Download presentation
Presentation is loading. Please wait.
Published byElling Holmen Modified over 5 years ago
1
Reversible Data Hiding in Encrypted Images based on MSB Prediction and Huffman Coding
Sourse: arXiv preprint, arXiv: , 2018 (Submit to IEEE Trans. Multimedia) Authors: Youzhi Xiang, Zhaoxia Yin and Xinpeng Zhang Speaker: Wang Xu Date: /05/23
2
Outline Introduction Related work Proposed method Experiment results
Conclusions
3
Embedded, encrypted image
Introduction (1/2) Encrypted secret data Secret data Original image Encrypted image Embedded, encrypted image
4
Embedded, encrypted image
Introduction (2/2) Original image Secret data Embedded, encrypted image Secret data Original image
5
Related work β MED predictor
π π,ππ π π,π π π,π π π 192 191 176 99 103 101 75 182 70 177
6
Proposed method β Label map generation
136 150 147 156 136 150 147 π π π π Different bit π π : 150 1 1 Label = 4 π π : 156 1 1 Same bits Ignore bits
7
Proposed method β Image encryption
Bit level encryption Calculate the encrypted pixel
8
Proposed method β Label map coding and embedding (1/4)
Static Huffman codings
9
Proposed method β Label map coding and embedding (2/4)
1110 π π : 176 1 1 π π : 150 1 1 Auxiliary information Encrypted π π 1 1 Label embedded π π 1 1
10
Proposed method β Label map coding and embedding (3/4)
100 π π : 148 1 1 π π : 150 1 1 Encrypted π π 1 Label embedded π π 1 1 1 Additional data embedding
11
Proposed method β Label map coding and embedding (4/4)
First row the length of the auxiliary information: 20 bits + Reference pixels Prediction area label map: 32bits First column
12
Proposed method β Data hiding
First row Reference pixels Secret data Auxiliary information First column
13
Proposed method β Data Extraction and Image Recovery
Label map information Image recover First row Auxiliary information Unpredictable area Secret data Auxiliary information First column Data extract Secret data
14
Experiment results (1/7)
15
Experiment results (2/7)
16
Experiment results (3/7)
17
Experiment results (4/7)
[23] P. Bas, T. Filler, and T. PevnΓ½, βBreak our steganographic systemβThe ins and outs of organizing BOSS,β in Proc. 13th Int. Conf., pp. 59β70, May, Available: [24] P. Bas and T. Furon. Image Database of BOWS-2. Accessed: Jun. 20, [Online]. Available: [25] G. Schaefer and M. Stich, βUCID: An uncompressed color image database,β Proc. SPIE Electronic Imaging, Storage and Retrieval Methods and Applications for Multimedia, vol. 5307, pp. 472β480, Available:
18
Experiment results (5/7)
[20] P. Puteaux and W. Puech, βAn Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images[J],β IEEE Trans. Inf. Forensics Security, vol. 13, no. 7, pp. 1067β1681, Jan, 2018. [21] Y. Puyang, Z. Yin, and Z. Qian, βReversible Data Hiding in Encrypted Images with Two-MSB Prediction,β IEEE International Workshop on Information Forensics and Security (WIFS), 2018. [22] S .Yi and Y. Zhou, βSeparable and Reversible Data Hiding in Encrypted Images using Parametric Binary Tree Labeling[J],β IEEE Transactions on Multimedia, PP(99):1-1, 2018.
19
Experiment results (6/7)
20
Experiment results (7/7)
21
Conclusions The proposed method has greatly improved the embedding capacity compared to the most advanced algorithms.
22
Thanks
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.