source: signal processing, vol. 89, issue 6, june 2009, pages 1129-1143 author: piyu tsai, yu-chen...
TRANSCRIPT
![Page 1: Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages 1129-1143 Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:](https://reader035.vdocuments.site/reader035/viewer/2022062421/56649cf35503460f949c126a/html5/thumbnails/1.jpg)
Reversible Image Hiding Scheme Using Predictive
Coding and Histogram ShiftingSource: Signal Processing, Vol. 89, Issue 6, June 2009, Pages 1129-1143Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien YehSpeaker: Hon-Hang ChangDate: 2010.09.14
![Page 2: Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages 1129-1143 Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:](https://reader035.vdocuments.site/reader035/viewer/2022062421/56649cf35503460f949c126a/html5/thumbnails/2.jpg)
OutlineIntroductionRelated WorkProposed MethodExperiment ResultsConclusions
![Page 3: Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages 1129-1143 Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:](https://reader035.vdocuments.site/reader035/viewer/2022062421/56649cf35503460f949c126a/html5/thumbnails/3.jpg)
IntroductionReversible data hiding
Original imageStego-image
Secret data
Secret data
Original image
Extract
Embed
![Page 4: Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages 1129-1143 Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:](https://reader035.vdocuments.site/reader035/viewer/2022062421/56649cf35503460f949c126a/html5/thumbnails/4.jpg)
Related workThe histogram-based reversible data hiding
5 6 6 6 7
5 5 6 6 6
3 3 5 5 0
1 2 2 2 2
1 2 3 3 1
4 6 5 6 7
4 4 6 5 5
3 3 4 4 0
1 2 2 2 2
1 2 3 3 1
original image
stego image
0 1 2 3 4 5 6 70
2
4
6
8# of occur in pixel x
Peak value: 6Zero value: 4
b= 1, no changeb=0, close to zero pixel at 1
• Peak value (Embeddable)
• In the range from zero value to peak value
Close to zero value at 1
• Out of the range from zero value to peak value
No change
b=101100
![Page 5: Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages 1129-1143 Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:](https://reader035.vdocuments.site/reader035/viewer/2022062421/56649cf35503460f949c126a/html5/thumbnails/5.jpg)
Proposed methodLinear prediction
5 6 6 6 7
5 5 6 6 6
3 3 5 5 0
1 2 2 2 2
1 2 3 3 1
Original image(block size 5 by 5)
Basic pixel
0 1 1 1 2
0 0 1 1 1
-2 -2 5 0 -5
-4 -3 -3 -3 -3
-4 -3 -2 -2 -4
Residual image
0 1 2 3 4 5 6 70
2
4
6
8# of occur in pixel x
-1 -2 -3 -4 -5 -6 -70
2
4
6# of occur in pixel x
Non-negative histogram (NNH)
Negative histogram (NH)
Peak value: -3
Zero value: -1
Peak value: 1
Zero value: 3
![Page 6: Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages 1129-1143 Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:](https://reader035.vdocuments.site/reader035/viewer/2022062421/56649cf35503460f949c126a/html5/thumbnails/6.jpg)
Proposed method(Cont.)Linear prediction
0 1 2 3 4 5 6 702468
# of occur in pixel x
-1 -2 -3 -4 -5 -6 -70
2
4
6# of occur in pixel x
Non-negative histogram (NNH)Negative histogram (NH)
Peak value= -3
Zero vale= -1
Peak value= 1Zero vale= 3
+1-1
0 1 1 1 2
0 0 1 1 1
-2 -2 5 0 -5
-4 -3 -3 -3 -3
-4 -3 -2 -2 -4
Residual image
3
-1 -1 5
-1 -1
0 3
0 0
-1 -1 5 0 -5
-4
-4 -1 -1 -4
Embed area
![Page 7: Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages 1129-1143 Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:](https://reader035.vdocuments.site/reader035/viewer/2022062421/56649cf35503460f949c126a/html5/thumbnails/7.jpg)
