Top Banner
High-Payload Image Steganography Using Two-Way Block Matching IEEE Signal Processing Lett ers, vol. 13 no.3, March 20 06 Ran-Zan Wang and Yeh-Shun C hen speaker: 李李李
18

High-Payload Image Steganography Using Two-Way Block Matching

Jan 12, 2016

Download

Documents

inari

High-Payload Image Steganography Using Two-Way Block Matching. IEEE Signal Processing Letters, vol. 13 no.3, March 2006 Ran-Zan Wang and Yeh-Shun Chen speaker: 李惠龍. Outline. Introduction Proposed scheme Experimental results Conclusion. Introduction. MSB. LSB. 8. 7. 6. 5. 4. 3. 2. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: High-Payload Image Steganography Using Two-Way Block Matching

High-Payload Image Steganography Using

Two-Way Block Matching

IEEE Signal Processing Letters, vol. 13 no.3, March 2006

Ran-Zan Wang and Yeh-Shun Chenspeaker: 李惠龍

Page 2: High-Payload Image Steganography Using Two-Way Block Matching

Outline

Introduction Proposed scheme Experimental results Conclusion

Page 3: High-Payload Image Steganography Using Two-Way Block Matching

Introduction

Embedding algorithm

Extraction algorithm

Message

Cover medi a

Stego medi a

Message

Key Key

Page 4: High-Payload Image Steganography Using Two-Way Block Matching

Introduction

Substitution system Least-significant-bit (LSB): utilize some

mapping rules to embed the message in certain LSB planes of the cover image

8 7 6 5 4 3 1122

LSBMSB

Page 5: High-Payload Image Steganography Using Two-Way Block Matching

Proposed scheme

CO

OCandECand

IM

OB+OBIFFEB+EDIFF

eind

EB+ECand

oind

OB+OCand

Choose a highest similarity to original IM block

Embed EB/OB, eind/oind, parameters and not-well-match blocks

Page 6: High-Payload Image Steganography Using Two-Way Block Matching

Proposed scheme

OCand and ECand blocks (amount 2t-1,respectively): Generate Cand images by replacing the q LSB of CO wit

h its (q+1) to 2q LSB. Divide Cand image into blocks of size mxn Two difference blocks PD(D) and ND(D), D={dij}

Use a threshold z and φ to choose OCand and ECand blocks (assign PD(D) to OCand and ND(D) to ECand)

njmidnd

njmidpd

ijDij

Dijij

1,1,

1,1,

Dist(Dc, Dj)< φ, c-z≤ j <cc

Page 7: High-Payload Image Steganography Using Two-Way Block Matching

Proposed scheme

IM blocks OBr or EBr is defined to be the corresponding odd/even in

teger closest to μr.

rr

rrr EDIFFEB

ODIFFOBB

njmiEBbediffEDIFF

njmiOBbodiffODIFF

rijijr

rijijr

1,1},{}{

1,1},{}{

Page 8: High-Payload Image Steganography Using Two-Way Block Matching

Proposed scheme

IM blocks

100 98

95 102

μr=99

EBr

98 98

98 98

2 0

-3 4+

EDIFFrBr

rr

rrr EDIFFEB

ODIFFOBB

100 98

95 102

μr=99

OBr

99 99

99 99

EX:

-1 1

-4 3+

ODIFFrBr

Page 9: High-Payload Image Steganography Using Two-Way Block Matching

Proposed scheme

Find indices (oind and eind)

120)},,(min{arg

120)},,(min{argt

jrr

tjrr

jECandEDIFFDisteind

jOCandODIFFDistoind

r

r

eindr

oindr

r ECandEB

OCandOBB

),(),( reindrroindr BECandEBDistBOCandOBDistrr

otherwise

rr

rrr EDIFFEB

ODIFFOBB

njmi

ijij spnm

SPDist1,1

2)(1

),(

Embed OBr and oindr or EBr and eindr

Page 10: High-Payload Image Steganography Using Two-Way Block Matching

Proposed scheme

Sufficiently large error Dist(ODIFF, OCand) or Dist(EDIFF, ECand) contain

large errors. Directly embed these block in the CO. The number of not-well-matched blocks:

r

r

eindr

oindr

r ECandEB

OCandOBB

rr

rrr EDIFFEB

ODIFFOBB

knmnmwh

tkwhq IMIMcoco

)(

Page 11: High-Payload Image Steganography Using Two-Way Block Matching

Proposed scheme

Embedding scheme Hop method Key: embedding location encode by Huffman coding scheme Embedded data:

Bases, indices, and not-well matched blocks

(stego-image) Parameters: him, wim, k, q, t, z, m, n, and φ Huffman table

Page 12: High-Payload Image Steganography Using Two-Way Block Matching

Proposed scheme

Extraction scheme Extract parameters, Huffman table, and stego-ima

ge Decode stego-image to obtain the bases, indeius

and not-well-matched blocks Generate odd candidate blocks and even candida

te blocks from stego-image Construct IM.

Page 13: High-Payload Image Steganography Using Two-Way Block Matching

Proposed scheme

Construct IM. If indi≠2t-1

Base is odd: Baseindi+ the indith odd candidate bloc

k

Base is even: Baseindi+ the indith even candidate bl

ock If indi=2t-1

Take not-well-matched block

r

r

eindr

oindr

r ECandEB

OCandOBB

Page 14: High-Payload Image Steganography Using Two-Way Block Matching

Experimental Results

Parameters: q=2, t=16, z=3, φ=32, and a block size: 4x4

Page 15: High-Payload Image Steganography Using Two-Way Block Matching
Page 16: High-Payload Image Steganography Using Two-Way Block Matching

37.93dB (Stego and Cover)

32.41dB (extract and origin)

Page 17: High-Payload Image Steganography Using Two-Way Block Matching
Page 18: High-Payload Image Steganography Using Two-Way Block Matching

Conclusion

Propose a high-payload image steganography method

High quality by two-way block-matching and hop scheme