1 / 24

Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems

Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems. Adviser: Chih-Hung Lin Speaker : Chia-Wei Chang Date:2009/10/06. Introduce of Author. Author: Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang and Hung-Min Sun .

Download Presentation

Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Adaptive Data Hiding in Edge Areas of ImagesWith Spatial LSB Domain Systems Adviser: Chih-Hung Lin Speaker:Chia-Wei Chang Date:2009/10/06

  2. Introduce of Author • Author:Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wangand Hung-Min Sun. • IEEE Transactions on Information Forensics and Security, vol. 3, no. 3, september 2008. • C.-H. Yang is with the Department of Computer Science, National Pingtung University of Education, Pingtung, 900, Taiwan. • C.-Y. Weng and H. M. Sun are with the Department of Computer Science, National Tsing-Hua University, Hsinchu, 300, Taiwan, R.O.C. • S.-J. Wang, corresponding author, is with the Department of Information Management, Central Police University, Taoyuan, 333, Taiwan, R.O.C. • Manuscript received November 1, 2007; revised March 12, 2008. Published August 13, 2008 (projected).

  3. Outline • Introduction • Literature Review • Proposed Method • Embedding Procedure • Data Extraction • Experimental Results • Conclusions

  4. I.Introduction

  5. I.Introduction • Embedding = embedding

  6. I.Introduction • In 2003, Wu and Tsai proposed a “PVD”. • In2004, Chang and Tseng proposed a side-match method. • In 2005, Park et al. proposed a steganographic scheme based of neighboring pixels. • In 2005, Wu et al. proposed the pixel-value differencing (PVD) and LSB replacement method.

  7. I.Introduction • LSB techniques • PVD techniques • Side-Match techniques

  8. LSB method Fig.1:Wu et al.’s division of “lower level” and “higher level” (Div=15)􀀀

  9. II. Literature Review • Wu et al.’s PVD and LSB

  10. =|56-47|=9 (lower-level) =23>Div=15 =55-48=7 =63, =40 If level≠ level =55, =48 II. Literature Review • Example To embed 111000

  11. III.Proposed Method • 2-3 Division and 3-4-5 Division (a) (b) Fig. 2. Two dividing cases: (a) “lower level” and “higher level” and (b) “lower level,” “middle level,” and “higher level.”

  12. III.Proposed Method • 2-3 Division • 3-4-5 Division

  13. III-1.Embedding steps for l-m-h

  14. III-1.Embedding steps for l-m-h

  15. III-1.Embedding steps for l-m-h • Case6.1 =L-level ≠L-level • Case6.2 =M-level =L-level • Case6.3 =M-level =H-level • Csae6.4 =H-level ≠H-level

  16. =|64-47|=17 (middle-level) =42 =|74-48|=26 =10 =74, =58, =32 =48 =M-level =L-level =74, =48 III-1 Embedding Procedure Example To embed 4-bit LSB After the modified LSB substitution is applied

  17. III-2.Data Extraction

  18. =|74-48|=26 =74, =48 III-2.Data Extraction Example There are 4 bits embedded in and 4 bits embedded in ‘s secret bits ‘s secret bits

  19. IV.Experimental Results • Fig. 3:Two cover images. • Elaine. (b) Baboon.

  20. IV.Experimental Results

  21. IV.Experimental Results

  22. IV.Experimental Results

  23. IV.Experimental Results

  24. V.Conclusions • some l-h divisions and l-m-h divisions both yielded higher capacity and higher PSNR. • Embed secret data into gray images without making a perceptible distortion. • Can be analyzed automatically, aiming to capture an adequate - - division satisfying the key requirements in information hiding. • Experimental results show that our approach obtains both larger capacity and higher image quality than that of Wu et al.

More Related