南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:2012-12-19.

Slides:



Advertisements
Similar presentations
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
Advertisements

A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan.
多媒體網路安全實驗室 Source:International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH- MSP),2010 Sixth. Authors:Hsiang-Cheh.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Reversible Data Hiding ECE643 Digital Image Processing (I) Course Project Professor: Yun Q. Shi Su Yu 12/02/2011.
Reversible data hiding based on histogram shifting scheme Reporter: Date: Wan-Yu Lu 2012/12/13.
Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
Reversible Color Image Watermarking in YCoCg-R Color Space Aniket Roy under the supervision of Dr. Rajat Subhra Chakraborty.
Multiple Image Watermarking Applied to Health Information Management
南台科技大學 資訊工程系 A web page usage prediction scheme using sequence indexing and clustering techniques Adviser: Yu-Chiang Li Speaker: Gung-Shian Lin Date:2010/10/15.
Lossless Watermarking for Image Authentication: A New Framework and an Implementation IEEE TRANSACTIONS ON IMAGE PROCESSING APRIL 2006 C.M.Chen.
資訊工程系智慧型系統實驗室 iLab 南台科技大學 1 A Static Hand Gesture Recognition Algorithm Using K- Mean Based Radial Basis Function Neural Network 作者 :Dipak Kumar Ghosh,
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
ECE643 Course Project, Fall /21/20081 Optimum histogram pair based image lossless data embedding By G. Xuan, Y. Q. Shi, etc. Summarized By: Zhi.
Reversible watermarking Wu Dan Introduction What?
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
Reversible Date Hiding Based on Histogram Modification of pixel Differences IEEE Transactions on circuits and systems for video technology, VOL. 19, NO.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Palette Partition Based Data Hiding for Color Images Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, and Chien-Ting Huang Speaker : Yu-Chiang Li.
A lossless data hiding scheme based on three- pixel block differences Ching-Chiuan Lin and Nien-Lin Hsueh Pattern Recognition, Vol. 41(4), April 2008 Pages.
Advanced Science and Technology Letters Vol.35(Security 2013), pp Image Steganograpy via Video Using Lifting.
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
多媒體網路安全實驗室 Source: IEICE Trans. Fundamentals, Vol. E90-A, No. 4, April 2007, pp Authors:Hong Lin Jin, Masaaki Fujiyoshi, Hitoshi Kiya Speaker:Cheng.
1 An LSB Substitution base Information Hiding Technique 國立彰化師範大學 資訊工程學系教授兼系主任 蕭如淵 (Ju-Yuan Hsiao) 中華民國九十四年十二月十六日.
資訊工程系智慧型系統實驗室 iLab 南台科技大學 1 A new social and momentum component adaptive PSO algorithm for image segmentation Expert Systems with Applications 38 (2011)
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
Data Hiding Using Binocular Fusion of Stereo Pairs N. Y. Bai 白 乃 元 Department of Applied Mathematics National Sun Yat-Sen University Kaohsiung, Taiwan.
Advisor: Chang, Chin-Chen Student: Chen, Chang-Chu
WAVELET VIDEO PROCESSING TECHNOLOGY
(k, n)-Image Reversible Data Hiding
Injong Rhee ICMCS’98 Presented by Wenyu Ren
Image camouflage by reversible image transformation
Reversible Data Hiding in JPEG Images using Ordered Embedding
Mean value based reversible data hiding in encrypted images
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
Source : Signal Processing, vol. 126, pp ,  November 2016
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding
Reversible Data Hiding Scheme Using Two Steganographic Images
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Data hiding method using image interpolation
Information Hiding and Its Applications
Digital Steganography Utilizing Features of JPEG Images
Partial reversible data hiding scheme using (7, 4) hamming code
Data hiding method using image interpolation
Partial reversible data hiding scheme using (7, 4) hamming code
New Framework for Reversible Data Hiding in Encrypted Domain
Novel Multiple Spatial Watermarking Technique in Color Images
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
An Algorithm for Removable Visible Watermarking
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
Source: IEICE-Transactions on Info and Systems
Information Protection and Recovery with Reversible Data Hiding
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Lossless Data Hiding in the Spatial Domain for High Quality Images
A Quadratic-Residue-based Fragile Watermarking Scheme
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Adopting secret sharing for reversible data hiding in encrypted images
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date: Speaker: Xian-Lin Hong Digital Signal Processing, vol. 20, no. 4, pp. 1116–1128, 2010.

2 Outline Problems & Rationale 1 Purpose & Specific Aims 2 3 Materials & Methods 4 Experiments and Result 5 Conclusions

3 1.Problems & Rationale  In recent years, the development of multimedia and computer networks has resulted in the widespread use of digital media to replace traditional postal mail.  Several researchers have employed data compression technology for efficient and robust media transmission via the Internet.  The transmission of digital media in an open Internet channel has increased the risk of incurring leaks of sensitive information.  Protection of sensitive data from attackers in an Internet environment has become an important issue.

