1 / 23

A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding

A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding. Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan. Outline. Histogram Shifting on Pixel Differences HS for single layer embedding HS for multi-layer embedding Two-Step Embedding Framework (TSE)

Download Presentation

A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan

  2. Outline • Histogram Shifting on Pixel Differences • HS for single layer embedding • HS for multi-layer embedding • Two-Step Embedding Framework (TSE) • Improvement for Reduction the Location Map • Traditional location map generation • The improvement scheme for reduction location map size • Embedding Process • Extraction Process • Experimental Results

  3. Peak point Frequency Peak point Peak point Frequency Frequency Zero point Lowest point Grayscale value Grayscale value Frequency zero point situation Histogram shifting algorithm • Traditional histogram shifting algorithm (HS) Traditional histogram shifting algorithm is based on the pixel values, which utilizes the redundancy of the host image statistical information to hide secret data, the sketch map is shown as follows. Embedding w Grayscale value Zero point non-zero point situation Grayscale value

  4. Note: • The extraction is performed in the reverse order as the embedding process. • The side information (peak/zero points) should be additionally transmitted to the receiver for reversible recovery.——No blind • The histogram shifting is extended to the pixel differences or predictive errors to improve the performance

  5. Frequency d d’ • Histogram shifting on the pixel differences Histogram shifting Generate the histogram of pixel differences Pixel differences calculation ‘d’ Generate the marked pixel differences ‘d’’ Generate the marked pixel values ‘y’ • Note: • P and Z should be additional transmitted to the receiver. • The process represents the single layer embedding

  6. …… 1th layer Marked pixel differences mth layer P1,Z1 Pm,Zm Pixel differences Stego- image Original image • Multi-layer embedding When the size of secret data is large, the generated stego-image (stego-differences) is repeatedly considered as a new cover image (cover differences) to perform a new round histogram shifting to hide more message.The multi-layer embedding is described as follows. Note: the side information {Pi,Zi | 1≤i ≤m} should be additional transmitted

  7. optimal selection histogram peak / zero points Stego Image LSB replacement first pixel differences Replaced LSBs second Stego A1 A2 Stego Original image Two-Step Embedding Framework • Purpose: • To solve the issue of needing to transmit the side information additionally. —— No blind • To ensure the optimal peak/zero points selection among HS to improve the performance. • TSE for single layer embedding

  8. mth layer (TSE) A1 …… (m-1)th layer 1th layer A2 Pixel differences Stego- image Original image • TSE for multi-layer embedding Note: 1) TSE is employed in the final layer embedding; 2) The LSB substitution is performed on the stego-pixels. Framework of two-step embedding for multi-layer embedding

  9. The characteristic of TSE: • TSE is an improved LSB based scheme, which hides the side information in the LSBs of the chosen stego-pixels in A1 to achieve the blind requirement. • Without consuming some intact fixed area to hide side information in the traditional schemes, our scheme utilizes the LSB in the stego-pixels. • The flexible optimal peak/zero point ensures the better performance.

  10. Improvement for Reduction the size of Location Map • Location map: Due to the modification on the pixel differences to hide secret data, the marked differences may be not in the normal range [0, 255] for a 8-bit grayscale image. Thus the location map is needed to record the special overflow/underflowed pixels and embedded in the cover image together with the secret message. The location map can be recovered by the receiver to lossless restore the original image.

  11. Traditional method for the location map generation Each layer HS embedding leads to at most 1 unit distortion between marked difference di’ and original difference di. Thus, the difference between the stego-pixel and original pixel via m - layerembeddingis The potentially overflowed/underflowed pixels (POPs) is in the range and should be specially handled as follows.

  12. Cover image :POPs 1) Locate all the POPs in the interval 2) Use histogram narrowing technique (HN) to narrow the POPs to the middle grayscale value and generate a new narrowed cover image I’ 3) After m-layer embedding on the narrowed image I’, no overflow/underfow occurs. 4) Generate a same sized location map with ‘1’ and ‘0’ to indicate the narrowed pixels and non-narrowed pixels. 5) Compress the location map and hide the compressed version in the cover image.

  13. Improvement for Reduction the size of Location Map • General idea: we exchange the histogram narrowing technique into the final layer embedding process and only indicate the actually overflowed/underflowed pixels (AOPs), which is a subset of the POPs. Thus the improved location map with less ‘1’ in it will be easier to be compressed. The detailed TSE for the reduction of the location map is described as follows.

  14. Cover image Pixel differences w={w(1), w(2), w(3)} A1 A1 HS embedding POPs w(1) AOPs LM HS embedding R_POPs in A1 A2 w(2) A2 LSB replacement LM + SI A1 LSBs HS embedding R_POPs in A2 :POPs w(3)+LSBs The sketch map of TSE for location map reduction

  15. Embedding Process • Calculate the pixel differences • Determine the embedding layer ‘m’ • Identify the POPs in cover image with gray value in the range • Perform the front (m-1)-layer embedding • Implement the TSE in the final layer embedding. Note: Among the process, the compressed location map and side information for each layer are together hidden in the image in step 5. Moreover, the histogram narrowing technique is utilized in the same step.

  16. Extraction Process • Divide the stego-image into A1 and A2 as did in embedding side, and collect the side information from the LSBs of the marked pixels in A1. • Decompress and generate the location map to indicate the actually overflowed/underflowed pixels (AOPs). Perform the inverse HN operation on the AOPs. • Perform the m-layer extraction operation in the inverse order and recover the original cover image.

  17. The TSE framework extended to other prediction errors One prediction model: (a) (b) The multilayer embedding is iteratively performed between the ‘cross’ set and ‘round’ set . And the successive prediction utilizes the generated stego-pixels in opposite set. The (i+1) th layer embedding process is illustrated.

  18. Experimental Results • The Efficiency for Location Map Reduction between the traditional method and our improved scheme Where LMt and LMi denote the size of traditional and improved location map, respectively.

  19. Comparison Between the TSE in Pixel Differences, in Predictive Errors and Other Schemes TSE_PD_TM: TSE + Pixel differences + traditional location map TSE_PD_IM: TSE + Pixel differences + improved location map TSE_PE_IM: TSE + prediction errors + improved location map [18] Tai W. L., Yeh C. M., Chang C. C.: Reversible Data Hiding Based on Histogram Modification of Pixel Differences. IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 6, pp. 906-910 (2009) [19] Luo L., Chen Z., Chen M., Zeng X., Xiong Z.: Reversible Image Watermarking Using Interpolation Technique. IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp.187–193 (2010) [13] Hwang J., Kim J., Choi J.: A Reversible Watermarking Based on Histogram Shifting. In: Proc. International Workshop on Digital Watermarking. pp. 348-361. Jeju Island, Korea (2006)

  20. Conclusion • The proposed scheme exploits TSE to solve the problem of communicating side information. The TSE framework also ensures the adoption of optimal peak and zero point pair in each layer for high performance reversible data hiding. • An improved location map, which indicates only the actual overflow/underflow pixels, is constructed to facilitate the compression of location map and further increase the embedding capacity.

  21. Thank you!

More Related