![Page 1: 1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University ccc](https://reader033.vdocuments.site/reader033/viewer/2022061513/56649efd5503460f94c10852/html5/thumbnails/1.jpg)
1
濕影像的資訊隱藏技術
Chair Professor Chin-Chen ChangFeng Chia University
National Chung Cheng University National Tsing Hua Universityhttp://msn.iecs.fcu.edu.tw/~ccc
1
![Page 2: 1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University ccc](https://reader033.vdocuments.site/reader033/viewer/2022061513/56649efd5503460f94c10852/html5/thumbnails/2.jpg)
2
Secrets
Sender
Receiver
Internet
Data EmbeddingData Embedding
‧Steganography
- prison problem
‧Reversible data hiding
- Medical image
- Military image
-Quality and capacity
Secrets
![Page 3: 1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University ccc](https://reader033.vdocuments.site/reader033/viewer/2022061513/56649efd5503460f94c10852/html5/thumbnails/3.jpg)
3
0 1 2 3 4
12 3 4 0
2 34 0 1
01 2 3 4
0 1 23 4
…
……
255
255
p2
p10 1 2 3 4
0
1
2
3
4
0
2
4
1
3
0 1 2 3 4 0
Magic Matrix
Zhang, X. P. and Wang, S. Z., “Efficient Steganographic Embedding by Exploiting Modification Direction,” IEEE communications letters, vol. 10, no. 11, pp. 1-3, Nov., 2006.
n=2, F(2, 3)=3
s=1
(p1', p2') = (2, 2)
F(p1, p2) = (1*p1 + 2*p2) mod (2n+1)
![Page 4: 1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University ccc](https://reader033.vdocuments.site/reader033/viewer/2022061513/56649efd5503460f94c10852/html5/thumbnails/4.jpg)
4
Data Hiding Using Sudoku (1/8)
Spatial domain data embedding Sudoku
A logic-based number placement puzzle
![Page 5: 1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University ccc](https://reader033.vdocuments.site/reader033/viewer/2022061513/56649efd5503460f94c10852/html5/thumbnails/5.jpg)
5
Data Hiding Using Sudoku (2/8)
Property
Possible solutions: 6,670,903,752,021,072,936,960
(i.e. ≈ 6.671×1021)
•A Sudoku grid contains nine 3 × 3 matrices, each contains different digits from 1 to 9.
•Each row and each column of a Sudoku grid also contain different digits from 1 to 9.
![Page 6: 1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University ccc](https://reader033.vdocuments.site/reader033/viewer/2022061513/56649efd5503460f94c10852/html5/thumbnails/6.jpg)
6
1
2
Data hiding using Sudoku (3/8) Review Zhang and Wang’s method (Embedding)
8 7 9 4
79 54 55 11
20 21 12 24
12 10 10 9
n
iin nippppf
121 )12( mod ))((),...,,(
Extracting function:
0 1 2 3 401234567
0 1 2 3 4 5 6 7 8 9 1011
89
1011
255
0 1 2 3 4 0 1255…
2 3 4 0 1 2 3 4 0 14 0 1 2 3 4 0 1 2 3 4
:
02 3
1 2 3 4 0 1 2 3 4 0 1 23 4 0 1 2 3 4 0 2 3 40 1 2 3 4 0 1 2 3 4 0 12 3 4 0 1 2 3 4 0 14 0 1 2 3 4 0 1 3 4 0
2 3
1 2 3 4 0 1 2 3 4 0 1 23 4 0 1 2 3 4 0 1 2 3 40 1 2 3 4 0 1 2 3 4 0 12 3 4 0 1 2 3 4 0 1 2 3
0 1 2 3 4 0 1 2 3 4 0 1
024130241302
………………………………
: : : : : : : : : : : :
Magic Matrix
Cover image
10002
1 35
Secret data: 1000 1011…
7 7 10 4
Stego imagep1
p2
![Page 7: 1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University ccc](https://reader033.vdocuments.site/reader033/viewer/2022061513/56649efd5503460f94c10852/html5/thumbnails/7.jpg)
7
0 1 2 3 401234567
0 1 2 3 4 5 6 7 8 9 1011
89
1011
255
0 1 2 3 4 0 1255…
2 3 4 0 1 2 3 4 0 14 0 1 2 3 4 0 1 2 3 4
:
02 3
1 2 3 4 0 1 2 3 4 0 1 23 4 0 1 2 3 4 0 1 2 3 40 1 2 3 4 0 1 2 3 4 0 12 3 4 0 1 2 3 4 0 14 0 1 2 3 4 0 1 2 3 4 0
2 3
1 2 3 4 0 1 2 3 4 0 1 23 4 0 1 2 3 4 0 1 2 3 40 1 2 3 4 0 1 2 3 4 0 12 3 4 0 1 2 3 4 0 1 2 3
0 1 2 3 4 0 1 2 3 4 0 1
024130241302
………………………………
: : : : : : : : : : : :
Magic Matrix
7 7 10 4
Stego image
1 35
Extracted secret data: 10002
p1
p2
Data hiding using Sudoku (4/8) Review Zhang and Wang’s method (Extracting)
![Page 8: 1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University ccc](https://reader033.vdocuments.site/reader033/viewer/2022061513/56649efd5503460f94c10852/html5/thumbnails/8.jpg)
8
Data hiding using Sudoku (5/8)
- 1
Reference Matrix M
![Page 9: 1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University ccc](https://reader033.vdocuments.site/reader033/viewer/2022061513/56649efd5503460f94c10852/html5/thumbnails/9.jpg)
9
Data hiding using Sudoku (Embedding) (6/8)
8 7 11 12
79 54 55 11
20 21 12 24
12 10 10 9
Cover Image
Secret data: 011 001 10…
279
d( , ) = ((8-8)2+(4-7)2)1/2=3d( , ) = ((9-8)2+(7-7)2)1/2=1d( , ) = ((6-8)2+(8-7)2)1/2=2.24
79
Stego Image
min.
