Authors : Dalila Goudia (LIRMM-SIMPA) Marc Chaumont (LIRMM, France) - - PowerPoint PPT Presentation

authors dalila goudia lirmm simpa
SMART_READER_LITE
LIVE PREVIEW

Authors : Dalila Goudia (LIRMM-SIMPA) Marc Chaumont (LIRMM, France) - - PowerPoint PPT Presentation

Authors : Dalila Goudia (LIRMM-SIMPA) Marc Chaumont (LIRMM, France) William Puech (LIRMM, France) Naima Hadj Said (SIMPA, Algeria) EUSIPCO 2011 Generalities Data hiding Joint data hiding and compression approach JPEG2000 standard


slide-1
SLIDE 1

EUSIPCO 2011

Authors : Dalila Goudia (LIRMM-SIMPA) Marc Chaumont (LIRMM, France) William Puech (LIRMM, France) Naima Hadj Said (SIMPA, Algeria)

slide-2
SLIDE 2
  • Generalities

– Data hiding – Joint data hiding and compression approach – JPEG2000 standard – Trellis Coded Quantization (TCQ)

  • Joint JPEG2000 compression & data hiding scheme

– The TCQ-based data hiding strategy – The proposed joint scheme – The embedding and extraction algorithms

  • Experimental evaluations

– Protocol 1: data hiding performances – Protocol 2 : compression performances

  • Conclusion

EUSIPCO 2011

slide-3
SLIDE 3
  • Generalities

– Data hiding – Joint data hiding and compression approach – JPEG2000 standard – Trellis Coded Quantization (TCQ)

  • Joint JPEG2000 compression & data hiding scheme

– The TCQ-based data hiding strategy – The proposed joint scheme – The embedding and extraction algorithms

  • Experimental evaluations

– Protocol 1: data hiding performances – Protocol 2 : compression performances

  • Conclusion

EUSIPCO 2011

slide-4
SLIDE 4
  • Content description and meta data enrichment applications
  • Embed the maximum amount of data (payload) in the host

image without perceptually distorting it

  • The information embedded must be recovered without

error during the extraction stage

EUSIPCO 2011

Secret message Embedding algorithm Host document Transmission via network Detector Secret message Key Key

1

slide-5
SLIDE 5

EUSIPCO 2011

Joint data hiding and compression Content description applications Low complexity

Compliant syntax bitstream

Good visual quality High Payload

Robustness to compression

2

slide-6
SLIDE 6

EUSIPCO 2011

codestream JPEG2000

Pre- Processing Forward wavelet transform Quantization Tier 1 encoder Tier 2 encoder Rate control stage ROI processing

  • riginal image

JPEG2000 features

  • Good compression performances, and smooth transmission from lossy to lossless
  • Progressive transmission
  • Regions of interest
  • Flexible file format
  • Error Resilience

ISO/IEC 15444-1, “Information Technology - JPEG2000 Image Coding System-Part 1: Core Coding System”, 2000

3

slide-7
SLIDE 7

EUSIPCO 2011 2

D D A  

3 1 1

D D A  

Partitioning of a scalar quantizer into 4 subsets conbined to form 2 union quantizers: & 1 2 3 4 5 6 7

D0 D2 D2 D0 D1 D3 D3 D1 D2 D2 D0 D0 D3 D3 D1 D1

Subsets Di of the 2 union quantizers A0 and A1 are used to label the branches of a trellis Quantization is performed by running the Viterbi algorithm to find the optimal path (minimum distortion path) through the trellis The least significant bit (LSB) of the TCQ indices determine the path through the trellis

4

slide-8
SLIDE 8
  • Generalities

– Data hiding – Joint data hiding and compression approach – JPEG2000 standard – Trellis Coded Quantization (TCQ)

  • Joint JPEG2000 compression & data hiding scheme

– The TCQ-based data hiding strategy – The proposed joint scheme – The embedding and extraction algorithms

  • Experimental evaluations

– Protocol 1: data hiding performances – Protocol 2 : compression performances

  • Conclusion

EUSIPCO 2011

slide-9
SLIDE 9

EUSIPCO 2011

  • The data is hidden during the quantization process

without any additional stage for hiding data.

  • Data hiding strategy derived from the QIM (Quantization

Index Modulation) principles

  • Integration into a TCQ approach (trellis)
  • Quantizers are modulated according to the data to hide
  • Data is embedded only in the significant wavelet coefficients

which have a better chance of survival after JPEG2000 rate allocation stage.

  • Selected coefficients are quantized with the associated

quantizer

5

slide-10
SLIDE 10

EUSIPCO 2011

  • Union quantizer A0: if the bit to embed is the bit 0, then the quantizer D0 is

used to quantize the wavelet coefficient. Otherwise the quantizer D2 is used.

