1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P....

51
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbala kshmi, Senior Member, IEEE IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 9, NO. 3, APRIL 2007 Receiver October 6, 2005;revised August 1, 2006 Adviser: Chih-Hung Lin Speaker: Shau-Shiang Hung Date : 98/10/13

Transcript of 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P....

Page 1: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

1

Security and Robustness Enhancement

for Image Data Hiding

Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior M

ember, IEEE

IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 9, NO. 3, APRIL 2007Receiver October 6, 2005;revised August 1, 2006

Adviser: Chih-Hung Lin

Speaker: Shau-Shiang Hung

Date : 98/10/13

Page 2: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

2

Outline

• Author• Introduction• Related Work: LUT Embedding• Proposed Hash-Based Randomized Embedding • Optimizing HRE Against JPEG Attack• Experimental Result• Conclusion

Page 3: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

3

Authors

Page 4: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

4

Author(1)

In 1995,recived the B.E in electrical engineering from the Sichuan University, China.

In 2001,recived the M.E in signal processing engineering form the Tongji University, China.

Since 2002, pursuing the Ph.D. degree in Electrical and Computer Engineering, Stevens Institute of Technology, Hoboken, NJ.

Now, Working in the MSyNC Lab under the guidance of Prof. K. P. Subbalakshmi.

Ning Liu

Page 5: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

5

Author(2)

Palak Amin

In 2003, received the B.E. and the M.E. in computer engineering form Stevens Institute of Technology, Hoboken, NJ.

Now he is currently pursuing the Ph.D.

Page 6: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

6

Author(3)

K.P. Subbalakshmi

An Assistant Professor in Electrical and Computer Engineering, Steven Institute of Technology, Hoboken, NJ.

Research interests are in the areas of information and communication security, joint source channel coding.

Page 7: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

7

Introduction

Page 8: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

8

I. Introduction(1)

• DIGITAL data hiding application

• Optimal Data hiding

Page 9: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

9

I. Introduction(2)

• A fundamental issue, “Tradeoff” • Capacity ,robustness, and distortion.

• Another equally important parameter• Security of the hide data.

Page 10: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

10

I. Introduction(3)

• In 1998, a lattice based embedding algorithm

» (J. Chae, D. MukherJee, and B. Manjunath, “Color image embeddingusing multidimensional lattice structures,” in Proc. IEEE Int. Conf.Image Processing (ICIP’98), 1998.)

• In 2003, Using a look up table (LUT)» M. Wu, “Joint security and robustness enhancement

for quantization based data embedding,” IEEE Trans. Circuits Syst. Video Technol., vol.13, pp. 831–841, Aug. 2003.

Page 11: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

11

I. Introduction(4)

• Propose an algorithm– Hash-based randomized embedding algorithm

(HRE)

Page 12: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

12

II. Related Work: LUT Embedding

Page 13: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

13

II. Related Work: LUT Embedding(1)

Page 14: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

14

• For example, q=10, and LUT:

• Embed a “1” in a pixel value “78”

II. Related Work: LUT Embedding(2)

Page 15: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

15

II. Related Work: LUT Embedding(3)

• Although the closest multiple of 10 to 78 is 80,T(80)=0,the algorithm picks “60” as the watermarked pixel value.

if

Then,be embed

Page 16: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

16

II. Related Work: LUT Embedding(4)

• The entropy rate

• The mean squared error of LUT (MSEA), run r

Page 17: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

17

III. Proposed Hash-Based Randomized Embedding Algorithm

Page 18: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

18

III. Proposed Hash-Based Randomized Embedding Algorithm(1)

• Encoder Framework

Page 19: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

19

III. Proposed Hash-Based Randomized Embedding Algorithm(1.1)

• Partition the Host Sequence into Subsequences:– M=R/L, M = even

Page 20: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

20

III. Proposed Hash-Based Randomized Embedding Algorithm(1.2)

Page 21: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

21

III. Proposed Hash-Based Randomized Embedding Algorithm(1.3)

• Parameter Calculation:– If use SCS scheme

– Else, if compensating for distortion due to JPGE attack

OR

Page 22: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

22

III. Proposed Hash-Based Randomized Embedding Algorithm(1.4)

• Embedding Process:– Parameter t.