![Page 10: 1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University ccc](https://reader033.vdocuments.site/reader033/viewer/2022061513/56649efd5503460f94c10852/html5/thumbnails/10.jpg)
10
Data hiding using Sudoku (Embedding) (7/8)
8 7 11 12
79 54 55 11
20 21 12 24
12 10 10 9
Cover Image
d( , ) = ((11-11)2+(15-12)2)1/2=3d( , ) = ((15-11)2+(12-12)2)1/2=4d( , ) = ((9-11)2+(14-12)2)1/2=2.83
9 1479
Stego Image
min.
279
Secret data: 011 001 10…
![Page 11: 1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University ccc](https://reader033.vdocuments.site/reader033/viewer/2022061513/56649efd5503460f94c10852/html5/thumbnails/11.jpg)
11
Data hiding using Sudoku (Extracting) (8/8)
9 7 9 14
Stego Image
Extracted data: 279 = 011 0012
![Page 12: 1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University ccc](https://reader033.vdocuments.site/reader033/viewer/2022061513/56649efd5503460f94c10852/html5/thumbnails/12.jpg)
12
Magic Matrix
Duc, K., Chang, C. C., “A steganographic scheme by fully exploiting modification directions,” Technique Report of Feng-Chia University.
r = F(pi, pj) = ((t-1) × pi + t × pj ) mod t2 t bits per pixel pair
![Page 13: 1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University ccc](https://reader033.vdocuments.site/reader033/viewer/2022061513/56649efd5503460f94c10852/html5/thumbnails/13.jpg)
13
Color retinal image Segmented image
![Page 14: 1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University ccc](https://reader033.vdocuments.site/reader033/viewer/2022061513/56649efd5503460f94c10852/html5/thumbnails/14.jpg)
14
Wet Paper Coding
Key
11 0
01
0 0 11 0
1 00 1 1
1 00 1
110 1 1
0 0 00 1 0
0 11 1 1 0
0 01 0
0
0 0 01 1 1
0
1
01
01
0
11 0
01
0 0 11 0
1 00 1 1
1 00 1
110 1 1
0 0 00 1 0
0 11 1 1 0
0 01 0
0
0 0 01 1 1
0
1
01
01
0
11 0
01
0 0 11 0
1 00 1 1
1 00 1
110 1 1
0 0 00 1 0
0 11 1 1 0
0 01 0
0
0 0 01 1 1
0
1
01
01
0
Fridrich, J. Goljan, M., Lisonek, P. and Soukal, D., “Writing on Wet Paper,” IEEE Transactions on Signal Processing, vol. 53, no. 10, pp. 3923- 3935, 2005
![Page 15: 1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University ccc](https://reader033.vdocuments.site/reader033/viewer/2022061513/56649efd5503460f94c10852/html5/thumbnails/15.jpg)
15
Wet Paper Coding (2/2)
Random Matrix
LSB of Cover Image
Secret Data
21 30 30
Cover Image
× =?
