Lossless information hiding in images

Lossless Information Hiding in Images introduces many state-of-the-art lossless hiding schemes, most of which come from the authors' publications in the past five years. After reading this book, readers will be able to immediately grasp the status, the typical algorithms, and the trend of the f...

Descripción completa

Detalles Bibliográficos
Otros Autores: Lu, Zhe-Ming, author (author), Guo, Shi-Ze, author
Formato: Libro electrónico
Idioma:Inglés
Publicado: Amsterdam, [Netherlands] : Zhejiang University Press 2017.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009630462106719
Tabla de Contenidos:
  • Front Cover
  • Lossless Information Hiding in Images
  • Lossless InformationHiding in Images
  • Copyright
  • Contents
  • Preface
  • 1 - Introduction
  • 1.1 BACKGROUND
  • 1.1.1 DEFINITION OF IMAGES
  • 1.1.1.1 Images
  • 1.1.1.2 Digital Images
  • 1.1.2 IMAGE PROCESSING AND IMAGE ANALYSIS
  • 1.1.2.1 Image Processing in a Broad Sense
  • 1.1.2.2 Image Processing in a Narrow Sense
  • 1.1.2.2.1 Image Enhancement
  • 1.1.2.2.2 Image Restoration
  • 1.1.2.2.3 Image Compression
  • 1.1.2.3 Image Analysis
  • 1.1.3 NETWORK INFORMATION SECURITY
  • 1.1.4 IMAGE PROTECTION AND IMAGE AUTHENTICATION
  • 1.1.4.1 Image Protection
  • 1.1.4.2 Image Authentication
  • 1.2 OVERVIEW OF INFORMATION HIDING
  • 1.2.1 BASIC CONCEPTS RELATED TO INFORMATION HIDING
  • 1.2.2 PROPERTIES AND REQUIREMENTS OF INFORMATION HIDING
  • 1.2.3 INFORMATION HIDING MODELS
  • 1.2.3.1 Prisoner's Model
  • 1.2.3.2 General Model
  • 1.2.3.3 Communication-Based Models
  • 1.2.4 RESEARCH BRANCHES OF INFORMATION HIDING
  • 1.2.4.1 Steganography
  • 1.2.4.2 Copyright Marking
  • 1.2.4.3 Covert Channel
  • 1.2.4.4 Subliminal Channel
  • 1.2.4.5 Anonymous Communication
  • 1.2.5 CLASSIFICATION OF INFORMATION HIDING TECHNOLOGIES
  • 1.2.5.1 Classification According to the Types of Cover Objects
  • 1.2.5.2 Classification According to the Symmetry of Keys
  • 1.2.5.3 Classification According to the Embedding Domains
  • 1.2.5.4 Classification Based on Other Ways
  • 1.2.6 APPLICATIONS OF INFORMATION HIDING TECHNIQUES
  • 1.2.6.1 Covert Communication
  • 1.2.6.2 Broadcast Monitoring
  • 1.2.6.3 Owner Identification
  • 1.2.6.4 Ownership Verification
  • 1.2.6.5 Transaction Tracking
  • 1.2.6.6 Content Authentication
  • 1.2.6.7 Annotation
  • 1.2.6.8 Copy Control
  • 1.2.6.9 Device Control
  • 1.3 OVERVIEW OF IMAGE CODING AND COMPRESSION TECHNIQUES
  • 1.3.1 SOURCE CODING AND DATA COMPRESSION
  • 1.3.2 LOSSLESS IMAGE CODING TECHNIQUES.
  • 1.3.2.1 Run-Length Encoding
  • 1.3.2.2 Differential Pulse-Code Modulation and Predictive Coding
  • 1.3.2.3 Entropy Encoding
  • 1.3.2.4 Adaptive Dictionary Algorithms
  • 1.3.2.5 Deflation
  • 1.3.3 LOSSY IMAGE CODING TECHNIQUES
  • 1.3.3.1 Color Space Reduction
  • 1.3.3.2 Chroma Subsampling
  • 1.3.3.3 Transform Coding
  • 1.3.3.4 Fractal Compression
  • 1.3.4 VECTOR QUANTIZATION
  • 1.3.5 BLOCK TRUNCATION CODING
  • 1.3.6 JPEG
  • 1.3.7 JPEG2000
  • 1.3.7.1 Color Component Transformation
  • 1.3.7.2 Tiling
  • 1.3.7.3 Wavelet Transform
  • 1.3.7.4 Quantization
  • 1.3.7.5 Coding
  • 1.4 OVERVIEW OF INFORMATION HIDING TECHNIQUES FOR IMAGES
  • 1.4.1 ROBUST IMAGE WATERMARKING
  • 1.4.1.1 Background
  • 1.4.1.2 Definitions
  • 1.4.1.3 Image Watermarking System
  • 1.4.1.4 Characteristics
  • 1.4.1.5 Overview of Techniques
  • 1.4.2 FRAGILE IMAGE WATERMARKING
  • 1.4.2.1 Background
  • 1.4.2.2 Classification
  • 1.4.2.3 Requirements
  • 1.4.2.4 Watermarking-Based Authentication System
  • 1.4.2.4.1 Authentication Watermark Embedding
  • 1.4.2.4.2 Authentication Watermark Extraction and Verification
  • 1.4.2.5 Overview of Techniques
  • 1.4.3 IMAGE FINGERPRINTING
  • 1.4.3.1 Background and Basic Concept
  • 1.4.3.2 Differences Between Watermarking and Fingerprinting
  • 1.4.3.3 Requirements
  • 1.4.3.4 Overview of Techniques
  • 1.4.4 IMAGE STEGANOGRAPHY
  • 1.4.4.1 Background and Basic Concept
  • 1.4.4.2 Image Steganography System
  • 1.4.4.3 Overview of Techniques
  • 1.4.5 LOSSLESS INFORMATION HIDING IN IMAGES
  • 1.4.5.1 Background and Basic Concepts
  • 1.4.5.2 Classifications of Schemes
  • 1.4.5.3 Overview of Techniques
  • 1.4.5.4 Performance Evaluation Criteria for Lossless Data Hiding Schemes
  • 1.5 APPLICATIONS OF LOSSLESS INFORMATION HIDING IN IMAGES
  • 1.5.1 LOSSLESS HIDING AUTHENTICATION
  • 1.5.2 FIDELITY CONTROL FOR COVER MEDIA
  • 1.5.3 STATUS RECOVERY FOR COVER MEDIA.
