Reversible Data Hiding in JPEG Images
Source : Journal of Visual Communication and Image Representation, vol
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Dynamic embedding strategy of VQ-based information hiding approach
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Source : Journal of Visual Communication and Image Representation, vol
Source: IEEE Signal Processing Letters, Vol. 14, No. 3, Mar. 2007, pp
A Data-Hiding Technique with Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
Chair Professor Chin-Chen Chang Feng Chia University
Zhe-Ming Lu, Chun-He Liu, Dian-Guo Xu, Sheng-He Sun,
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Steganography in halftone images: conjugate error diffusion
Chair Professor Chin-Chen Chang Feng Chia University
Data Hiding Watermarking for Halftone Images
Source: Signal Processing: Image Communication 16 (2001) pp
A Data-Hiding Technique With Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
Hiding Multiple Watermarks in Transparencies of Visual Cryptography
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
An Algorithm for Removable Visible Watermarking
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Blind Reversible Authentication Based on PEE and CS Reconstruction
Source: Signal Processing Volume 111 June 2015, Pages
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Source : Digital Signal Processing. Vol. 73, pp , Feb
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
Rich QR Codes With Three-Layer Information Using Hamming Code
Reversible data hiding in encrypted binary images by pixel prediction
Presentation transcript:

Halftone Visual Cryptography IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 15, NO. 8, AUGUST 2006, pp. 2441-2453 Zhi Zhou, Gonzalo R. Arce, and Giovanni Di Crescenzo Reporter: Jen-Bang Feng

Visual Cryptography + = + =

Visual Cryptography

The Proposed Scheme

Comparisons EX. Block size: 4*4 m = 2 PSNR = 9.03

Results (2, 3)-threshold (b) (e) extended VC (c) (d) (f) proposed

Results

watermark Stacking EDF2 EDF1 EDF1 Lena (gray level) Error diffusion Data Hiding in Halftone Images With Noise-Balanced Error Diffusion Soo-Chang Pei, and Jing-Ming Guo IEEE Signal Processing Letters, Vol.10, No.12, December 2003 Steganography in halftone images:conjugate error diffusion Ming Sun Fu, Oscar C. Au Signal Processing 83 (2003) 2171 – 2178

+ Watermark Stacking * Original Lena Hybrid Pixel-Based Data Hiding and Block-Based Watermarking for Error-Diffused Halftone Images Soo-Chang Pei (貝蘇章) and Jing-Ming Guo IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 13, NO. 8, AUGUST 2003, Pages: 867-884. EDF 1 Watermark + Stacking EDF 2 * NBEDF Original Lena

Conclusions and Comments Applying VC to halftone images Classify: During process Outside process