The important area is marked as wet pixel
20 30 31
Stego-image
![Page 16: 1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University ccc](https://reader033.vdocuments.site/reader033/viewer/2022061513/56649efd5503460f94c10852/html5/thumbnails/16.jpg)
16
Wet Paper Coding with XOR Operation
Key
Eight groups{31}, {35, 31, 32}, {34, 35, 33}, {32}, {33}, {35, 35}, {33, 33, 34}, {32, 32}
At least one dry pixel
Secrets: 0 1 0 1 0 1 1 1
LSB(35) ⊕LSB(31) ⊕ LSB(32) 1 {35, 31, 33}
LSB(31) 0 {30}
Stego-pixels
30 35 31 33
34 35 33 33
32 35 34 33
33 35 32 33
![Page 17: 1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University ccc](https://reader033.vdocuments.site/reader033/viewer/2022061513/56649efd5503460f94c10852/html5/thumbnails/17.jpg)
17
30 35 31 33
34 35 33 33
32 35 34 33
33 35 32 33
Secret Extracting
LSB(30) = 0
LSB(35) LSB(31) LSB(33) =⊕ ⊕ 1
LSB(34) LSB(35) LSB(33) = ⊕ ⊕ 0
LSB(33) = 1
LSB(32) = 0
LSB(35) LSB(34) = ⊕ 1
LSB(33) LSB(33) LSB(35)= ⊕ ⊕ 1
LSB(32) LSB(33) = ⊕ 1
![Page 18: 1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University ccc](https://reader033.vdocuments.site/reader033/viewer/2022061513/56649efd5503460f94c10852/html5/thumbnails/18.jpg)
18
Proposed Scheme (1/6)
Key
S = 3, 1, 2, 3, 1, 0, 0
Three types:
- Restricted Pairs of Wet Pixels (RPW)
- Non-restricted Pairs of Wet Pixels (NRPW)
- Pairs of Dry Pixels (DP)
Embeddable
![Page 19: 1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University ccc](https://reader033.vdocuments.site/reader033/viewer/2022061513/56649efd5503460f94c10852/html5/thumbnails/19.jpg)
19
(p1, p2) = (31, 3535), n=2
Proposed Scheme (2/6)
S=3
(p1', p2') = (33, 35)
x y
![Page 20: 1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University ccc](https://reader033.vdocuments.site/reader033/viewer/2022061513/56649efd5503460f94c10852/html5/thumbnails/20.jpg)
20
Proposed Scheme (3/6)
S=1
(p1', p2') = (31, 31)
y x
(p1, p2) = (31, 3232), n=2
![Page 21: 1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University ccc](https://reader033.vdocuments.site/reader033/viewer/2022061513/56649efd5503460f94c10852/html5/thumbnails/21.jpg)
21
(p1, p2) = (33, 3232), n=2
Proposed Scheme (4/6)
S=2
(p1', p2') = (34, 32)
![Page 22: 1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University ccc](https://reader033.vdocuments.site/reader033/viewer/2022061513/56649efd5503460f94c10852/html5/thumbnails/22.jpg)
22
33 34 32 32
3333 35 35
34 35 34 32
31 3133 35
Proposed Scheme (5/6)
33 34 32 32
3333 35 35
34 35 34 32
31 3133 35
Key
33 34 32 32
3333 35 35
34 35 34 32
31 3133 35
![Page 23: 1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University ccc](https://reader033.vdocuments.site/reader033/viewer/2022061513/56649efd5503460f94c10852/html5/thumbnails/23.jpg)
23
33 34 32 32
3333 35 35
34 35 34 32
31 3133 35
S = 3, 1, 2, 3, 1, 0, 0
1
2
4
53 67
r = F(pi, pj) = ((t-1) × pi + t × pj ) mod t2 t=2
![Page 24: 1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University ccc](https://reader033.vdocuments.site/reader033/viewer/2022061513/56649efd5503460f94c10852/html5/thumbnails/24.jpg)
24
Experimental Results (1/3)
t= 2 (192 Kb) PSNR = 56.18
t = 3 (304 Kb) PSNR = 46.93
t = 4 (384 Kb) PSNR = 44.96
t= 6 (496 Kb) PSNR = 38.72
t = 8 (576 Kb)PSNR = 34.58
Cover Image
![Page 25: 1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University ccc](https://reader033.vdocuments.site/reader033/viewer/2022061513/56649efd5503460f94c10852/html5/thumbnails/25.jpg)
25
Experimental Results (2/3)
![Page 26: 1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University ccc](https://reader033.vdocuments.site/reader033/viewer/2022061513/56649efd5503460f94c10852/html5/thumbnails/26.jpg)
26
Experimental Results (3/3)
[3] Fridrich, J., Goljan, M., Lisonek, P. and Soukal, D., “Writing on wet paper,” IEEE Transactions on Signal Processing, vol. 53, no. 10, pp. 3923-3935, 2005.
![Page 27: 1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University ccc](https://reader033.vdocuments.site/reader033/viewer/2022061513/56649efd5503460f94c10852/html5/thumbnails/27.jpg)
27
Conclusions
A novel steganographic technique with the fully exploiting modification (FEM) is proposed for digital images.
The experiments confirm that our proposed scheme can achieve the goals of high capacity and good visual quality.