source: signal processing, vol. 89, issue 6, june 2009, pages 1129-1143 author: piyu tsai, yu-chen...

12
Reversible Image Hiding Scheme Using Predictive Coding and Histogram Shifting Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages 1129-1143 Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date: 2010.09.14

Upload: dayna-ramsey

Post on 17-Dec-2015

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages 1129-1143 Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:

Reversible Image Hiding Scheme Using Predictive

Coding and Histogram ShiftingSource: Signal Processing, Vol. 89, Issue 6, June 2009, Pages 1129-1143Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien YehSpeaker: Hon-Hang ChangDate: 2010.09.14

Page 2: Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages 1129-1143 Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:

OutlineIntroductionRelated WorkProposed MethodExperiment ResultsConclusions

Page 3: Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages 1129-1143 Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:

IntroductionReversible data hiding

Original imageStego-image

Secret data

Secret data

Original image

Extract

Embed

Page 4: Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages 1129-1143 Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:

Related workThe histogram-based reversible data hiding

5 6 6 6 7

5 5 6 6 6

3 3 5 5 0

1 2 2 2 2

1 2 3 3 1

4 6 5 6 7

4 4 6 5 5

3 3 4 4 0

1 2 2 2 2

1 2 3 3 1

original image

stego image

0 1 2 3 4 5 6 70

2

4

6

8# of occur in pixel x

Peak value: 6Zero value: 4

b= 1, no changeb=0, close to zero pixel at 1

• Peak value (Embeddable)

• In the range from zero value to peak value

Close to zero value at 1

• Out of the range from zero value to peak value

No change

b=101100

Page 5: Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages 1129-1143 Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:

Proposed methodLinear prediction

5 6 6 6 7

5 5 6 6 6

3 3 5 5 0

1 2 2 2 2

1 2 3 3 1

Original image(block size 5 by 5)

Basic pixel

0 1 1 1 2

0 0 1 1 1

-2 -2 5 0 -5

-4 -3 -3 -3 -3

-4 -3 -2 -2 -4

Residual image

0 1 2 3 4 5 6 70

2

4

6

8# of occur in pixel x

-1 -2 -3 -4 -5 -6 -70

2

4

6# of occur in pixel x

Non-negative histogram (NNH)

Negative histogram (NH)

Peak value: -3

Zero value: -1

Peak value: 1

Zero value: 3

Page 6: Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages 1129-1143 Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:

Proposed method(Cont.)Linear prediction

0 1 2 3 4 5 6 702468

# of occur in pixel x

-1 -2 -3 -4 -5 -6 -70

2

4

6# of occur in pixel x

Non-negative histogram (NNH)Negative histogram (NH)

Peak value= -3

Zero vale= -1

Peak value= 1Zero vale= 3

+1-1

0 1 1 1 2

0 0 1 1 1

-2 -2 5 0 -5

-4 -3 -3 -3 -3

-4 -3 -2 -2 -4

Residual image

3

-1 -1 5

-1 -1

0 3

0 0

-1 -1 5 0 -5

-4

-4 -1 -1 -4

Embed area

Page 7: Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages 1129-1143 Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:

Proposed method(Cont.)Embedding

Rule: b=1, no change (-3 or 1) b=0, the peak pixel close to zero pixel at 1 (-2 or 2)

0 1 2 1 3

0 0 1 2 2

-1 -1 5 0 -5

-4 -3 -2 -3 -2

-4 -3 -1 -1 -4

Embed area

0 1 1 1 2

0 0 1 1 1

-2 -2 5 0 -5

-4 -3 -3 -3 -3

-4 -3 -2 -2 -4

Residual image

Peak value= -3

Zero vale= -1

Peak value= 1

Zero vale= 3

0 1 2 3 4 5 6 70

5

10-1 -2 -3 -4 -5 -6 -7

0246

b= …1 0 1 1 0 0 1 0 1 0 1…

5 6 7 6 8

5 5 6 7 7

4 4 5 5 0

1 2 3 2 3

1 2 4 4 1

Stego-image

Page 8: Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages 1129-1143 Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:

Proposed method(Cont.)Extracting5 6 7 6 8

5 5 6 7 7

4 4 5 5 0

1 2 3 2 3

1 2 4 4 1

Peak value= -3

Zero vale= -1

NH

Peak value= 1

Zero vale= 3

NNH

Stego-image Residual stego-image

0 1 2 1 3

0 0 1 2 2

-1 -1 5 0 -5

-4 -3 -2 -3 -2

-4 -3 -1 -1 -4

1 or -3 b=1 no change

2 or -2 b=0 return to the peak pixel (1 or -3)

b= …1 0 1 1 0 0 1 0 1 0 1…

0 1 1 1 2

0 0 1 1 1

-2 -2 5 0 -5

-4 -3 -3 -3 -3

-4 -3 -2 -2 -4

The pixel x in the range from zeros value and peak value: Close toward the peak value at 1

The pixel x out of the range from zeros value and peak value: no change

5 6 6 6 7

5 5 6 6 6

3 3 5 5 0

1 2 2 2 2

1 2 3 3 1

Original image(block size 5 by 5)

Page 9: Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages 1129-1143 Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:

Proposed methodOverlapping scheme

0 1 2 3 4 5 6 702468

Peak value= 1, 0

Zero vale= 3, 4

NNH

b= 1, no changeb=0, close to zero pixel at 1

• Peak value (Embeddable)

b= 1close to zero pixel at 1b=0, close to zero pixel at 2

• Overlap value (Embeddable)

Close to the zero pixel at 2

• Peak value (No embed)

0 1 1 1 2

0 0 1 1 1

-2 -2 5 0 -5

-4 -3 -3 -3 -3

-4 -3 -2 -2 -4

Residual image

b=1 1 0 0 1 0 1 0 0 0

0 2 3 3 2

0 1 2 3 3

-2 -2 5 1 -5

-4 -3 -3 -3 -3

-4 -3 -2 -2 -4

Residual image

Page 10: Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages 1129-1143 Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:

Experiment results

Fig . 1 Testing image ‘‘MRI_400_400’’: (a) original image, (b) original histogram, (c) residual histogram and (d) stego-image.

Page 11: Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages 1129-1143 Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:

Experiment results(Cont.)

Fig . 1 Testing image ‘‘MRI_400_400’’: (a) original image, (b) original histogram, (c) residual histogram and (d) stego-image.

Fig. 2. Relationship between the stego-image quality and the hiding capacities

Page 12: Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages 1129-1143 Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:

Conclusions

The proposed method can achieve the goal of higher hiding capacity.The secret data are embedded in the residual images instead of the image histogram.