410 likes | 424 Views
影像偽裝術的最新發展. Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University. Multimedia (Watermarking). Classifications: Visible watermarking Invisible watermarking Robust watermarking Semi-fragile watermarking Fragile watermarking.
E N D
影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
Multimedia (Watermarking) • Classifications: • Visible watermarking • Invisible watermarking • Robust watermarking • Semi-fragile watermarking • Fragile watermarking
Multimedia (Watermarking) (Cont.) • Visible watermarking • Easy to embed • Clear to see watermark
Multimedia (Watermarking) (Cont.) • Invisible watermarking • Requirements: • Good visual quality of watermarked image • Robustness Watermarking Original image Watermarked image Watermark
Multimedia (Image authentication) • Requirements: • Detect the tampered area • Try to restore the tampered area • Solutions: • Hamming codes Tampered image Detected image Restored image Image
Multimedia (Secret sharing) • Classification: • Meaningless shadows • Meaningful shadows • Meaningless shadows • Requirements: • Unexpected user can not see the secret image • Good visual quality of reconstructed secret image
Multimedia (Secret sharing) (Cont.) Sharing Shadow size: 256 256 Image size: 512 512 Reconstructing (2,4)-threshold secret sharing scheme PSNR=24 dB
Multimedia (Secret sharing) (Cont.) • Meaningful shadows • Requirements: • Good visual quality of stego image • Secret image extraction and reconstruction • Solutions: • Applying steganography techniques • Applying image authentication mechanisms
Multimedia (Secret sharing) (Cont.) Reconstructing Hiding Stego-image Reconstructed secret image Secret image Stego-image (n,2)-threshold secret sharing scheme Stego-image
Multimedia (Visual cryptography) • Requirements: • Secret message delivery • Unexpected user can not see the message from an individual share • Solutions: • Using shadow patterns • Using meaningful shadow images • Using Circle Shares
Multimedia (Visual cryptography) (Cont.) Staking Shadow 1 Shadow 2 Secret
Multimedia (Visual cryptography) (Cont.) Staking Shadow 1 Shadow 2 Secret
Multimedia (Visual cryptography) (Cont.) Rotating 40o Staking Staking Share 2 Share 1 Secret 1 “VISUAL” Secret 2 “SECRET”
Multimedia (Steganography) • Classification: • The target of modification • Frequency domain (e.g. DCT, DWT, DFT) • Spatial domain (e.g. pixel values) • Compression domain (e.g. VQ, LAC, SOC) • Stego image restoration • Irreversible data hiding • Reversible data hiding
Multimedia (Steganography) (Cont.) • Irreversible data hiding • Requirements: • High capacity • Good visual quality of stego images • Solutions: • Using Sudoku • Using wet paper codes concept • Using Hamming codes
Multimedia (Steganography) (Cont.) • Reversible • Requirements: • Fully reconstructing cover image • Good visual quality of stego image • High capacity • Solutions: • Data hiding in VQ indices • Data hiding in LAC codes • Data hiding in SOC codes • …
Data Hiding Hiding system Stego image Cover image 1 0 1 0 1 0 0 1 0 1 1 1 1 0 0 Secret message
Cover Carriers • Image • Video • Sound • Text
VQ Encoding (120,155,…,80) 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 (90,135,…,120) (100,125,…,150) … Index table Original Image (49,117,…,25) (50,42,…,98) (20,65,…,110) Codebook
Previous Work of Steganography on VQ To find the closest pairs
d(CW0, CW8) > TH d(CW13, CW14) > TH ,CW2 CW4, CW5 CW6, CW7 CW0, CW8, CW13, CW14 ,CW3 CW15, CW10 CW12, CW9 Unused CW1 1 CW11 0