  • 1.6 MAIN CONTENT OF THIS BOOK
  • REFERENCES
  • 2 - Lossless Information Hiding in Images on the Spatial Domain
  • 2.1 OVERVIEW OF SPATIAL DOMAIN-BASED INFORMATION HIDING
  • 2.2 MODULO ADDITION-BASED SCHEME
  • 2.2.1 EMBEDDING PROCESS
  • 2.2.2 AUTHENTICATION PROCESS
  • 2.2.3 EXPLANATION OF THE MODULO ADDITION OPERATION
  • 2.3 DIFFERENCE EXPANSION-BASED SCHEMES
  • 2.3.1 TIAN'S SCHEME
  • 2.3.2 ALATTER'S SCHEME
  • 2.4 HISTOGRAM MODIFICATION-BASED SCHEMES
  • 2.4.1 ORIGINAL HISTOGRAM SHIFTING-BASED SCHEME
  • 2.4.2 ADJACENT PIXEL DIFFERENCE-BASED SCHEME
  • 2.4.3 MULTILEVEL HISTOGRAM MODIFICATION-BASED SCHEME
  • 2.4.3.1 Data Embedding
  • 2.4.3.2 Data Extraction and Image Recovery
  • 2.4.3.3 Examples
  • 2.4.3.3.1 EL=0
  • 2.4.3.3.2 EL=2
  • 2.4.3.4 Discussion
  • 2.4.3.4.1 Capacity Estimation
  • 2.4.3.4.2 Overflow and Underflow Prevention
  • 2.4.3.5 Experimental Results and Comparison With Other Schemes
  • 2.4.4 HYBRID PREDICTION AND INTERLEAVING HISTOGRAM MODIFICATION-BASED SCHEME
  • 2.4.4.1 Data Embedding
  • 2.4.4.2 Data Extraction and Image Recovery
  • 2.4.4.3 Experimental Results and Comparisons
  • 2.5 LOSSLESS COMPRESSION-BASED SCHEMES
  • 2.5.1 LOSSLESS BIT-PLANE COMPRESSION IN THE SPATIAL DOMAIN
  • 2.5.2 LOSSLESS RS-DATA EMBEDDING METHOD
  • 2.5.3 LOSSLESS G-LSB DATA EMBEDDING METHOD
  • 2.5.3.1 G-LSB Embedding
  • 2.5.3.2 Lossless G-LSB Data Embedding and Extraction
  • 2.5.4 LOOK-UP TABLE-BASED SCHEME FOR ERROR DIFFUSED HALFTONE IMAGES
  • 2.5.4.1 Pattern Histogram
  • 2.5.4.2 Human Visual System Characteristics
  • 2.5.4.3 Look-Up Table Construction
  • 2.5.4.4 Data Hiding
  • 2.5.4.5 Look-Up Table Embedding
  • 2.5.4.6 Data Extraction
  • 2.5.4.7 Experimental Results
  • 2.6 REVERSIBLE SECRET SHARING-BASED SCHEMES
  • 2.6.1 DATA HIDING IN REVERSIBLE SECRET SHARING
  • 2.6.1.1 Related Work
  • 2.6.1.2 Proposed Scheme
  • 2.6.1.2.1 Encoding Stage.
