Download presentation
Presentation is loading. Please wait.
Published byMarina Moya Modified over 5 years ago
1
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors: Ching-Chun Chang and Chang-Tsun Li Speaker: Jiang-Yi Lin Date:
2
Outline Introduction Related Works Proposed scheme
Experimental results Conclusions
3
Introduction (1/3) ā Reversible data hiding in encrypted image (RDHEI)
Encryption Key š¾ š Embedding Key š¾ š Encrypt the image Embedding Original image m Marked image Key š¾ š Secret data extraction Key š¾ š Image recover & Secret data extraction š¾ š , š¾ š
4
Introduction (2/3) ā Vacating room before Encryption
Encryption Key š¾ š Embedding Key š¾ š Encrypt the image Embedding Vacating room Original image m Marked image Key š¾ š Secret data extraction Key š¾ š Image recover & Secret data extraction š¾ š , š¾ š
5
Introduction (3/3) ā Vacating room after Encryption
Encryption Key š¾ š Embedding Key š¾ š Vacating room Encrypt the image Embedding Original image m Marked image Key š¾ š Secret data extraction Key š¾ š Image recover & Secret data extraction š¾ š , š¾ š
6
Related work(1/1)- Lexicographic Permutations
1. Given an original sequence: {12, 1, 7} 2. Permute the original sequence and sort permutation lexicons. 3. For watermark encoding, substitute {12,1,7} with a sorted lexicon {7, 1, 12} to encode the digit ā2ā. {1, 7, 12}: 0 {1, 12, 7}: 1 {7, 1, 12}: 2 {7, 12, 1}: 3 {12, 1, 7}: 4 {12, 7, 1}: 5
7
Proposed scheme (1/8)-embedding
Create the original sequence by the low nybbles of a pixel pair from the encrypted image. ā¦ā¦ā¦ā¦ ā¦ā¦ā¦ā¦ ā¦ā¦ā¦ 174 = ( )2, low nybble: (1110)2 = 14 85 = ( )2, low nybble: (0101)2 = 5 Original sequence: {14, 5} from (174, 85) Permutation lexicons : {5, 14}: 0 {14, 5}: 1 Pixels at the black positions are modifiable in terms of their low nybbles, whereas those at the white positions are unmodifiable.
8
Proposed scheme (2/8) -embedding
To embed bit 0, substitute the lexicon {14, 5} with {5, 14} by modifying the low nybbles of the pixel pair. ā¦ā¦ā¦ā¦ ā¦ā¦ā¦ā¦ ā¦ā¦ā¦ Encrypted image 165 = ( )2, low nybble: (0101)2 = 5 94 = ( )2, low nybble: (1110)2 = 14 So the original (174, 85) has been changed to (165, 94).
9
Proposed scheme (3/8)-Extraction
According to the Lexicographic order, the secret bit can be error-free extracted. Encrypted image ā¦ā¦ā¦ā¦ ā¦ā¦ā¦ā¦ ā¦ā¦ā¦ Encrypted image 165 = ( )2, low nybble: (0101)2 = 5 94 = ( )2, low nybble: (1110)2 = 14 Lexicographic order: 0 The embedded bit: 0 Low nybbles: {5, 14}
10
Proposed scheme (4/8) -Extraction
Step 1: Receiver restores two candidate encrypted images. ā¦ā¦ā¦ā¦ ā¦ā¦ā¦ā¦ ā¦ā¦ā¦ Low nybbles: {14, 5} 174 = ( )2 85 = ( )2, Low nybbles: {5, 14} 165 = ( )2 94 = ( )2 Encrypted image 1 ā¦ā¦ā¦ā¦ ā¦ā¦ā¦ā¦ ā¦ā¦ā¦ Encrypted image 2
11
Proposed scheme (5/8) -Extraction
Step 2: Decrypt two candidate images using the decryption key(same as the encryption key). ā¦ā¦ā¦ā¦ ā¦ā¦ā¦ā¦ ā¦ā¦ā¦ ā¦ā¦ā¦ā¦ ā¦ā¦ā¦ā¦ ā¦ā¦ā¦
12
Proposed scheme (6/8) -Extraction
Step 3: A content-adaptive estimation is designed for assisting host pixel recovery. ā¦ā¦ā¦ā¦ ā¦ā¦ā¦ā¦ ā¦ā¦ā¦ Candidate image 1 Origin version Error = Sum(|{100,118} ā {99,119}|) = Sum({1,1}) = 2 ā¦ā¦ā¦ā¦ ā¦ā¦ā¦ā¦ ā¦ā¦ā¦ Candidate image 2 Error = Sum(|{91,127} ā {99,119}|) = Sum({8,8}) = 16
13
Proposed scheme (7/8)-Predictor
14
Proposed scheme (8/8)- Enhance distinction
Low nybbles: {5, 4} 85 = ( )2 84 = ( )2, Low nybbles: {4, 5} 84 = ( )2 85 = ( )2 Low nybbles: {5, 4} 85 = ( )2 84 = ( )2 Extraction Pixels={85,84}. e={5, 4}, N=16. p={3,7},q={11,7}. Suppose secret bit w=0. pu is coprime to N e'={5*7, 4*7} (mod N) = {35, 28} (mod N) ={3, 12}. Since w=0, e'={3, 12} keep intact. In the extraction phase. e'={3, 12} => w=0. For any permutations of eā G = {{3, 12}*q0, {3, 12}*q1}={{1,4},{5,4}} GB={{1,4},{5,4}} Thus, candidate pixels={81,84} or {85,84} G0={3, 12}*11 (mod N) ={33, 132} (mod N) ={1,4} G1={3, 12}*7 (mod N) ={21,84} (mod N) ={5,4} {4, 5}: 0 {5, 4}: 1 {3, 12}: 0 {12, 3}: 1
15
Experimental results (1/2)
16
Experimental results (2/2)
17
CONCLUSIONS Utilize the Lexicographic Permutations for RDHEI.
A Content-Adaptive Estimator for Prediction. Enhance Distinction.
18
Thank you for listening!
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.