310 likes | 617 Views
Prediction-based reversible data hiding using the difference of neighboring pixels. Outline. Introduction Related works PE expansion method Proposed scheme Data embedding Data extraction and recovery Experimental results Conclusions. Introduction (1/3).
E N D
Prediction-based reversible data hiding using the difference of neighboring pixels
Outline • Introduction • Related works • PE expansion method • Proposed scheme • Data embedding • Data extraction and recovery • Experimental results • Conclusions
Introduction (1/3) • Data hiding is referred to as a process to hide some information data into cover media. • The data hiding schemes can be generally classified into two categories: - Irreversible data hiding - Reversible data hiding • Reversible data hiding schemes can be classified into two categories: - Difference expansion scheme (DE-based) - Histogram-based
Introduction (2/3) • Data Hiding sd Cover image Secret data Stego image
Introduction (3/3) • Reversible Data Hiding sd Extract Stego image Cover image
Related work – PE expansion method (1/4) • Thodi et al. proposed an expansion scheme based on prediction error (PE) to embed secret data. • Step 1 : The cover image is divided into several overlapping 2×2 blocks. embedding pixel The pixels of one 2 x 2 block Source: Thodi DM, Rodriguez JJ. Expansion embedding techniques for reversible watermarking. IEEE Transactions on Image Processing 2007;16(3):721–30.
Related work – PE expansion method (2/4) • Step 2 : The prediction value can be calculated by Eqs. (1) and (2): • Step 3 : Compute the prediction error e. • Step 4 : Compute the stego pixel p’.
Related work – PE expansion method (3/4) • Example of embedding procedure. S = 1 160 An example of cover image block.
Related work – PE expansion method (4/4) • Example of extraction procedure. S = 1 160 → (101)2 An example of cover image block.
Proposed scheme – Data embedding (1/13) • Step 1: The cover image is divided into two regions. 2 The LSB of the pixels in the non-embeddable region are used to record the information of pixels with overflow or underflow problems when embedding the secret data. 2 Embeddable and non-embeddable regions in the cover image.
Proposed scheme – Data embedding (2/13) • Step 2: The embeddable region is divided into (W − 3) × (H − 3) overlapping blocks sized 2 × 2and initial block index(BI) is 1. 2 embedding pixel 2 The pixels of one embeddable block.
Proposed scheme – Data embedding (3/13) • Step 3: The absolute difference of the neighboring pixels is calculated by Eq. (3) to identify whether the block is embeddable or not. • Step 4 : The prediction value is calculated by Eqs. (4) : If d < threshold T, Continue. • Step 5 : Compute the prediction error e.
Proposed scheme – Data embedding (4/13) • Step 6: Compute the intermediate stego pixel . • Step 7 : Compute the stego pixel p’. If the pixel cannot be embedded, the BI is transformed into a binary representation and embedded into the non-embeddable region by LSB. • Step 8 : Block index is increased by 1 and repeat the step 3 through 8 until all of the data are embedded.
Proposed scheme – Data embedding (5/13) • Example of embedding procedure. w = {0, 1} , T=2 100 Cover image Stego image 100
Proposed scheme – Data embedding (6/13) • Example of embedding procedure. w = {0, 1} , T=2 Because the absolute difference is higher than the threshold, this block cannot be embedded with the secret data. Cover image Stego image
Proposed scheme – Data embedding (7/13) • Example of embedding procedure. w = {0, 1} , T=2 255 Cover image overflow 255 The stego pixel must be modified into the original pixel, and its block index should be embedded into the non-embeddable region. Stego image
Proposed scheme – Data embedding (8/13) • Example of embedding procedure. w = {0, 1} , T=2 254 Cover image 255 Stego image
Proposed scheme – Data extraction and recovery(9/13) 2 • Example of extraction and recovery procedure. The indices of the overflow and underflow blocks (IOUB) can be extracted from the LSBs of the pixels in the non-embeddable region. T = 2, IOUB = 3 2
Proposed scheme – Data extraction and recovery(10/13) • Example of extraction and recovery procedure. T = 2, IOUB = 3 If BI belongs to IOUB, there is no secret bit in this block. If BI does not belong to IOUB and d is not smaller than T. If BI does not belong to IOUB and d is smaller than T. 254 There is one secret bit in this pixel. → (1)2 Stego image Cover image
Proposed scheme – Data extraction and recovery(11/13) • Example of extraction and recovery procedure. T = 2, IOUB = 3 If BI belongs to IOUB, there is no secret bit in this block. If BI does not belong to IOUB and d is not smaller than T. If BI does not belong to IOUB and d is smaller than T. Stego image The original pixel is the same as the stego pixel. Cover image
Proposed scheme – Data extraction and recovery(12/13) • Example of extraction and recovery procedure. T = 2, IOUB = 3 If BI belongs to IOUB, there is no secret bit in this block. If BI does not belong to IOUB and d is not smaller than T. If BI does not belong to IOUB and d is smaller than T. Stego image There is no secret bit in this block. Cover image
Proposed scheme – Data extraction and recovery(13/13) • Example of extraction and recovery procedure. T = 2, IOUB = 3 If BI belongs to IOUB, there is no secret bit in this block. If BI does not belong to IOUB and d is not smaller than T. If BI does not belong to IOUB and d is smaller than T. 100 There is one secret bit in this pixel. → (0)2 Stego image Cover image
Experimental results (1/5) • The 9 grayscale images of size 512 × 512 (a) Lena (b) Barbara (c) Boats (d) F-16 (e) Pepper (f) Tiffany (g) Sailboat (h)Gold (i)Zeldal
Experimental results (2/5) • The proposed scheme has better performance for smooth images than for complex images. (b) Barbara • Capacity: 214,099 bits • PSNR: 29.4361 dB • T = 43 Cover image Stego image (d) F-16 • Capacity: 257,031 bits • PSNR: 32.7826 dB • T = 255 Cover image Stego image
Experimental results (3/5) • Different thresholds with PSNR values Fig. 1. PSNR values of the proposed scheme with fixed and variant thresholds for the test images.
Experimental results (4/5) • Different thresholds with secret data Fig. 2. Secret data capacity of the proposed scheme with fixed and variant thresholds for the test images.
Experimental results (5/5) Fig. 3. Performance comparison between the proposed scheme and other schemes.
Conclusions • This paper propose a reversible data hiding scheme based on the PE expansion technique. • To use a pre-determined threshold and the absolute difference of the neighboring pixels to determine whether the current pixel is embeddable. • Good image quality. • High hiding capacity.