Transcript 下載/瀏覽
Adaptive Data Hiding in Edge
Areas of Images With Spatial
LSB Domain Systems
Cheng-Hsing Yang, Chi-Yao Weng,
Shiuh-Jeng Wang, Member, IEEE, and
Hung-Min Sun
學號:M99G0222
報告人:林福城
1
Outline
I. Introduction
II. Literature review
III. Our method
IV. Fundamentals and discussions
V. Experimental results
VI. Conclusions and future work
2
Introduction(1)
The Internet is becoming increasingly popular as a
communication channel. However, message transmissions via
the Internet have some problems, such as information
security , copyright protection.
A well-known steganographic method is the least-significantbit (LSB) substitution . This method embeds secret data by
replacing k LSBs of a pixel with k secret bits directly.
It is an important topic to find an adaptive steganographic
method, which embeds data adaptively by considering the
concept of human vision, with the features of high capacity
and low distortion.
3
Introduction(2)
In 2005, Wu et al. proposed the pixel-value differencing (PVD) and
LSB replacement method. In their approach, two pixels are
embedded by the LSB replacement method if their difference value
falls into a lower level. Similarly , the PVD method is used if the
difference value falls into a higher level.
In 2005, Park et al. proposed a steganographic scheme based on
the information of neighboring pixels. In this Approach ,the number
of bits embedded into a target pixel Px is determined by the
difference value of its neighboring pixels Pu and Pl, where Pu is
the upper pixel of and Pl is the left pixel of . Their approach is
similar to Chang and Tseng’s side-match method .
4
Literature review-LSB(1)
Wu et al.’s PVD and LSB replacement method.
Di=|pi-pi+1|
If Di <=15 , Lower level , R1
3bit LSB substitution method .
If Di >15 , High level ,R2,R3,R4,R5
pixel–value different (PVD).
5
Literature review-LSB(2)
For example
pi=56,pi+1=47,di=|56-47|=9
(Lower level)
Embed data is 111000,
After embed pi’=63 ,pi’+1=40,
di’=23>Div=15
After being readjusted
pi’=55,pi’+1=48,di’=55-48=7
(Lower level)
6
Literature review-PVD
(1) 舉列說明:
pi=100,pi+1=125, diff=25,
在對照表一後發現差值25是位於標記15的地
方,而隱藏的資料是4個位元。而目前要隱
藏的位元流為6=0110(2)。
(2) 隱藏演算法:
首先將6加上標記15,6+15=21。現在目標是
將原本的差值25變成21,於是我們將差異量
4分配到兩個像素上,使得100變成102、125
變成123,造成兩相鄰像素的差值為21。
(3) 粹取演算法:
當我們收到兩相鄰像素102、123後,首先對
照表一,發現差值21是位於標記15的地方,
隱藏的資料是4位元。然後將21-15=6,
6=0110(2),即可以得到隱藏位元流為0110。
7
This paper’s method(1)
R1=16
R2=16
R3=224
l log 2 R1
m log 2 R 2
h log 2 R 3
8
This paper’s methodEmbedding Procedure
Step 1. Calculate the difference value di=|pi-(pi+1)|
Step 2. Find out the level to which di belongs to. Let k= l,m,h
Step3. embed k secret bits into pi and k secret bits into pi+1 .
It represented by pi’, (pi+1)’
Setp4. Apply the modified LSB substitution method to pi’ and
(pi+1)’
Step 5. Calculate the new difference value di’=|pi’-(pi+1)’|
Step 6. if di and di’ belong to different levels, then readjust.
case 1.di is L,di’is not L , case 2 di is M ,di’ is L
case 3. di is M, di’ is H, case 4. di is H, di’ is not H.
9
This paper’s methodEmbedding Procedure
case 1.di is L , di’ is not L
if pi’>=(pi+1)’, readjust between (pi’,(pi+1)’+2^k) and (pi’-2^k,(pi+1)’),
else
(pi’,(pi+1)’-2^k) and (pi’+2^k,(pi+1)’)
case 2. di is M , di’ is L
if pi’>=(pi+1)’, readjust between (pi’ +2^k,(pi+1)’) and (pi’,(pi+1)’ -2^k),
else
(pi’,(pi+1)’-2^k) and (pi’+2^k,(pi+1)’
case 3. di is M, di’ is H
if pi’>=(pi+1)’, readjust between (pi’ +2^k,(pi+1)’) and (pi’,(pi+1)’ -2^k),
else
(pi’,(pi+1)’-2^k) and (pi’+2^k,(pi+1)’)
case 4. di is H, di’ is not H
if pi’>=(pi+1)’, readjust between (pi’,(pi+1)’-2^k) and (pi’+2^k,(pi+1)’)
else
(pi’ +2^k,(pi+1)’) and (pi’,(pi+1)’ -2^k)
10
This paper’s methodEmbedding Procedure
1.Pi=64=1000000(2),Pi+1=47=101111(2),
secret data bit=1010 0000(2)
2.di=|64-47|=17,it belong to middle level .So K=4, then change
4 bit.