  • 2.6.1.2.2 Decoding Stage
  • 2.6.1.2.3 Example
  • 2.6.1.3 Experimental Results
  • 2.6.2 JOINT SECRET SHARING AND DATA HIDING FOR BLOCK TRUNCATION CODING-COMPRESSED IMAGES
  • 2.6.2.1 Related Work
  • 2.6.2.2 Joint Data Encryption and Data Hiding Model
  • 2.6.2.3 Joint Block Truncation Coding and Secret Sharing
  • 2.6.2.4 Experimental Results
  • 2.6.2.5 Discussions
  • 2.7 SUMMARY
  • REFERENCES
  • 3 - Lossless Information Hiding in Images on Transform Domains
  • 3.1 INTRODUCTION
  • 3.1.1 INVERTIBLE MAPPING
  • 3.1.1.1 Functions
  • 3.1.1.2 Injection, Surjection, and Bijection
  • 3.1.1.3 Left and Right Inverses
  • 3.1.2 REQUIREMENTS OF REVERSIBLE INFORMATION HIDING TO INTEGER TRANSFORMS
  • 3.2 OVERVIEW OF TRANSFORM-BASED INFORMATION HIDING
  • 3.2.1 DISCRETE COSINE TRANSFORM-BASED INFORMATION HIDING
  • 3.2.2 DISCRETE FOURIER TRANSFORM-BASED INFORMATION HIDING
  • 3.2.3 DISCRETE WAVELET TRANSFORM-BASED INFORMATION HIDING
  • 3.3 INTEGER DISCRETE COSINE TRANSFORM-BASED SCHEMES
  • 3.3.1 INTEGER DISCRETE COSINE TRANSFORM
  • 3.3.1.1 One-Dimensional Integer Discrete Cosine Transform and Its Fast Algorithm
  • 3.3.1.2 Two-Dimensional Integer Discrete Cosine Transform and its Fast Algorithm
  • 3.3.1.2.1 Two-Dimensional Integer Discrete Cosine Transform
  • 3.3.1.2.2 Reconstruction Algorithm for 2D-Integer Discrete Cosine Transform
  • 3.3.1.3 Comparison of Discrete Cosine Transform and Integer Discrete Cosine Transform
  • 3.3.2 INTEGER DISCRETE COSINE TRANSFORM-BASED LOSSLESS INFORMATION HIDING SCHEME USING COMPANDING TECHNIQUE
  • 3.3.2.1 Related Knowledge
  • 3.3.2.1.1 The Distribution of 8×8 Discrete Cosine Transform Coefficients
  • 3.3.2.1.2 Bit-Shift-Based Reversible Watermarking Technique
  • 3.3.2.1.3 Integer Discrete Cosine Transform and Left and Right Invertible Mapping
  • 3.3.2.2 Basic Embedding and Extracting Processes.
  • 3.3.2.3 Error Estimation to Prevent Overflow and Underflow
  • 3.3.2.4 Twice-Try Structures for Block Discrimination
  • 3.3.2.5 Improved Embedding and Extracting Processes
  • 3.3.2.6 Simulation Results
  • 3.3.3 HISTOGRAM SHIFT TECHNIQUE IN INTEGER DISCRETE COSINE TRANSFORM DOMAIN
  • 3.3.3.1 Histogram Modification Technique for Lossless Information Hiding
  • 3.3.3.2 Yang et al.'s Scheme
  • 3.3.3.3 Experimental Results
  • 3.3.4 LOSSLESS INFORMATION HIDING BY ADAPTIVE COEFFICIENT MODIFICATION IN INTEGER DISCRETE COSINE TRANSFORM DOMAIN
  • 3.3.4.1 Global Coefficient-Group Distortion Sorting
  • 3.3.4.2 Zero-Tree Discrete Cosine Transform Prediction
  • 3.3.4.3 Low-Frequency Coefficients-Based Prediction (LFCP)
  • 3.3.4.4 Experimental Results and Performance Analysis
  • 3.3.4.4.1 Watermarking Capacity Versus Distortion
  • 3.3.4.4.2 Performance Stability
  • 3.3.4.4.3 Performance Scalability
  • 3.3.4.4.4 Algorithm Complexity
  • 3.3.4.4.5 Algorithm Security
  • 3.4 INTEGER WAVELET TRANSFORM-BASED SCHEMES
  • 3.4.1 VALUE EXPANSION TECHNIQUE IN THE INTEGER WAVELET TRANSFORM DOMAIN
  • 3.4.1.1 The Compression Function Suitable for Value Expansion
  • 3.4.1.2 Recording of the Compression and Companding Error and Simplification of the Value Expansion
  • 3.4.2 COEFFICIENTS' MAGNITUDE PREDICTION TECHNIQUE IN INTEGER WAVELET TRANSFORM DOMAIN
  • 3.4.3 COMPARISONS BETWEEN GENERALIZED LOSSLESS COMPRESSION-BASED AND VALUE EXPANSION-BASED SCHEMES
  • 3.4.3.1 Generalized Least Significant Bit Lossless Compression Scheme
  • 3.4.3.2 Integer Discrete Wavelet Transform Domain Lossless Bit-Plane Compression Scheme
  • 3.4.3.3 Integer Discrete Wavelet Transform Domain Coefficient Companding and Compression Scheme
  • 3.4.3.4 Integer Discrete Wavelet Transform Domain Histogram Shift Scheme
  • 3.5 SUMMARY
  • REFERENCES.
  • 4 - Lossless Information Hiding in Vector Quantization Compressed Images.