CW0, CW8, CW13, CW14 Index Table Unused Encode Index Table Original Image
A secret message: 1 0 1 0 1 0 0 1 0 1 1 1 1 0 0 1 0 0 1 1 0 0 1 1 1 0 1 1 0 0 Index Table Secret bits CW1, CW2, CW4, CW5 CW6, CW7 CW11, CW3 CW15, CW10 CW12, CW9 1 0
A secret message: 1 0 1 0 1 0 0 1 0 1 1 1 1 0 0 1 0 0 1 1 0 0 1 1 1 0 1 1 0 0 Index Table Secret bits CW1, CW2, CW4, CW5 CW6, CW7 CW11, CW3 CW15, CW10 CW12, CW9 1 0
A secret message: 1 0 1 0 1 0 0 1 0 1 1 1 1 0 0 1 0 0 1 1 0 0 1 1 1 0 1 1 0 0 Index Table Secret bits
Zhang and Wang’s Method(Embedding) Secret data:1000 1011… p2 255 0 1 2 3 4 0 1 2 3 4 0 1 10002 1 35 : : : : : : : : : : : : : … 11 2 3 4 0 1 2 3 4 0 1 2 3 2 … 10 0 1 2 3 4 0 1 2 3 4 0 1 0 Cover image … 9 3 4 0 1 2 3 4 0 1 2 3 4 3 … 8 1 2 3 4 0 1 2 3 4 0 1 2 1 … 7 4 0 1 2 3 4 0 1 2 3 4 0 4 … 6 2 3 4 0 1 2 3 4 0 1 2 3 2 … 5 0 1 2 3 4 0 1 2 3 4 0 1 0 … 4 3 4 0 1 2 3 4 0 1 2 3 4 3 … 3 1 2 3 4 0 1 2 3 4 0 1 2 1 … 2 4 0 1 2 3 4 0 1 2 3 4 0 4 … 1 2 3 4 0 1 2 3 4 0 1 2 3 2 … 0 0 1 2 3 4 0 1 2 3 4 0 1 0 Stego image p1 0 1 2 3 4 5 6 7 8 9 10 11 … 255 Magic Matrix
Zhang and Wang’s Method (Extracting) p2 255 0 1 2 3 4 0 1 2 3 4 0 1 : : : : : : : : : : : : : … 11 2 3 4 0 1 2 3 4 0 1 2 3 2 … 10 0 1 2 3 4 0 1 2 3 4 0 1 0 … 9 3 4 0 1 2 3 4 0 1 2 3 4 3 … 8 1 2 3 4 0 1 2 3 4 0 1 2 1 Stego image … 7 4 0 1 2 3 4 0 1 2 3 4 0 4 … 6 2 3 4 0 1 2 3 4 0 1 2 3 2 … 5 0 1 2 3 4 0 1 2 3 4 0 1 0 … 4 3 4 0 1 2 3 4 0 1 2 3 4 3 … 3 1 2 3 4 0 1 2 3 4 0 1 2 1 … 2 4 0 1 2 3 4 0 1 2 3 4 0 4 … 135 1 2 3 4 0 1 2 3 4 0 1 2 3 2 … 0 0 1 2 3 4 0 1 2 3 4 0 1 0 p1 0 1 2 3 4 5 6 7 8 9 10 11 … 255 Magic Matrix Extracted secret data: 10002
Sudoku • A logic-based number placement puzzle
Sudoku (Cont.) • A Sudoku grid contains nine 3 × 3 matrices, each contains different digits from 1 to 9. • Each row and each column of a Sudoku grid also contain different digits from 1 to 9. • Property Possible solutions: 6,670,903,752,021,072,936,960 (i.e. ≈ 6.671×1021)
Data Hiding Using Sudoku - 1 Reference Matrix M
Data Hiding Using Sudoku (Embedding) (Cont.) Secret data:011 001 10… 279 Cover Image min. d( , ) = ((8-8)2+(4-7)2)1/2=3 d( , ) = ((9-8)2+(7-7)2)1/2=1 d( , ) = ((6-8)2+(8-7)2)1/2=2.24 Stego Image
Data Hiding Using Sudoku (Embedding) (Cont.) Secret data:011 001 10… 279 Cover Image d( , ) = ((11-11)2+(15-12)2)1/2=3 d( , ) = ((15-11)2+(12-12)2)1/2=4 d( , ) = ((9-11)2+(14-12)2)1/2=2.83 min. Stego Image
Data Hiding Using Sudoku (Extracting) (Cont.) Stego Image Extracted data: 279 = 011 0012
Experimental Results (Cont.) The results of visual quality and Embedding capacity comparisons
(7, 4) Hamming Coding • Encoding p1p2d1p3d2d3d4 d1d2d3d4 Encoding Data: 1 1 0 12 d2 d3 d4 = p3 1 0 1 = 0 d1 d3 d4 = p2 1 0 1 = 0 d1 d2 d4 = p1 1 1 1 = 1 10 1 0 1 0 1 p1p2d1p3d2d3d4 Encoded data
(7, 4) Hamming Coding (Cont.) Error bit • Error Detection Received data: 1 0 1 0 1 1 1 Correcting Corrected data: 1 0 1 0 1 0 1 Error Position Parity check matrix H
Matrix Coding Method • Embedding Cover Image (1010100)T = (1 1 1)T Stego Image 0 0 1 Secret data: 1 1 0 0… Parity check matrix H
Matrix Coding Method (Cont.) • Extracting Stego Image (0010100)T = (1 1 0)T Extracted secret data: 1 1 0 0… ■ 7 pixels embed 3 bits
“Hamming+1” Method • Embedding Cover Image 00001010 (1+1+0+1+1+0+0+1) mod 2= 1 or (0+1+0+1+1+0+0+1) mod 2= 0 00001100 (1010100)T = (1 1 1)T ? = Stego Image 0 0 1 Secret data: 1 1 0 0… Parity check matrix H
“Hamming+1” Method (Cont.) • Extracting Stego Image (0+1+0+1+1+0+0+1) mod 2= 0 (0010100)T = (1 1 0)T = Extracted secret data: 1 1 0 0… ■ 8 pixels embed 4 bits