15
1 Adaptive Data Hiding in Palette images by Color Ordering and Mapping With Security Protection Authors: Chih-Hsuan Tzeng, Zhi-Fang Yang, and Wen- Hsiang Tsai Source: IEEE Transactions On Communications, Vol. 52, No. 5, May 2004, pp. 791-800. Adviser Wen-Chung Kuo Jiin -Chiou Cheng Repoter Wei-De Hsu

1 Adaptive Data Hiding in Palette images by Color Ordering and Mapping With Security Protection Authors: Chih-Hsuan Tzeng, Zhi-Fang Yang, and Wen-Hsiang

Embed Size (px)

Citation preview

Page 1: 1 Adaptive Data Hiding in Palette images by Color Ordering and Mapping With Security Protection Authors: Chih-Hsuan Tzeng, Zhi-Fang Yang, and Wen-Hsiang

1

Adaptive Data Hiding in Palette images by Color Ordering and Mapping With Security

ProtectionAuthors: Chih-Hsuan Tzeng, Zhi-Fang Yang, and Wen-Hsiang TsaiSource: IEEE Transactions On Communications, Vol. 52, No. 5, May 2004, pp. 791-800.

Adviser : Wen-Chung Kuo

Jiin -Chiou Cheng

Repoter : Wei-De Hsu

Page 2: 1 Adaptive Data Hiding in Palette images by Color Ordering and Mapping With Security Protection Authors: Chih-Hsuan Tzeng, Zhi-Fang Yang, and Wen-Hsiang

2

Outline

• Introduction • The proposed method

– Color-ordering relationship– Color-mapping function– Data-embedding process– Data-extraction process

• Experimental results• Conclusions

Page 3: 1 Adaptive Data Hiding in Palette images by Color Ordering and Mapping With Security Protection Authors: Chih-Hsuan Tzeng, Zhi-Fang Yang, and Wen-Hsiang

3

Introduction

• Gifshuffle– The idea is to permute the colors in the

palette of an image in a specific order in accordance with the secret data. (256!)

indexes colors

0 0 0 0

1 0 255 0

2 255 0 0

3 0 0 255

Ex: 4!

[6] M. Kwan. (1998) GIF Colormap Steganography. [Online]. Available: http://www.darkside.com.au/gifshuffle/

Page 4: 1 Adaptive Data Hiding in Palette images by Color Ordering and Mapping With Security Protection Authors: Chih-Hsuan Tzeng, Zhi-Fang Yang, and Wen-Hsiang

4

Introduction

(a) The original image. (b) Replacement by the closet color.

(c) Replacement by the neighboring color.

Three colors c1, c2, c3, with RGB values (0, 174, 239), (57, 181, 74), and (236, 0, 140) are contained in the sample images.

[12] J. Fridrich and R. Du, “Secure steganographic methods for palette images,” in Proc. 3rd Int. Workshop Information Hiding, Dresden, Germany, 1999, pp. 47–60.

Page 5: 1 Adaptive Data Hiding in Palette images by Color Ordering and Mapping With Security Protection Authors: Chih-Hsuan Tzeng, Zhi-Fang Yang, and Wen-Hsiang

5

Color-ordering relationship

c1 c2 c3

c4

Page 6: 1 Adaptive Data Hiding in Palette images by Color Ordering and Mapping With Security Protection Authors: Chih-Hsuan Tzeng, Zhi-Fang Yang, and Wen-Hsiang

6

Proposed data-embedding process

12 12 12

12 12

12 12 16

10 10

12 12 12

12 60

12 16 17

10 18

00

26

148

48

Page 7: 1 Adaptive Data Hiding in Palette images by Color Ordering and Mapping With Security Protection Authors: Chih-Hsuan Tzeng, Zhi-Fang Yang, and Wen-Hsiang

7

Proposed data-embedding process

otherwise ,embeddable-non

and ,embeddable dc TTx

12 12 12

12 12

12 12 12

12 6000

148

10 ,2 dc TT

Non-embeddable

Page 8: 1 Adaptive Data Hiding in Palette images by Color Ordering and Mapping With Security Protection Authors: Chih-Hsuan Tzeng, Zhi-Fang Yang, and Wen-Hsiang

8

Proposed data-embedding process

otherwise ,embeddable-non

and ,embeddable dc TTx

12 12 16

10 10

12 16 17

10 6026

48

10 ,2 dc TT

embeddable

Page 9: 1 Adaptive Data Hiding in Palette images by Color Ordering and Mapping With Security Protection Authors: Chih-Hsuan Tzeng, Zhi-Fang Yang, and Wen-Hsiang

9

Color-mapping function

otherwise.

if

if

if

if

0,

1,

0,

1,

0,

),...,,('4

'3

'3

'2

'2

'1

'1

'4

'1

ccc

ccc

ccc

cc

cccfcm

'4

'3

'2

'1 cccc

'3c

'1c

'4c

'2c

c

c1 c2 c3

c4

Page 10: 1 Adaptive Data Hiding in Palette images by Color Ordering and Mapping With Security Protection Authors: Chih-Hsuan Tzeng, Zhi-Fang Yang, and Wen-Hsiang

10

Color-mapping function

12'3 c 17'

1 c

10'4 c

otherwise.

if

if

if

if

0,

1,

0,

1,

0,

),...,,('4

'3

'3

'2

'2

'1

'1

'4

'1

ccc

ccc

ccc

cc

cccfcm

48

36

16'2 c

18c

12'3 c 17'

1 c

10'4 c

16'2 c

16c

Hiding 0 Hiding 1

Page 11: 1 Adaptive Data Hiding in Palette images by Color Ordering and Mapping With Security Protection Authors: Chih-Hsuan Tzeng, Zhi-Fang Yang, and Wen-Hsiang

11

Data-extraction process

otherwise.

if

if

if

if

0,

1,

0,

1,

0,

),...,,('4

'3

'3

'2

'2

'1

'1

'4

'1

ccc

ccc

ccc

cc

cccfcm

36

12'3 c 17'

1 c

10'4 c

16'2 c

16c

Page 12: 1 Adaptive Data Hiding in Palette images by Color Ordering and Mapping With Security Protection Authors: Chih-Hsuan Tzeng, Zhi-Fang Yang, and Wen-Hsiang

12

Experimental results

colors). 256( 256256 15640 bits/44.8dB

10 ,2 dc TT

Page 13: 1 Adaptive Data Hiding in Palette images by Color Ordering and Mapping With Security Protection Authors: Chih-Hsuan Tzeng, Zhi-Fang Yang, and Wen-Hsiang

13

Experimental results

colors). 256( 300213 2003 bits/43.7dB

10 ,2 dc TT

Page 14: 1 Adaptive Data Hiding in Palette images by Color Ordering and Mapping With Security Protection Authors: Chih-Hsuan Tzeng, Zhi-Fang Yang, and Wen-Hsiang

14

Experimental results

Page 15: 1 Adaptive Data Hiding in Palette images by Color Ordering and Mapping With Security Protection Authors: Chih-Hsuan Tzeng, Zhi-Fang Yang, and Wen-Hsiang

15

Conclusions

• The experimental results show that secret data can be embedded and extracted successfully without producing visual artifacts in the cover image.

• A good balance between stego-image quality and data-embedding capacity can be achieved.