3.Pi’=74=1001010(2), pi+1’=32=100000(2)
4.After the modified LSB substitution is applied (調整最高位元)
5.Pi’=58=111010(2), pi+1’=48=110000(2), di’=|58-48|=10,Low
level
6.Case 2,After Readjust
(58+2^4,48)=(74,48) range is 26 =(1001010(2),110000(2))
(58,48-2^4,)=(58,32)不使用
11
This paper’s method-Extraction
Procedure(1)
Step 1 Calculate the difference value di’ for each block with
consecutive pixels
Step 2 From the l-m-h division find out the level to which di’
belongs to. Let k=l,m,and h if di’ belongs to the level.
Step3 From the k-bit LSB of a pixel , extract k secret bits from
pi’ and (pi+1)’
12
This paper’s method-Extraction
Procedure(2)
(pi’,pi+1’)=(74,48)=(1001010(2),110000(2))
Di’=|74-48|=26 (Middle level)
Therefore k=4
So we can get secret bits is 1010(2),0000(2).
13
Fundamentals and discussions
Six restrictions are
1.l<log2|R1|
2.m<=log2|R2|
3.h<=log2|R3|
4.|R1|<=|R2|<=|R3|
5.|R1|+|R2|<=|R3|
6.1<= k<=6
Definition 1:
For the k-bit modified LSB substitution.
The rage [0,2^k-1] is bottom .
[255-2^k-1,255] is top.
If 5 bit modified LSB
[0,16] and [239,255]
Definition 2:
For the k-bit modified LSB substitution,
Pixel p is modifiable, if p is not belong to
the extreme ranges.
14
Lemma 1
Lemma 1 : p - 2
k -1
p p2
'
i
k -1
p ' [p - (2 k 1), p (2 k 1)]
k 1
k 1
1.[p - (2 1), p 2 ] p [p 1, p 2 ]
k
'
同加2^k
2.[p - 2 k-1 , p 2 k 1 ]
k 1
3.[p 2 , p 2 - 1] p [p - 2 , p 1]
同減2^k
p - 2 k-1 p ' p 2 k 1
得到
k -1
k
'
15
Lemma 2
From Lemma 1:
p i - 2 k -1 p i' pi 2 k 1
p i 1 - 2 k -1 p i' 1 p i 1 2 k 1
d i pi 1 pi
d i' pi' 1 pi'
(p i 1 - 2 k -1 ) ( pi 2 k 1 ) p i' 1 p i' ( p i 1 2 k 1 ) (p i - 2 k -1 )
di 2 k d i' di 2 k
16
Theorem 1
Theorem 1: Suppose that pi and pi+1are modifiable
and are embedded by the k-bit modified LSB
substitution, where their difference value belongs to
range R and k<=log|R| . Then , the readjusting
phase works.
d i 2 k d i' di 2 k
| d i' d i | 2 k
R 2k
17
Different range
Cases that di and di’ fall into difference ranges,
(a) di ∈ lower level.
(b) One case of
di ∈ middle level.
(c) The other case of
di ∈ middle level.
(d) di ∈ higher level.
18
Corresponding moving operations
Corresponding moving operations of p’i and p’i+1
(a) di ∈ lower level
(b) one case of
di ∈ middle level
(c) the other case
of di ∈ middle level
(d) di ∈ higher level.
19
Lemma 3 and Lemma 4
From define 1
Lemma 3 :
1.p - 2 k -1 p' p (2 k - 1)( Botton)
2.p (2 k 1) p' p 2 k -1 (Top)
Lemma 4 :
1 .0 p ' 2 k 1
2.255 ( 2 k 1) p ' 255
20
Lemma 5
From Lemma 1 and 3 :
1.pi - 2 k-1 pi ' pi ( 2 k - 1)
2.pi 1 - 2 k-1 pi 1 ' pi 1 ( 2 k-1 )
pi 1 - 2 k-1 ( pi ( 2 k - 1) pi 1 ' pi ' pi 1 ( 2 k-1 ) - pi - 2 k-1
di 2k ( 2k 1 1) di ' di 2k
From Lemma 1 and 3 :
1.pi - 2 k-1 pi ' pi ( 2 k-1 )
2.pi 1 - (2 k 1) pi 1 ' pi 1 ( 2 k-1 )
pi 1 - (2 k 1) pi ( 2 k-1 ) pi 1 ' pi ' pi 1 ( 2 k-1 ) - pi - 2 k-1
di 2k ( 2k 1 1) di ' di 2k
21
Lemma 5’s show
Relative positions of di and d’i
di 2k (2k 1) di ' di 2k
22
Experimental results
23
Conclusions and future works
This paper propose a new adaptive LSB substitution
method to embed secret data into gray images without
making perceptible distortion.
The relative attacks to either destroy or detect the
embedding information are not given in this paper.
24