Visual data security by data hiding and/or encryption
William PUECH
ICAR (Image & Interaction) LIRMM, UMR 5506, CNRS - University of Montpellier
October 14, 2016
- W. Puech (ICAR)
Visual data security October 14, 2016 1 / 27
Visual data security by data hiding and/or encryption William PUECH - - PowerPoint PPT Presentation
Visual data security by data hiding and/or encryption William PUECH ICAR (Image & Interaction) LIRMM, UMR 5506, CNRS - University of Montpellier October 14, 2016 W. Puech (ICAR) Visual data security October 14, 2016 1 / 27 Visual data
Visual data security October 14, 2016 1 / 27
Visual data security
Visual data security October 14, 2016 2 / 27
Visual data security
Visual data security October 14, 2016 3 / 27
Visual data security
Visual data security October 14, 2016 3 / 27
Visual data security
Visual data security October 14, 2016 3 / 27
Visual data security
Visual data security October 14, 2016 4 / 27
Visual data security
La cryptographie militaire. Journal des sciences militaires, vol. 9, pp. 5–38, 1883.
Visual data security October 14, 2016 5 / 27
Visual data security
Digital Watermarking and Steganography. The Morgan Kaufmann Series in Multimedia Information and Systems, M. Kaufmann, Ed. Morgan Kaufmann Publishers, 2008.
Visual data security October 14, 2016 6 / 27
Visual data security
example
example
Digital Watermarking and Steganography. The Morgan Kaufmann Series in Multimedia Information and Systems, M. Kaufmann, Ed. Morgan Kaufmann Publishers, 2008.
Visual data security October 14, 2016 6 / 27
Visual data security
Visual data security October 14, 2016 7 / 27
Visual data security
Visual data security October 14, 2016 8 / 27
Visual data security
m
n−1
m
Visual data security October 14, 2016 9 / 27
Visual data security
Visual data security October 14, 2016 10 / 27
Visual data security
Visual data security October 14, 2016 11 / 27
Visual data security
Visual data security October 14, 2016 12 / 27
Visual data security
Visual data security October 14, 2016 13 / 27
Visual data security
Visual data security October 14, 2016 14 / 27
Visual data security
Visual data security October 14, 2016 15 / 27
Visual data security
Visual data security October 14, 2016 15 / 27
Visual data security
Visual data security October 14, 2016 15 / 27
Visual data security
Original image Secret key k image Encrypted Encryption Data−hiding image encrypted Marked message Marked encrypted image Secret key k Message removing Decryption and Original image Extraction of hidden message message
Visual data security October 14, 2016 16 / 27
Visual data security
Visual data security October 14, 2016 17 / 27
Visual data security
M−1
Visual data security October 14, 2016 18 / 27
Visual data security
Visual data security October 14, 2016 19 / 27
Visual data security
Visual data security October 14, 2016 20 / 27
Visual data security
. Pedeboy. High capacity data-hiding for 3D meshes based on static arithmetic coding. In IEEE International Conference on Image Processing, 2015.
. Pedeboy Analysis of an EMST-based path for 3D meshes. Computer-Aided Design, Elsevier, vol. 64, p : 22-32, 2015
Visual data security October 14, 2016 21 / 27
Visual data security
Two-Level QR Code for Private Message Sharing and Document Authentication . IEEE Transactions on Information Forensics and Security , vol. 11, n◦ 3, p : 571-583, March 2016
Visual data security October 14, 2016 22 / 27
Visual data security
IMPROVING SENSOR NOISE ANALYSIS FOR CT-SCANNER IDENTIFICATION. 23rd European Signal Processing Conference (EUSIPCO), Nice, France, September, 2015.
Visual data security October 14, 2016 23 / 27
Visual data security
Visual data security October 14, 2016 24 / 27
Visual data security
Visual data security October 14, 2016 25 / 27
Visual data security
Visual data security October 14, 2016 25 / 27
Visual data security
Visual data security October 14, 2016 25 / 27
Visual data security
Visual data security October 14, 2016 25 / 27
Visual data security
Visual data security October 14, 2016 25 / 27
Visual data security
Visual data security October 14, 2016 25 / 27
Visual data security
Visual data security October 14, 2016 25 / 27
Visual data security
back
Visual data security October 14, 2016 26 / 27
Visual data security
back
Visual data security October 14, 2016 26 / 27
Visual data security
(a) (b) (c) (d) a) Original image, b) histogram, c) encrypted image by scrambling, d) histogram of the encrypted image.
Visual data security October 14, 2016 27 / 27
Visual data security
(a) (b) (c) (d) a) Original image, b) histogram, c) encrypted image with a stream cipher algorithm, d) histogram of the encrypted image. back
Visual data security October 14, 2016 27 / 27