  • Union quantizer A1: if the bit to embed is the bit 0, then the quantizer D1 is

used to quantize the wavelet coefficient. Otherwise the quantizer D3 is used.

x = 0 = 1

D0

m= 0 m= 1

D0 D0 D0 D0 D2 D2 D2 D2 D2 3Δ Δ 5Δ 7Δ 9Δ

1 2 3 4 5

  • 1
  • 2
  • 3
  • 4

D1 D1 D1 D1 D1 D3 D3 D3 D3 D3 4Δ 2Δ 6Δ 8Δ

  • Δ

1 2 3 4

  • 1
  • 2
  • 3
  • 4
  • 5

A

1

A x ˆ ) ( A q x ˆ ) (

1

A q

The QIM principles applied to TCQ union quantizers

  • f JPEG2000

6

slide-11
SLIDE 11

EUSIPCO 2011

The choice of the branch to traverse is determined by the value of the bit to be embedded The trellis is pruned only at the transitions which correspond to the selected coefficients The trellis pruning is similar to Miller et al. scheme (DPTC)

1 2 3 4 5 6 7

D0 D2 D2 D0 D1 D3 D3 D1 D2 D2 D0 D0 D3 D3 D1 D1 7

slide-12
SLIDE 12

EUSIPCO 2011

The trellis is pruned only at the transitions which correspond to the selected coefficients

  • if the bit to embed is the bit 0 : D0 and D1

are used to quantize the wavelet coefficient. Trellis structure : remove the red branches at the considered transition

1 2 3 4 5 6 7

D0 D0 D1 D1 D0 D0 D1 D1 8

slide-13
SLIDE 13

EUSIPCO 2011

The trellis is pruned only at the transitions which correspond to the selected coefficients

  • if the bit to embed is the bit 1 : D2 and D3

are used to quantize the wavelet coefficient. Trellis structure : remove the blue branches at the considered transition

1 2 3 4 5 6 7

D2 D2 D3 D3 D2 D2 D3 D3 9

slide-14
SLIDE 14
  • Computation of selection threshold τIBP for each

code-block

  • Coefficients are selected if their TCQ indices have

their absolute magnitude bits greater than τIBP

  • Data is hidden in the least significant bits (LSB) of

the TCQ indices of the selected coefficients

Note : in order to avoid destruction of those LSBs (path in the trellis) by the JPEG2000 R-D optimisation stage, they are moved to a higher bit plane position.

EUSIPCO 2011

10

slide-15
SLIDE 15

EUSIPCO 2011

1 2 3 4 5 6 7

D0 D0 D2 D2 D2 D0 D0 D2 D1 D1 D3 D3 D3 D3 D1 D1 D2 D2 D2 D2 D0 D0 D0 D0 D3 D3 D3 D3 D1 D1 D1 D1 D0 D2 D0 D2 D1 D3 D3 D1 D2 D2 D0 D0 D3 D1 D1 D3 D0 D2 D0 D2 D1 D3 D3 D1 D2 D2 D0 D0 D3 D1 D1 D3 D0 D2 D0 D2 D1 D3 D3 D1 D2 D2 D0 D0 D3 D1 D1 D3 D0 D2 D0 D2 D1 D3 D3 D1 D2 D2 D0 D0 D3 D1 D1 D3

Transition 1 2 3 4 5

11

slide-16
SLIDE 16

EUSIPCO 2011

1 2 3 4 5 6 7

D0 D0 D2 D2 D2 D0 D0 D2 D1 D1 D3 D3 D3 D3 D1 D1 D2 D2 D2 D2 D0 D0 D0 D0 D3 D3 D3 D3 D1 D1 D1 D1 D0 D2 D0 D2 D1 D3 D3 D1 D2 D2 D0 D0 D3 D1 D1 D3 D0 D2 D0 D2 D1 D3 D3 D1 D2 D2 D0 D0 D3 D1 D1 D3 D0 D2 D0 D2 D1 D3 D3 D1 D2 D2 D0 D0 D3 D1 D1 D3 D0 D2 D0 D2 D1 D3 D3 D1 D2 D2 D0 D0 D3 D1 D1 D3

Transition 1 2 3 4 5 Selection no yes no yes no

11

slide-17
SLIDE 17

EUSIPCO 2011

1 2 3 4 5 6 7

D0 D0 D2 D2 D0 D0 D1 D1 D3 D3 D1 D1 D2 D2 D0 D0 D0 D0 D3 D3 D1 D1 D1 D1 D0 D2 D0 D2 D1 D3 D3 D1 D2 D2 D0 D0 D3 D1 D1 D3 D2 D2 D3 D3 D2 D2 D3 D3 D0 D2 D0 D2 D1 D3 D3 D1 D2 D2 D0 D0 D3 D1 D1 D3 D0 D2 D0 D2 D1 D3 D3 D1 D2 D2 D0 D0 D3 D1 D1 D3

