290 likes | 304 Views
This paper presents a connectivity-preserving method for binary image authentication, embedding and extracting data to ensure integrity and security. The experimental results show successful hiding and authentication of data.
E N D
Pattern-Based Data Hiding for Binary Image Authentication by Connectivity-Preserving Author: Huijuan Yang and Alex C. Kot Source: IEEE Transactions on Multimedia Reporter: Yu-Ying Lin ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB- ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB- ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB-ISLAB- ISLAB-ISLA
Outline • Background • Proposed Method • Experimental Results
Background Receiver Sender Integrity ?
Tamper Background Attacker Receiver Sender
Tamper Background Attacker Receiver Sender Compare Watermark
Flippability Decision (1) (2) (3)
Flippability Decision White pixel Black pixel White or black pixel
Flippability Decision 滿足(1)和(3) “connectivity-Preserving ” 滿足(1)和(2)
Block Partition • Different types of blocks. • Fixed 3x3 block (FB) • Non-interlaced block (NIB) • Interlaced block (IB)
Block Partition Fixed 3x3 block (FB) Embeddable locations
Block Partition Non-interlaced block (NIB) Embeddable locations
Block Partition Interlaced block (IB) Embeddable locations
Embedding process 找出可嵌入的位置
Embedding process 將可嵌入位置的像素改為0
Embedding process 將左圖經過hash function H() 得到H0 將H0經由private key加密產生Ws 使用者的浮水印Wp 將Wp及Ws做XOR產生Wr 假設Wr=100111 再將Wr嵌入到具可嵌入的位置
Embedding process Wr=100111 利用區塊的奇偶性 3X3區塊內的的黑色像素為奇數則為1 3X3區塊內的的黑色像素為.偶數則為0
Embedding process Wr=100111 利用區塊的奇偶性 3X3區塊內的的黑色像素為奇數則為1 3X3區塊內的的黑色像素為.偶數則為0
Authentication process 找出可嵌入的位置
Authentication process 將可嵌入位置的像素改為0
Authentication process 將左圖經過hash function H() 得到H’0
Authentication process 取出嵌入資訊 為100111 將100111分為W’s和W’p W’s再利用public key產生Hw 比較 Wp (使用者的浮水印)和W’p (取出的浮水印), H0 和Hw
Experimental Results The original image of size 920*230 Hide 1056 bits by the proposed algorithm (fixed 3*3 block) The watermarked image which is tempered, “embed” in the 3rd line is shifted slightly.
Experimental Results (d) The original logo image. (e) The reconstructed logo image when no tampering occurs. (f) The reconstructed logo image when the watermarked image has been tampered.
THE END -Thank You-