1 / 38

Advanced Data Hiding Schemes: A Comprehensive Study

Explore LSB-Based, VQ-Based & BTC-Based data hiding schemes for image, video, sound & text. Learn about imperceptibility, capacity optimization, and security measures. Dive into experiments & findings by Prof. Chin-Chen Chang from National Chung Cheng University.

peterkin
Download Presentation

Advanced Data Hiding Schemes: A Comprehensive Study

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A Data Hiding Scheme Based Upon Block Truncation Coding Chin-Chen Chang Computer Science and Information Engineering National Chung Cheng University April, 2004

  2. Outline • Introduction to data hiding • Review some data hiding schemes • LSB-Based data hiding scheme • VQ-Based data hiding scheme • BTC-based oriented data hiding scheme • Experiments and conclusions

  3. Introduction Prof. Chin-Chen Chang National Chung Cheng University Extract hidden data C.C. Chang

  4. Cover Carriers • Image • Video • Sound • Text

  5. Requirements • Imperceptibility Embedding image should not appear any artificial effect • Capacity Maximize the embedding payloads • Security Secret messages can not be extracted by the illegal users

  6. LSB-Based Data Hiding Scheme MSB: Most significant bit LSB: Least significant bit MSB LSB 8 7 6 5 4 3 2 1 8 bits/pixel Example: color 1 0 0 0 0 0 0 0 =128 Original pixel value Similar 1 0 0 0 0 1 1 1 =135 Processed pixel value

  7. VQ-Based Data Hiding Scheme

  8. Vector Quantization (VQ) • VQ is a block-based lossy image compression method • Definition of vector quantization (VQ): , where Y is a finite subset of Rk. • VQ is composed of the following three parts: • Codebook generation process, • Encoding process, and • Decoding process.

  9. Standard VQ Compression W×H W H i index i Original image Index table Codebook

  10. 10

  11. VQ Codebook Training 0 1 . . . N-1 Training Images Training set Separating the image to vectors

  12. VQ Codebook Training 0 1 . . . 0 1 . . . 254 255 N-1 Initial codebook Training set Codebook initiation

  13. Vector Quantization (VQ) Codebook Training 0 1 . . . 254 255 Index sets 0 1 . . . (1, 2, 5, 9, 45, …) (101, 179, 201, …) (8, 27, 38, 19, 200, …) (23, 0, 67, 198, 224, …) N-1 N Codebook Ci Training set 0 1 . . . Compute mean values 254 255 Replace the old vectors New Codebook Ci+1 Training using iteration algorithm 13

  14. Example Codebook To encode an input vector, for example, v = (150,145,121,130) (1) Compute the distance between v with all vectors in codebook d(v, cw1) = 114.2 d(v, cw2) = 188.3 d(v, cw3) = 112.3 d(v, cw4) = 124.6 d(v, cw5) = 122.3 d(v, cw6) = 235.1 d(v, cw7) = 152.5 d(v, cw8) = 63.2 (2) So, we choose cw8 to replace the input vector v. 14

  15. LBG Algorithm

  16. Full Search (FS) For example: Let the codebook size be 256 Image vector • # of searched nodes • per image vector = 256 • Time consuming • The closest codeword C = {c1, c2, …, cnc} 16

  17. Euclidean Distance • The dimensionality of vector = k (= w*h) • An input vector x = (x1, x2, …, xk) • A codeword yi = (yi1, yi2, …, yik) • The Euclidean distance between x and yi

  18. To find the closest pairs 18

  19. CW1 ,CW2 CW4, CW5 CW6, CW7 CW0, CW8, CW13, CW14 ,CW3 CW11 CW15, CW10 CW12, CW9 Unused d(CW0, CW8) > TH d(CW13, CW14) > TH 1 0 19

  20. CW0, CW8, CW13, CW14 Unused Encode Index Table Index Table 20

  21. Watermark: 1 0 1 0 1 0 0 1 0 1 1 1 1 0 0 1 0 0 1 1 0 0 1 1 1 0 1 1 0 0 Index Table Watermark CW1, CW2, CW4, CW5 CW6, CW7 CW11, CW3 CW15, CW10 CW12, CW9 1 0 21

  22. Watermark: 1 0 1 0 1 0 0 1 0 1 1 1 1 0 0 1 0 0 1 1 0 0 1 1 1 0 1 1 0 0 Index Table Watermark CW1, CW2, CW4, CW5 CW6, CW7 CW11, CW3 CW15, CW10 CW12, CW9 1 0 22

  23. Watermark: 1 0 1 0 1 0 0 1 0 1 1 1 1 0 0 1 0 0 1 1 0 0 1 1 1 0 1 1 0 0 Index Table Watermark 23

  24. BTC Based Data Hiding Scheme

  25. Block Truncation Coding (BTC) • BTC is a block-based lossy image compression method for gray-level images • The output data of BTC for an image block contains one bitmap and two quantization levels

  26. w 140 142 144 145 h 146 141 146 142 145 141 144 142 142 138 141 144 An Example of BTC Encoding Bitmap 4×4 image pixels 0 0 1 1 1 0 1 0 1 0 1 0 0 0 0 1 # of 0 is 9 # of 1 is 7, q=7 Mean value X=142.5 Variance value ρ=2.199 Original Image Two quantization levels

  27. 141 141 145 145 145 141 145 141 145 141 145 141 141 141 141 145 An Example of BTC Decoding Bitmap 0 0 1 1 1 0 1 0 Decoding 1 0 1 0 0 0 0 1 Reconstructed pixels

  28. 140 141 -1 142 141 1 144 145 -1 145 145 0 146 145 1 0 141 141 1 146 145 142 1 141 145 145 0 141 0 141 145 -1 144 142 141 1 141 1 142 138 141 -3 141 141 0 -1 144 145 = - Original pixels Processed pixels Difference

  29. Our Scheme BTC Compression Block division (4×4 pixels) YES No Skip Embedding Complex block Smooth block

  30. Why we embed secret into the smooth block? • Pixels in the smooth block are close to their neighboring pixels, even though we change the bits in the bitmap, its reconstructed pixel value is still close to its original one

  31. 145 141 141 141 141 145 141 145 145 141 145 141 141 141 141 145 Our Scheme Example Smooth block 1 0 0 0 0 1 0 1 Bitmap 1 0 1 0 0 0 1 1 0 0 0 1 1 0 1 0 1 0 1 0 0 0 0 1 T=10 (Threshold) Secret bits=1000 0101 Stego pixels

  32. Our Scheme • A larger T gets high embedding capacity, but lower image quality of the stego image and vice versa • T is set to be 0, then no secret bits can be hidden • T is set to be ∞, then all of the bitmap in each block will be used to embed secret, and that is the maximum embedding capacity

  33. Experiments (a) Lena (d) Toys (b) Peppers (c) F-16 Four test images 33

  34. Experiments Resulting of embedding capacity and image quality (PSNR) 34

  35. Experiments (c) T=10 (a) Original image (b) BTC compression (d) T=15 (e) T=20 (f) T=∞ 35

  36. Experiments (a) Original image (b) BTC compression (c) T=10 (f) T=∞ (d) T=15 (e) T=20 36

  37. Conclusions • An efficient and secure data hiding approach based upon BTC • Data hiding in compression domain • VQ • JPEG or JPEG2000 • GIF

  38. Thank you !

More Related