1 / 22

Reversible data hiding scheme based on image interpolation using decimal signed

Achieving a simple algorithm compared to previous methods <br>Achieving a high EC compared to previous methods<br>Appropriate visual quality compared to previous methods<br>Independence of embeddable SD from reference pixels size<br>Security in accessing to SD with strategy of SD conversion

Reza8
Download Presentation

Reversible data hiding scheme based on image interpolation using decimal signed

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Reversible data hiding scheme based on image interpolation using decimal signed digit stream Reza Ghorbandost Soveiri Maryam Rajabzadeh Asaar

  2. Introduction Data hiding: • refers to embedding the secret data (SD) in digital multimedia • Important of data hiding techniques in spatial domain & Interpolation • Classification of data hiding techniques LSB DE HS Reversible data hiding Irreversible

  3. Interpolation: • Familiar word in mathematics • Is used in • Example of expansion process in 2×2 blocks: Signal processing Speech processing system Image resolution conversion and scale change Stretch the image based on its reference pixels Etc

  4. Basic interpolation techniques for data hiding in images: • NMIJung et al.(2009) • INP Lee et al.(2012) • ENMI Chang et al.(2013) • MNMI Malik et al.(2017) • NIE Mohammad et al.(2019) Improved Interpolation techniques for data hiding in images: • Chen et al.(2020) • Bai et al.(2022) • Zhang et al.(2023)

  5. The objectives of research • Achieving a simple algorithmcompared to previous methods • Achieving a high EC compared to previous methods • Appropriatevisual quality compared to previous methods • Independence of embeddable SD from reference pixels size • Security in accessing to SD with strategy of SD conversion

  6. Proposed scheme • (Basic interpolation techniques )+(Strategy of SD conversion) • Strategy of SD conversion for (n=4): • Proposed scheme EC: EC = (3/4)×(Image Size)×n

  7. Strategy of SD conversion for (n=5):

  8. Framework of our proposed scheme:

  9. An example for data embedding:

  10. Steps for recovering the original CI & SD extraction:

  11. Experimentalresults • Matlab R2016a on Windows 10 • Standard images with various textures • The SD includes a set of binary numbers randomly generated by MATLAB (11000111110000011100010101111………)2

  12. Measurement criteria: • EC = (3/4)×(Image Size)×n • PSNR = 10 (dB) • MSE =× • SSIM (P,P) = × × where α =β = γ =1 l(p,p') =c(p,p') =s(p,p') =

  13. Efficiency of the proposed schemeEmbedding capacity and visual quality in the stego image:EC(n=4): 786432 bits PSNR(n=4): 36.04 dBMSE(n=4): 16.15SSIM(n=4): 0.9309EC(n=5): 983040 bitsPSNR(n=5): 30.05 dBMSE(n=5): 64.2SSIM(n=5): 0.7889

  14. Overall comparisons of HC and PSNR for (n=4)

  15. Overall comparisons of HC and PSNR for (n=5)

  16. Comparison between the results of the our scheme with other methods

  17. Comparison in (Capacity & PSNR & SSIM) by other methods

  18. Overall comparisons of EC and PSNR in standard images

  19. Overall comparisons of EC and PSNR in standard images

  20. Conclusion • Reversible data hiding scheme based on interpolation • Applicable on all interpolation techniques • Using a strategy of data conversion for embedding • Creating the high embedding capacity on all standard images • Achieving to good visual quality on all standard images

  21. References [23] K.H. Jung and K.Y. Yoo, Data hiding method using image interpolation, Computer Standards and Interfaces, 31(2)(2009) 465-470. [34] Chen Y-Q, Sun W-J, Li L-Y, et al. An efficient general data hiding scheme based on image interpolation. J Inf Secur Appl 2020;54. https://doi.org/10.1016/j. jisa.2020.102584. [38] Bai X, Chen Y, Duan G, et al. A data hiding scheme based on the difference of image interpolation algorithms. J Inf Secur Appl 2022;65. https://doi.org/10.1016/j. jisa.2021.103068. [39] Zhang H , Sun H, Meng F. Reversible data hiding scheme based on improved interpolation and three-in-one intelligent strategy. J Inf Secur Appl 2023;77. https://doi.org/10.1016/j.jisa.2023.103573

  22. thanks for your attention

More Related