《《影像伪装术》PPT课件.ppt》由会员分享,可在线阅读,更多相关《《影像伪装术》PPT课件.ppt(33页珍藏版)》请在三一办公上搜索。
1、影像偽裝術,Dr.Chin-Chen Chang,Department of Information Engineering and Computer Science,Feng Chia University,Taichung,Taiwan,2,Data Hiding,Cover image,Hiding system,Secret message,Stego image,1 0 1 0 1 0 0 1 0 1 1 1 1 0 0,3,Cover Carriers,ImageVideoSoundText,4,Palette Image Conversion,Palette(16 colors)
2、,Index table,0123456789101112131415,(100,125,73),Original Image,5,To find the closest pairs,5,C0C1C2C3C4C5C6C7C8C9C10C11C12C13C14C15,Palette,6,1,0,C0C1C2C3C4C5C6C7C8C9C10C11C12C13C14C15,7,Index Table,Encode,Original Image,8,A secret message:1 0 1 0 1 0 0 1 0 1 1 1 1 0 0,Index Table,C1,C2,C4,C5C6,C7,
3、C11,C3C15,C10C12,C9,1,0,Secret bits,1,1,0,0,0,1,0,1,1,1,1,0,0,1,0,9,A secret message:1 0 1 0 1 0 0 1 0 1 1 1 1 0 0,Index Table,C1,C2,C4,C5C6,C7,C11,C3C15,C10C12,C9,1,0,Secret bits,1,1,0,0,0,1,0,1,1,1,1,0,0,1,0,10,A secret message:1 0 1 0 1 0 0 1 0 1 1 1 1 0 0,Index Table,Secret bits,1,1,0,0,0,1,0,1,
4、1,1,1,0,0,1,0,11,Adaptive Embedding Method,C0,C6,C1,C7,C14,S0,C5,C3,C10,S1,C8,C12,C11,S4,C13,C15,S3,C4,C2,C9,S2,12,Secret message:(1 0 1 0 1 0 0 1 0)2=(338)10,Index Table,13,C2C4C9,C0C1C6C7C14,C3C5C10,C13C15,C0C1C6C7C14,C2C4C9,C8C11C12,C0C1C6C7C14,C2C4C9,S2,S0,S1,S3,S0,S2,S4,S0,S2,S2 X S0 X S1 X S3
5、X S0 X S2 X S4 X S0 X S2=(C2,C0,C3,C13,C0,C2,C8,C0,C2),(C2,C0,C3,C13,C0,C2,C8,C0,C4),(C2,C0,C3,C13,C0,C2,C8,C0,C9),(C9,C14,C10,C15,C14,C9,C12,C14,C9),14,0:(2,0,3,13,0,2,8,0,2)1:(2,0,3,13,0,2,8,0,4)2:(2,0,3,13,0,2,8,0,9),338:(2,0,3,13,6,4,11,6,2),32399:(9,14,10,15,14,9,12,14,9),15,Tzeng et al.s Data
6、Hiding,Palette,C0C1C2C3C4C5C6C7,Q:Ci CjA:,The luminance function:l=0.3*r+0.59*g+0.11*b The color-ordering relationship,?,16,Ex1:,Ex2:,Q:,A:,Q:,A:,17,Palette,C0C1C2C3C4C5C6C7,Q:d(Ci,Cj)=?A:Ex1:,18,Q:How to hide a secret bitA:Using color-mapping functionEx1:,Image data,in,c4,c3,c2,c1,0,0,0,1,1,19,Ex2:
7、,20,Image data X,palette P,and secret data A,Check the data embeddability of each pixel,Sort the colors of four precedent neighbors and perform the color-mapping function,Is the mapped result equals the secret bit?,Embed the secret bit without modifyingimage data,Embed the secret bit by using the cl
8、osest color of image data,Yes,No,Embedding Process,21,Embedding Process,If the secret data is 0,Image data,Palette,22,Embedding Process,If the secret data is 1,Image data,Embedded result,Palette,23,The Proposed Scheme,S0,S1,S2,S3,S4,The clustering,24,S0,S1,S2,S3,S4,25,S0,S1,S2,S3,S4,26,Combination t
9、echnique,c4,c6,c7,c5,c0,c2,c3,c1,Secret data:(1011)2=(11)10,c4,c6,c7,c4,c6,c7,c4,c6,c7,Q=3x3x3=27,11th combination,c4,c6,c7,c4,c6,c7,c4,c6,c7,c4,c6,c7,c4,c6,c7,c4,c6,c7,c4,c6,c7,c4,c6,c7,c4,c6,c7,0000,0001,0010,S0,S1,S2,S3,S4,27,c4,c6,c7,c5,c0,c2,c3,c1,Q=3x3x3x3x3x3x3x3x3x3x3x2x2=708588,Secret data:
10、()2(473060)10,S0,S1,S2,S3,S4,28,Experimental Results,Host Images,Stego Images,29,Schemes,Images,Table 1.Embedding performance,30,Table 2.Embedding capacity and image quality,31,32,Conclusions,An adaptive data hiding scheme for the palette images.High embedding capacity and good image quality,33,Thank you very much for your attention!,