Proposed method(Cont.)Embedding
Rule: b=1, no change (-3 or 1) b=0, the peak pixel close to zero pixel at 1 (-2 or 2)
0 1 2 1 3
0 0 1 2 2
-1 -1 5 0 -5
-4 -3 -2 -3 -2
-4 -3 -1 -1 -4
Embed area
0 1 1 1 2
0 0 1 1 1
-2 -2 5 0 -5
-4 -3 -3 -3 -3
-4 -3 -2 -2 -4
Residual image
Peak value= -3
Zero vale= -1
Peak value= 1
Zero vale= 3
0 1 2 3 4 5 6 70
5
10-1 -2 -3 -4 -5 -6 -7
0246
b= …1 0 1 1 0 0 1 0 1 0 1…
5 6 7 6 8
5 5 6 7 7
4 4 5 5 0
1 2 3 2 3
1 2 4 4 1
Stego-image
![Page 8: Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages 1129-1143 Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:](https://reader035.vdocuments.site/reader035/viewer/2022062421/56649cf35503460f949c126a/html5/thumbnails/8.jpg)
Proposed method(Cont.)Extracting5 6 7 6 8
5 5 6 7 7
4 4 5 5 0
1 2 3 2 3
1 2 4 4 1
Peak value= -3
Zero vale= -1
NH
Peak value= 1
Zero vale= 3
NNH
Stego-image Residual stego-image
0 1 2 1 3
0 0 1 2 2
-1 -1 5 0 -5
-4 -3 -2 -3 -2
-4 -3 -1 -1 -4
1 or -3 b=1 no change
2 or -2 b=0 return to the peak pixel (1 or -3)
b= …1 0 1 1 0 0 1 0 1 0 1…
0 1 1 1 2
0 0 1 1 1
-2 -2 5 0 -5
-4 -3 -3 -3 -3
-4 -3 -2 -2 -4
The pixel x in the range from zeros value and peak value: Close toward the peak value at 1
The pixel x out of the range from zeros value and peak value: no change
5 6 6 6 7
5 5 6 6 6
3 3 5 5 0
1 2 2 2 2
1 2 3 3 1
Original image(block size 5 by 5)
![Page 9: Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages 1129-1143 Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:](https://reader035.vdocuments.site/reader035/viewer/2022062421/56649cf35503460f949c126a/html5/thumbnails/9.jpg)
Proposed methodOverlapping scheme
0 1 2 3 4 5 6 702468
Peak value= 1, 0
Zero vale= 3, 4
NNH
b= 1, no changeb=0, close to zero pixel at 1
• Peak value (Embeddable)
b= 1close to zero pixel at 1b=0, close to zero pixel at 2
• Overlap value (Embeddable)
Close to the zero pixel at 2
• Peak value (No embed)
0 1 1 1 2
0 0 1 1 1
-2 -2 5 0 -5
-4 -3 -3 -3 -3
-4 -3 -2 -2 -4
Residual image
b=1 1 0 0 1 0 1 0 0 0
0 2 3 3 2
0 1 2 3 3
-2 -2 5 1 -5
-4 -3 -3 -3 -3
-4 -3 -2 -2 -4
Residual image
![Page 10: Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages 1129-1143 Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:](https://reader035.vdocuments.site/reader035/viewer/2022062421/56649cf35503460f949c126a/html5/thumbnails/10.jpg)
Experiment results
Fig . 1 Testing image ‘‘MRI_400_400’’: (a) original image, (b) original histogram, (c) residual histogram and (d) stego-image.
![Page 11: Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages 1129-1143 Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:](https://reader035.vdocuments.site/reader035/viewer/2022062421/56649cf35503460f949c126a/html5/thumbnails/11.jpg)
Experiment results(Cont.)
Fig . 1 Testing image ‘‘MRI_400_400’’: (a) original image, (b) original histogram, (c) residual histogram and (d) stego-image.
Fig. 2. Relationship between the stego-image quality and the hiding capacities
![Page 12: Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages 1129-1143 Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:](https://reader035.vdocuments.site/reader035/viewer/2022062421/56649cf35503460f949c126a/html5/thumbnails/12.jpg)
Conclusions
The proposed method can achieve the goal of higher hiding capacity.The secret data are embedded in the residual images instead of the image histogram.