Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu...

30
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science University of Science and Technology of China Information Hiding Conference 2011

Transcript of Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu...

Page 1: Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.

Capacity-Approaching Codes for Reversible Data Hiding

Weiming Zhang, Biao Chen, and Nenghai Yu

Department of Electrical Engineering & Information Science University of Science and Technology of China

Information Hiding Conference 2011

Page 2: Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.

2

What is reversible data hiding?

The original cover can be losslessly restored after the embedded information is extracted.

Introduction

messagestego

cover

data embedding

data extraction &

cover restoration cover

message

Page 3: Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.

3

What is reversible data hiding?

The original cover can be losslessly restored after the embedded information is extracted.

Why is reversible data hiding needed?

In some applications, even any degradation of the original cover is not allowed, such as medical imagery, military imagery and law forensics.

Introduction

Where is reversible data hiding applied?

Media annotation;integrity authentication ...

Page 4: Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.

4

How to do reversible data hiding?

Type-I: Binary feature sequence, generic compression method (e.g., arithmetic coder);

Type-II: Integer operations: Difference Expansion (DE) or Histogram Shifting (HS)— specific compression manner for the histogram

Introduction

Page 5: Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.

5

IntroductionType-I: Basic model

[Kalker]

d modifications

Embedding rate:

Distortion:

How to maximize embedding rate under any given distortion?

A rate-distortion problem

Page 6: Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.

6

Introduction

Theoretical upper bound [Kalker]

Page 7: Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.

7

Recursive Code construction [Kalker]

Key idea: the marked cover can be used to reconstruct the cover

1( )H x1 1( | )H x y

Introduction

Page 8: Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.

8

Observation INot only the marked cover can be used to reconstruct the cover, but also the reconstructed cover can help to extract message.

Two observations

Page 9: Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.

9

Two observations

Observation II

Page 10: Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.

10

Observation IIThe maximum capacity is achieved at D=p0- 1/2; When D≤p0- 1/2, the optimal embedding manner is that only 0’s are allowed to be changed. (Corollary 1 of Theorem 2, [Kalker])

Our strategy:

Only embed data into 0’s and skip 1’s;At the decoder side, the embedding positions can be recognized with the help of reconstructed cover.

Two observations

Page 11: Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.

11

RZL coding (reverse zero-run length) [Wong]

How to embed data into all-zero cover

Our method: improve RZL by the idea of ZZW construction

A construction consists of two layers:The outer layer: only embed one bit;The inner layer: when embedding bit “1” in the outer layer, embed another k bits with RZL; otherwise skip 2k zeros.

Message is divided into disjoint segments of k bits, each of which is converted to a integer d∈[0,2k-1]; skip d zeros in the cover, and flip the (d+1)th zero.

Page 12: Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.

12

Example: k = 2

How to embed data into all-zero cover

Page 13: Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.

13

How to embed data into all-zero cover

Page 14: Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.

14

Proposed method

Improved coding for all-zero cover

Improved recursive construction

x1: 0 1

y1: 0 1 1

Page 15: Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.

15

Example 2 (follows Example 1)

Proposed method

Page 16: Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.

16

Comparison: Embedding efficiency vs. embedding rate

Embedding efficiency e is defined as number of bits embedded by unit distortion, i.e. e=ρ/Δ=L/d.

Page 17: Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.

17

Comparison: Embedding efficiency vs. embedding rate

Page 18: Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.

18

Improving Type-I Schemes (embedding in binary feature sequences)

1. Improving RS method for spatial images [Fridrich]

Texture complexity of pixel blocks is used to construct binary feature sequence.

Page 19: Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.

19

Improving Type-I Schemes

1. Improving RS scheme for spatial images [Fridrich]

Page 20: Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.

20

Improving Type-I Schemes

2. Improving the scheme for JPEG images [Fridrich]

quantized DCT coefficients with value 0 and 1 are used as binary feature sequence.

Page 21: Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.

21

2. Improving the scheme for JPEG images [Fridrich]

Improving Type-I Schemes

Page 22: Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.

22

3. Improving PS scheme for binary images [Ho]

Patterns of 4-length vector in difference image are used as binary sequence.

Y.-A. Ho, et al., ``High capacity reversible data hiding in binary images using pattern substitution,” Computer Standards and Interfaces, 2009.

Test images

Improving Type-I Schemes

Page 23: Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.

23

Improving Type-I Schemes

3. Improving PS scheme for binary images

Page 24: Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.

24

Improving Type-I Schemes

3. Improving PS scheme for binary images

Embed 260 bits

(a) Marked by PS (b) Marked by improved PS

Page 25: Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.

25

Improving Type-II Scheme

Improving HS-based scheme for spatial images [Luo]

L. X. Luo, et al., ``Reversible Image Watermarking Using Interpolation Technique," IEEE Trans. Inf. Forensics and Security, 2010.

The proposed codes is used at the second embedding stage.Extension by embedding with two bins.

Page 26: Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.

26

Improving Type-II Schemes

3. Improving HS-based scheme for spatial images

(a) Lenna

Page 27: Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.

27

Improving Type-II Schemes

3. Improving HS-based scheme for spatial images

(b) Baboon

Page 28: Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.

28

Improving Type-II Schemes

3. Improving HS-based scheme for spatial images

(c) Boat

Page 29: Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.

29

Future work:Integer-domain reversible data hiding

Conclusion:

• An improved coding method for all-zero cover• An improved recursive construction • A reversible data hiding method for binary cover

Page 30: Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.

30

Thank you for your attention!