1 / 65

資訊隱藏技術之研究 The Study of Information Hiding Mechanisms

資訊隱藏技術之研究 The Study of Information Hiding Mechanisms. 指導教授: Chang, Chin-Chen ( 張真誠 ) 研究生: Lu, Tzu-Chuen ( 呂慈純 ). Department of Computer Science and Information Engineering, National Chung Cheng University. illegal. Information Hiding. Information. Internet. Sender. Receiver. illegal.

asher
Download Presentation

資訊隱藏技術之研究 The Study of Information Hiding Mechanisms

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 資訊隱藏技術之研究The Study of Information Hiding Mechanisms 指導教授: Chang, Chin-Chen (張真誠) 研究生: Lu, Tzu-Chuen (呂慈純) Department of Computer Science and Information Engineering, National Chung Cheng University

  2. illegal Information Hiding Information Internet Sender Receiver

  3. illegal Information Hiding Information Internet Sender Information Receiver

  4. 5 10 11 12 20 31 40 51 27 10 17 45 37 85 15 34 Image Information Hiding - LSB Information Stego Image Least Significant Bit (LSB)

  5. 5 10 11 12 20 31 40 51 27 10 17 45 37 85 15 34 MSE = =0.4375 PSNR (Peak Signal to Noise Ratio) = =51.72 Information Hiding - LSB 5 11 10 13 20 31 41 51 27 10 17 44 37 85 14 35 Image Stego-Image Payload = 1 (bit per pixel, bpp)

  6. Information Hiding - LSB PSNR = 43.27 Payload = 2 bpp Trade-off: Image quality and Payload Robustness

  7. Pixel Domain • Quantization-based Information Hiding Scheme • A Difference Expansion Oriented Data Hiding Scheme

  8. Pixel Domain Quantization-based Information Hiding Scheme

  9. 5 10 11 12 20 31 40 51 27 10 17 45 37 85 15 34 Image 6 10 12 12 20 32 40 51 27 10 17 45 38 85 15 35 Modified Image Quantization-based Information Hiding Scheme 6 12 Information

  10. 1 0 1 0 1 0 1 2 3 4 31 32 1 0 1 8 16 24 32 240 248 6 0 8 16 24 255 0 6 10 12 12 11 20 32 40 51 27 10 17 45 38 85 15 35 Modified Image

  11. 255 0 1 0 1 0 1 0 1 2 3 4 31 32 1 0 1 8 16 24 32 240 248 10 0 8 16 24 11 10 12 12 13 20 32 40 51 27 10 17 45 38 85 15 35 Modified Image

  12. 255 0 1 0 1 0 1 0 11 13 14 14 26 40 44 53 33 13 20 50 43 86 19 37 1 2 3 4 31 32 Stego Image 8 16 24 32 240 248 Quantization-based Information Hiding Scheme- Extraction Process 0 0 00000110110111 PSNR = 34.91 Payload = 1 bpp

  13. 255 1 0 1 0 1 0 11 13 14 14 26 40 44 53 33 13 20 50 43 86 19 37 Stego Image 0 1 2 3 31 32 7 4 1 8 16 24 248 48 56 6 10 51

  14. 11 13 14 14 26 40 44 53 33 13 20 50 43 86 19 37 6 10 12 12 20 32 40 51 Stego Image 27 10 17 45 38 85 15 35 Repaired Image Quantization-based Information Hiding Scheme-Repairing Process PSNR = 53.18 Payload = 1 bpp PSNR = 34.91 Payload = 1 bpp

  15. 255 0 1 0 1 0 1 0 11 9 13 13 14 14 14 10 26 29 40 40 44 44 53 53 33 33 13 13 18 20 50 50 43 43 86 86 19 22 37 37 1 2 3 4 31 32 Stego Image Stego Image 240 8 16 24 32 248 Quantization-based Information Hiding Scheme-Robustness

  16. Experimental Results Modified Images Stego Images

  17. Experimental Results Payload: 1 bpp

  18. Pixel Domain A Difference Expansion Oriented Data Hiding Scheme

  19. 0 0 A Difference Expansion Oriented Data Hiding Scheme Hiding Process u0 u1 u2

  20. 0 Hiding Process 8 Image h =1 h=1 4 2

  21. 0 Hiding Process 1 Image h =1 Expandable

  22. Hiding Process Image h =1 A 0 Non-Expandable

  23. Hiding Process 1 Image h =1 A 0 Changeable

  24. Hiding Process 19 Image h =1 Expandable d > Threshold = 10 Changeable

  25. 0 A Hiding Process Image h =1 Non-Changeable

  26. A Difference Expansion Oriented Data Hiding Scheme Location Map Image PSNR: 44.99 Payload: 0.56 bpp

  27. 0 Extraction Process for Expandable

  28. Extraction Scheme for Expandable 0

  29. Extraction Process for Changeable 0

  30. Extraction Process for non-Changeable

  31. A Difference Expansion Oriented Data Hiding Scheme Location Map Image 0100101 PSNR: 44.99 Payload: 0.56 bpp

  32. Experimental Results

  33. Experimental Results

  34. Experimental Results

  35. Experimental Results

  36. Information Compressed codes: 1011101111….. Internet Sender ? Receiver

  37. Compressed codes: 1011101111….. Information Internet Sender Receiver Information

  38. Index Domain • Reversible Hiding Scheme based on Switching Tree Coding • Reversible Hiding Scheme based on Side-Match VQ

  39. Index DomainReversible Hiding Scheme based on Switching Tree Coding

  40. Vector Quantization (VQ) 7 7 9 10 Index table Original Image VQ Encoder

  41. Vector Quantization (VQ) Index table Reconstructed Image VQ Decoder

  42. Switching-Tree Coding (STC) • Sheu proposed the STC algorithm in 1999 • Re-encode the index table Index Table U the current index L

  43. Switching-Tree Coding (STC) • If A = 7, then A = U A’= 11 • If A = 10, then A = L A’= 10

  44. Switching-Tree Coding (STC) If A = 14  A’=01 +‘00011’ If A = 17  A’=00 +‘00010001’

  45. A’ = 00+(10) 00+(25) 00+(21) … 00+(17) Information Hiding on STC Codes (IHSTC) • Information : 0 1 0 0 1 1 0 0 0 1 1 0 1 0 … Index table

  46. Information Hiding on STC Codes (IHSTC) • Information : 0 1 0 0 1 1 0 0 0 1 1 0 1 0 … 0 ‘10’ A’ = 00+(10) 00+(25) 00+(21) … 00+(17)

  47. Information Hiding on STC Codes (IHSTC) 1 • Information : 0 1 0 0 1 1 0 0 0 1 1 0 1 0 … ‘10’ A’ = 00+(10) 00+(25) 00+(21) … 00+(17) 10+00+(128) …

  48. Extraction and Reconstruction A’ = 00+(10) 00+(25) 00+(21) … 00+(17) 10 00+(128) … 10 10 25 21 100 10 17 17 Information: 0

  49. Extraction and Reconstruction A’ = 00+(10) 00+(25) 00+(21) … 00+(17) 10+ 00+(128) … 10 100 Information: 0 1

  50. Experiment Results

More Related