4 2.Purpose & Specific Aims  To satisfy the requirements of reversible data hiding and to improve the hiding capacity, this study proposes the difference scheme.  Some applications require high-precision media to recover the original cover image.

5 3. Materials & Methods  The NSAS method utilizes the peak point and zero point-pairs of an image histogram and slightly modifies the pixel values to embed data.  The quality of the stego-image is apparent in that the stego-image has a peak signal-to-noise ratio (PSNR) of at least 48 dB.  The Barbara image with a size 512×512 and 256 gray-level is used as an example to illustrate the NSAS method.  The method includes two processes, i.e., data embedding and data extraction

6 3. Materials & Methods Data embedding process step 1:  For a given image, produce the histogram of the cover image. Fig. 1 shows the histogram of the Barbara image.

7 3. Materials & Methods Data embedding process step 2:  Find and store the most frequent and least frequent pixel values.  For example, in Fig. 1, the pixel value 159 occurs 2576 times, denoted as h(159) = 2576, which is the maximum number of occurrences, and is called the peak point  The pixel value 254 does not appear in the Barbara image, which includes the minimum pixel number, 0, called the minimum point or zero point.  If there is no zero point, make a minimum point by cleaning the data and store the pixel information.

8 3. Materials & Methods Data embedding process step 3:  Scan the cover image once in a sequential order.  If PP > ZP, then shift each pixel value in the range, [ZP+1, PP−1], to the left-hand side by decreasing the pixel value by one unit.  If PP < ZP, then shift each pixel value in the range, [PP + 1, ZP − 1], to the right-hand side by increasing the pixel value by one unit.  For example, in Fig. 1, PP < ZP since 159 < 254, each pixel value in the range, [160, 253], is increased by one.

9 3. Materials & Methods Data embedding process step 3:  As shown in Fig. 2, the histogram changes to make the point, 160, empty. This generates free space to embed data.

10 3. Materials & Methods Data embedding process step 4:  Scan the whole image once again in the same sequential order to embed data.  After scanning the pixel with the peak point value, embed a bit of the hidden data.  If the embedded bit is “1”, then shift the pixel value from PP to ZP by one; otherwise, the pixel value does not change.  Given the Barbara image, if NSAS selects just one pair of peak point and zero point, NSAS can at most embed 2576 bits.  NSAS can select multiple pairs of peak points and zero points to increase its embedding capacity.

11 3. Materials & Methods Data embedding process step 4:  Fig. 3 shows an example of the histogram after data have been embedded.  PP < ZP since 159 < 254.  The pixel value, 159, becomes 160 to embed a bit “1”.  Each pixel in the range [159, 160] can embed a bit.

12 3. Materials & Methods Original Image PP ZP PP = h(1) = 9 ZP = 7 PP < ZP PP ZP Shift Image

13 3. Materials & Methods Data extraction process  Step 1: Obtain the peak point and the zero point from the stored record.  Step 2: Scan the stego-image in the same sequential order that was used in the data embedding process.  If the pixel value is in the range [PP+1, ZP], decrease the pixel value by one to recover its original value.  At the same time, a bit "1" is extracted if the pixel value is P+1; a bit "0" is extracted if the pixel value is PP.  Step 3: Restore the corresponding pixel values if the extracted data include the overhead bookkeeping information, which is stored in Step 2 of the data embedding process.

14 3.Background & Literatures Review  PP = h(1), PP < ZP  Secret data : Shift Image Cover Image

15 3.Background & Literatures Review Data extraction process  PP = h(1), PP < ZP Cover Image Shift Image Secret data : Original Image

16 3. Materials & Methods  A natural image has local similarity. Therefore, the difference between adjacent pixels is close to zero.  The difference value of the peak point is zero for the transformed Barbara image, i.e., h(0) = 17,563 is greater than  The transformation increases the free space available for embedding data.

17 4.Experiments and Result  This experiment employed the peak signal-to-noise ratio (PSNR) to evaluate the image quality. The definition of the PSNR value is as follows:  MSE is the mean squared error between the original image and the modified image. According to Eq.  A high PSNR value means high image quality.

18 4.Experiments and Result  All experiments were performed on an AMD K (2200 MHz) PC with 1 GB of main memory.  All algorithms were implemented in Visual C running on the Windows XP Professional operating system.  Nine experimental images were used, which involved 512 x 512 pixels with 256 gray levels, as shown in next page.

19 4.Experiments and Result

20 5. Conclusions

21 5. Conclusions

22 5. Conclusions  This study proposes a novel data hiding technique, which improves the hiding capacity and the stego-image quality.  The method concerns the pixel difference and shifting pixel values.  The method not include complicated calculations, the method is easy to implement.

南台科技大學 資訊工程系 Thank You !