1 / 29

Pattern-Based Data Hiding for Image Authentication

This paper presents a connectivity-preserving method for binary image authentication, embedding and extracting data to ensure integrity and security. The experimental results show successful hiding and authentication of data.

hendersonb
Download Presentation

Pattern-Based Data Hiding for Image Authentication

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Pattern-Based Data Hiding for Binary Image Authentication by Connectivity-Preserving Author: Huijuan Yang and Alex C. Kot Source: IEEE Transactions on Multimedia Reporter: Yu-Ying Lin ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB- ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB- ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB- ISLAB-ISLA

  2. Outline • Background • Proposed Method • Experimental Results

  3. Background Receiver Sender Integrity ?

  4. Tamper Background Attacker Receiver Sender

  5. Tamper Background Attacker Receiver Sender Compare Watermark

  6. Flippability Decision (1) (2) (3)

  7. Flippability Decision White pixel Black pixel White or black pixel

  8. Flippability Decision 滿足(1)和(3) “connectivity-Preserving ” 滿足(1)和(2)

  9. Block Partition • Different types of blocks. • Fixed 3x3 block (FB) • Non-interlaced block (NIB) • Interlaced block (IB)

  10. Block Partition Fixed 3x3 block (FB) Embeddable locations

  11. Block Partition Non-interlaced block (NIB) Embeddable locations

  12. Block Partition Interlaced block (IB) Embeddable locations

  13. Embedding process

  14. Embedding process 找出可嵌入的位置

  15. Embedding process 將可嵌入位置的像素改為0

  16. Embedding process 將左圖經過hash function H() 得到H0 將H0經由private key加密產生Ws 使用者的浮水印Wp 將Wp及Ws做XOR產生Wr 假設Wr=100111 再將Wr嵌入到具可嵌入的位置

  17. Embedding process Wr=100111 利用區塊的奇偶性 3X3區塊內的的黑色像素為奇數則為1 3X3區塊內的的黑色像素為.偶數則為0

  18. Embedding process Wr=100111 利用區塊的奇偶性 3X3區塊內的的黑色像素為奇數則為1 3X3區塊內的的黑色像素為.偶數則為0

  19. Embedding process

  20. Embedding process

  21. Authentication process

  22. Authentication process 找出可嵌入的位置

  23. Authentication process 將可嵌入位置的像素改為0

  24. Authentication process 將左圖經過hash function H() 得到H’0

  25. Authentication process 取出嵌入資訊 為100111 將100111分為W’s和W’p W’s再利用public key產生Hw 比較 Wp (使用者的浮水印)和W’p (取出的浮水印), H0 和Hw

  26. Authentication process

  27. Experimental Results The original image of size 920*230 Hide 1056 bits by the proposed algorithm (fixed 3*3 block) The watermarked image which is tempered, “embed” in the 3rd line is shifted slightly.

  28. Experimental Results (d) The original logo image. (e) The reconstructed logo image when no tampering occurs. (f) The reconstructed logo image when the watermarked image has been tampered.

  29. THE END -Thank You-

More Related