– For each

– Embed one bit by using the SCS scheme

Page 23: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

23

III. Proposed Hash-Based Randomized Embedding Algorithm(2)

• Decoder Framework

• Security Analysis– Attacker

1) Exhaustive search in the entire key space.

2) Statistical analysis from the probability distribution of the stego-sequence

Page 24: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

24

III. Proposed Hash-Based Randomized Embedding Algorithm(3)

Page 25: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

25

III. Proposed Hash-Based Randomized Embedding Algorithm(2.1)

• Attack 2)

– Let– Entropy of X with hash function

=

With the 2L components in this table

Page 26: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

26

III. Proposed Hash-Based Randomized Embedding Algorithm(2.2)

Page 27: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

27

IV. Optimal HRE Against JPEG Attack

Page 28: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

28

IV. Optimal HRE Against JPEG Attack(1)

JPEG algorithm uses quantizers organized in a table, called the quantization table Q

Page 29: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

29

IV. Optimal HRE Against JPEG Attack(2)

A. Optimal Embedding for the JPEG Compression Attack.

B. Optimization of

Page 30: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

30

IV. Optimal HRE Against JPEG Attack(3.1)

A. Optimal Embedding for the JPEG Compression Attack – From quantization theory

• The uniform quantizer can be modeled as an additive uniform noise channel with variance

Page 31: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

31

IV. Optimal HRE Against JPEG Attack(3.2)

• HRE is also uniform quantizer based

• Uniform nosie as

• Improve capacity in lower WNR range

• Assumption

Page 32: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

32

IV. Optimal HRE Against JPEG Attack(3.2.1)

Page 33: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

33

IV. Optimal HRE Against JPEG Attack(3.2.2)

Page 34: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

34

IV. Optimal HRE Against JPEG Attack(3.2.3)

Page 35: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

35

IV. Optimal HRE Against JPEG Attack(3.3)

• Uniform quantizer based embedding with DC– Two parameter:

and

Page 36: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

36

IV. Optimal HRE Against JPEG Attack(3.3.1)

Page 37: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

37

IV. Optimal HRE Against JPEG Attack(3.3.2)

Page 38: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

38

IV. Optimal HRE Against JPEG Attack(3.4)

Depend on relation between and

So there are two cases of

Page 39: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

39

IV. Optimal HRE Against JPEG Attack(3.4)

B. Optimization of Case 1:

And

Page 40: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

40

IV. Optimal HRE Against JPEG Attack(3.4.1)

Page 41: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

41

IV. Optimal HRE Against JPEG Attack(3.5)

• B. Optimization of Case 2:

Page 42: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

42

IV. Optimal HRE Against JPEG Attack(3.5.1)

Page 43: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

43

V. Experimental Result

Page 44: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

44

V. Experimental Result(1)

Page 45: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

45

V. Experimental Result(2)

Page 46: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

46

V. Experimental Result(3)

Page 47: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

47

V. Experimental Result(4)

Page 48: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

48

V. Experimental Result(5)

Page 49: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

49

Conclusion

Page 50: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

50

Conclusion(1)

• This HRE algorithm can be increased independent of capacity, robustness and embedding induced distortion

• The proposed HRE algorithm provides joint security and robustness improvement over the traditional quantization based embedding scheme and LUT algorithm.

Page 51: 1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.

51

Conclusion(2)

• Experimental results showed that the proposed scheme achieves the same embedding capacity as SCS against AWGN attack

• On the other hand, the algorithm causes 7 dB less distortion than STDM at fixed embedding rate and robustness against JPEG compression attack.