Transition 1 2 3 4 5 Selection no yes no yes no Message 1

11

slide-18
SLIDE 18

EUSIPCO 2011

1 2 3 4 5 6 7

D0 D0 D2 D2 D0 D0 D1 D1 D3 D3 D1 D1 D2 D2 D0 D0 D0 D0 D3 D3 D1 D1 D1 D1 D0 D2 D0 D2 D1 D3 D3 D1 D2 D2 D0 D0 D3 D1 D1 D3 D2 D2 D3 D3 D2 D2 D3 D3 D0 D2 D0 D2 D1 D3 D3 D1 D2 D2 D0 D0 D3 D1 D1 D3 D0 D2 D0 D2 D1 D3 D3 D1 D2 D2 D0 D0 D3 D1 D1 D3

Transition 1 2 3 4 5 Selection no yes no yes no Message 1

11

slide-19
SLIDE 19

EUSIPCO 2011

The joint JPEG2000 encoder/data hiding embedding scheme.

image bistream Data hided Original Pre- processing Forward Wavelet Transform TCQ quantization with Data Hiding Rate- distorsion

  • ptimization

(Tier2 encoder) image EBCOT (Tier1 encoder) Selection thresholds computation Coefficients selection τIBP Verification of the presence of the hidden data

…1001101. . . .

message to hide

12

slide-20
SLIDE 20

EUSIPCO 2011 Data hided image bistream Original Pre- processing Forward Wavelet Transform TCQ quantization with Data Hiding Rate- distorsion

  • ptimization

(Tier2 encoder) image EBCOT (Tier1 encoder) Selection thresholds computation Coefficients selection τIBP Verification of the presence of the hidden data

…1001101. . . .

message to hide

  • 1. Computation of the selection thresholds τIBP

13

slide-21
SLIDE 21

EUSIPCO 2011

1. Computation of the selection thresholds τIBP 2. Selection of the wavelet coefficients included in the data hiding process

– Determination of the hiding payload – Generation of the message to hide m – Pseudo random shuffling of the message m with a secret key to obtain the message b

Data hided image bistream Original Pre- processing Forward Wavelet Transform TCQ quantization with Data Hiding Rate- distorsion

  • ptimization

(Tier2 encoder) image EBCOT (Tier1 encoder) Coefficients selection Verification of the presence of the hidden data

…1001101. . . .

message to hide Selection thresholds computation τIBP

13

slide-22
SLIDE 22

EUSIPCO 2011 Data hided image bistream Original Pre- processing Forward Wavelet Transform TCQ quantization with Data Hiding Rate- distorsion

  • ptimization

(Tier2 encoder) image EBCOT (Tier1 encoder) Coefficients selection Verification of the presence of the hidden data

…1001101. . . .

message to hide

  • 1. Computation of the selection thresholds τIBP
  • 2. Selection of the wavelet coefficients
  • 3. TCQ quantization with data hiding

Selection thresholds computation τIBP

13

slide-23
SLIDE 23

EUSIPCO 2011

1. Computation of the selection thresholds τIBP 2. Selection of the wavelet coefficients included in the data hiding process 3. TCQ quantization with data hiding 4. Verification process after R-D optimization stage of JPEG2000

– Extraction of the embedded message b’ – if b’ = b then Stop else Modify the selection threshold value for the considered code-blocks where erroneous bits were found and Go to 2

Data hided image bistream Original Pre- processing Forward Wavelet Transform TCQ quantization with Data Hiding Rate- distorsion

  • ptimization

(Tier2 encoder) image EBCOT (Tier1 encoder) Coefficients selection Verification of the presence of the hidden data

…1001101. . . .

message to hide Selection thresholds computation τIBP

13

slide-24
SLIDE 24
  • 1. Decoding of the image bitstream
  • 2. Inverse TCQ quantization

– For each reconstructed TCQ index :

  • If the absolute magnitude bits of the TCQ index

is greater than τIBP then extract the LSB bit

  • 3. Invert the shuffle to retrieve the hidden

message m

EUSIPCO 2011

14

slide-25
SLIDE 25
  • Generalities

– Data hiding – Joint data hiding and compression approach – JPEG2000 standard – Trellis Coded Quantization (TCQ)

  • Joint JPEG2000 compression & data hiding scheme

– The TCQ-based data hiding strategy – The proposed joint scheme – The embedding and extraction algorithms

