300 likes | 511 Views
Capacity-Approaching Codes for Reversible Data Hiding. Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science University of Science and Technology of China Information Hiding Conference 2011. What is reversible data hiding?. Introduction.
E N D
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science University of Science and Technology of China Information Hiding Conference 2011
What is reversible data hiding? Introduction • The original cover can be losslessly restored after the embedded information is extracted. message data extraction & cover restoration message data embedding stego cover cover
What is reversible data hiding? Introduction • The original cover can be losslessly restored after the embedded information is extracted. • Why is reversible data hiding needed? • In some applications, even any degradation of the original cover is not allowed, such as medical imagery, military imagery and law forensics. • Where is reversible data hiding applied? • Media annotation; • integrity authentication ...
How to do reversible data hiding? Introduction • Type-I: Binary feature sequence, generic compression method (e.g., arithmetic coder); • Type-II: Integer operations: Difference Expansion (DE) or Histogram Shifting (HS)— specific compression manner for the histogram
Type-I: Basic model [Kalker] Introduction d modifications • Embedding rate: • Distortion: • How to maximize embedding rate under any given distortion? A rate-distortion problem
Introduction • Theoretical upper bound [Kalker]
Introduction • RecursiveCode construction [Kalker] • Key idea: • the marked cover can be used to reconstruct the cover
Observation I Two observations • Not only the marked cover can be used to reconstruct the cover, but also the reconstructed cover can help to extract message.
Two observations • Observation II
Observation II Two observations • The maximum capacity is achieved at D=p0-1/2; • When D≤p0-1/2, the optimal embedding manner is that only 0’s are allowed to be changed. (Corollary 1 of Theorem 2, [Kalker]) • Our strategy: • Only embed data into 0’s and skip 1’s; • At the decoder side, the embedding positions can be recognized with the help of reconstructed cover.
RZL coding (reverse zero-run length) [Wong] How to embed data into all-zero cover • Message is divided into disjoint segments of k bits, each of which is converted to a integer d∈[0,2k-1]; skip d zeros in the cover, and flip the (d+1)th zero. • Our method: improve RZL by the idea of ZZW construction • A construction consists of two layers: • The outer layer: only embed one bit; • The inner layer: when embedding bit “1” in the outer layer, embed another k bits with RZL; otherwise skip 2k zeros.
Example:k = 2 How to embed data into all-zero cover
Proposed method Improved recursive construction Improved coding for all-zero cover x1: 0 1 y1: 0 1 1
Proposed method Example 2 (follows Example 1)
Comparison: Embedding efficiency vs. embedding rate Embedding efficiency e is defined as number of bits embedded by unit distortion, i.e. e=ρ/Δ=L/d.
Improving Type-I Schemes (embedding in binary feature sequences) 1. Improving RS method for spatial images [Fridrich] Texture complexity of pixel blocks is used to construct binary feature sequence.
Improving Type-I Schemes 1. Improving RS scheme for spatial images [Fridrich]
Improving Type-I Schemes 2. Improving the scheme for JPEG images [Fridrich] quantized DCT coefficients with value 0 and 1 are used as binary feature sequence.
Improving Type-I Schemes 2. Improving the scheme for JPEG images [Fridrich]
Improving Type-I Schemes 3. Improving PS scheme for binary images [Ho] Y.-A. Ho, et al., ``High capacity reversible data hiding in binary images using pattern substitution,” Computer Standards and Interfaces, 2009. Test images Patterns of 4-length vector in difference image are used as binary sequence.
Improving Type-I Schemes 3. Improving PS scheme for binary images
Improving Type-I Schemes 3. Improving PS scheme for binary images Embed 260 bits (a) Marked by PS (b) Marked by improved PS
Improving Type-II Scheme Improving HS-based scheme for spatial images [Luo] L. X. Luo, et al., ``Reversible Image Watermarking Using Interpolation Technique," IEEE Trans. Inf. Forensics and Security, 2010. • The proposed codes is used at the second embedding stage. • Extension by embedding with two bins.
Improving Type-II Schemes 3. Improving HS-based scheme for spatial images (a) Lenna
Improving Type-II Schemes 3. Improving HS-based scheme for spatial images (b) Baboon
Improving Type-II Schemes 3. Improving HS-based scheme for spatial images (c) Boat
Conclusion: • An improved coding method for all-zero cover • An improved recursive construction • A reversible data hiding method for binary cover • Future work: Integer-domain reversible data hiding