  • Experimental evaluations

– Protocol 1: data hiding performances – Protocol 2 : compression performances

  • Conclusion

EUSIPCO 2011

slide-26
SLIDE 26

Evaluation protocol 1 : Data hiding performances

  • 200 test images of 8 bits/pixels and size 512 x 512 (BOWS2

data base : http ://bows2.gipsa-lab.inpg.fr)

  • 5 levels of wavelet decomposition, one tile, no ROI coding
  • Variation of the bitrate from 2.5 bpp to 0.2 bpp
  • Selection of the coefficients included in the data hiding

process within the wavelet coefficients of the HL, LH and HH detail sub-bands of all resolution levels except the first one

  • Payload and imperceptibility constraints

EUSIPCO 2011

15

slide-27
SLIDE 27

EUSIPCO 2011

Bitrate (bpp) 2.5 bpp 2 bpp 1.6 bpp 1 bpp 0.5 bpp 0.2 bpp Average payload (bits) 11.257 11.203 11.143 7459 3683 1659 Minimum payload (bits) 1261 1261 1261 1261 1090 410 Maximum payload (bits) 37.313 26.180 21.809 12.732 5946 3129

Protocol 1 : Data hiding performances

  • High hiding payloads
  • At higher bitrates, more bits are hidden
  • The payload decreases as the bitrate decreases
  • The hiding payload is dependent on the content of the original image

Table 1 : Hiding payload obtained on 200 images for different bitrates

16

slide-28
SLIDE 28

EUSIPCO 2011

Table 2 : PSNR and SSIM values on 200 images for different bitrates

Bitrate (bpp) 2.5 bpp 2 bpp 1.6 bpp 1 bpp 0.5 bpp 0.2 bpp Average PSNR (dB) Average SSIM 48.34 0.9890 47.10 0.9851 46.31 0.9817 45.00 0.9713 43.24 0.9469 41.23 0.8944 Minimum PSNR (dB) Minimum SSIM 40.11 0.9773 38.86 0.9655 36.70 0.9482 34.18 0.8871 29.75 0.7857 25.95 0.6279 Maximum PSNR (dB) Maximum SSIM 53.82 0.9951 52.97 0.9951 51.83 0.9933 51.77 0.9889 52.30 0.9852 52.23 0.9821

  • Average PSNR > 40 dB for all bitrates
  • Average SSIM remains above 0.9 up to 0.2 bpp
  • Good perceptual quality of the data hided images
  • The proposed joint scheme exhibits good quality performances in terms of PSNR and

SSIM

Protocol 1 : Data hiding performances

17

slide-29
SLIDE 29

Evaluation protocol 2 : Compression performances

  • 7 well known test images of size 512 x 512 : Lena,

Gold, Girl, Barbara, Bike, Peppers and Clown

  • 5 levels of wavelet decomposition , one tile, no ROI

coding

  • Variation of the bitrate from 2.5 bpp to 0.2 bpp
  • Visual quality (PSNR & SSIM) and comparison with

JPEG2000

EUSIPCO 2011

18

slide-30
SLIDE 30

EUSIPCO 2011

Image Lena Image Clown

Visual quality comparison in terms of PSNR with JPEG2000

Protocol 2 : Compression performances

19

slide-31
SLIDE 31

EUSIPCO 2011

Image Gold Image Bike

Visual quality comparison in terms of PSNR with JPEG2000

Protocol 2 : Compression performances

20

slide-32
SLIDE 32

EUSIPCO 2011

Visual quality of the image obtained with the proposed joint scheme Original Lena image Reconstructed image at 0.5 bpp : PSNR = 38.10 dB, SSIM = 0.9164 and hiding payload = 4710 bits

21

slide-33
SLIDE 33

EUSIPCO 2011

Hiding payload vs bitrate.

22

slide-34
SLIDE 34
  • Generalities

– Data hiding – Joint data hiding and compression approach – JPEG2000 standard – Trellis Coded Quantization (TCQ)

  • Joint JPEG2000 compression & data hiding scheme

– The TCQ-based data hiding strategy – The proposed joint scheme – The embedding and extraction algorithms

  • Experimental evaluations

– Protocol 1: data hiding performances – Protocol 2 : compression performances

  • Conclusion

EUSIPCO 2011

slide-35
SLIDE 35
  • New TCQ-based data hiding strategy in the

framework of JPEG2000 part 2 for content description applications

  • Data is hidden in the TCQ indices of the selected

coefficients

  • The proposed data hiding technique successfully

survives JPEG2000 compression

  • The proposed joint scheme can achieve high

payloads and gives good visual quality performances

EUSIPCO 2011

23

slide-36
SLIDE 36

www.wondershare.com

Any questions ?