SlideShare une entreprise Scribd logo
1  sur  38
DATA HIDING USING
IMAGE INTERPOLATION
INTRODUCTION
Interpolation is the process of determining the
values of a function at positions lying between
its samples.
 It achieves this process by fitting a continuous
function through the discrete input samples.
 This permits input values to be evaluated at
arbitrary positions in the input, not just those
defined at the sample points.
Image interpolation occurs in all digital photos at
some stage whether this be in bayer
demosaicing or in photo enlargement.
It happens anytime you resize or remap (distort)
your image from one pixel grid to another.
 Image resizing is necessary when you need to
increase or decrease the total number of pixels,
whereas remapping can occur under a wider
variety of scenarios: correcting for lens distortion,
changing perspective, and rotating an image.
CONCEPT
Interpolation works by using known data to
estimate values at unknown points.
 For example: if you wanted to know the
temperature at noon, but only measured it at 11AM
and 1PM, you could estimate its value by
performing a linear interpolation:
If you had an additional measurement at 11:30AM,
you could see that the bulk of the temperature rise
occurred before noon, and could use this
additional data point to perform a quadratic
interpolation:
IMAGE RESIZE EXAMPLE
Original
183%
2d interpolation
before after No
interpolation
Unlike air temperature fluctuations and the ideal
gradient above, pixel values can change far more
abruptly from one location to the next.
 As with the temperature example, the more you
know about the surrounding pixels, the better the
interpolation will become.
IMAGE ROTATION EXAMPLE
Interpolation also occurs each time you rotate or
distort an image.
The previous example was misleading because it is
one which interpolators are particularly good at.
This next example shows how image detail can be
lost quite rapidly:
ORIGINAL
45° rotation
90°
Rotation
(Lossless)
2 X 45°
Rotatio
ns
6 X 15°
Rotations
The 90° rotation is lossless because no pixel ever has
to be repositioned onto the border between two
pixels (and therefore divided).
Note how most of the detail is lost in just the first
rotation, although the image continues to
deteriorate with successive rotations.
 The above results use what is called a "bicubic"
algorithm, and show significant deterioration. .
TYPES OF INTERPOLATION ALGORITHMS
Common interpolation algorithms can be grouped
into two categories:
adaptive and non-adaptive.
Adaptive methods change depending on what
they are interpolating (sharp edges vs. smooth
texture).
 whereas non-adaptive methods treat all pixels
equally.
Non-adaptive algorithms include: nearest neighbor,
bilinear, bicubic, spline, sinc, lanczos and others.
Depending on their complexity, these use
anywhere from 0 to 256 (or more) adjacent pixels
when interpolating.
The more adjacent pixels they include, the more
accurate they can become, but this comes at the
expense of much longer processing time.
Adaptive algorithms include many proprietary
algorithms in licensed software such as:
Qimage, PhotoZoom Pro, Genuine Fractals and
others. Many of these apply a different version of
their algorithm (on a pixel-by-pixel basis).
NEAREST NEIGHBOR INTERPOLATION
Nearest neighbor is the most basic and requires the
least processing time of all the interpolation
algorithms because it only considers one pixel —
the closest one to the interpolated point.
This has the effect of simply making each pixel
bigger. It suffers from aliasing effects on enlarging or
reducing images.
BILINEAR INTERPOLATION
Bilinear interpolation considers the closest 2x2
neighborhood of known pixel values surrounding
the unknown pixel.
 It then takes a weighted average of these 4 pixels
to arrive at its final interpolated value. This results in
much smoother looking images than nearest
neighbor.
But blurr & it requires 3-4 times higher computation.
The above diagram is for a case when all known pixel
distances are equal, so the interpolated value is simply
their sum divided by four.
BICUBIC INTERPOLATION
Bicubic goes one step beyond bilinear by
considering the closest 4x4 neighborhood of known
pixels — for a total of 16 pixels.
 Since these are at various distances from the
unknown pixel, closer pixels are given a higher
weighting in the calculation.
Bicubic produces noticeably sharper images than
the previous two methods, and is perhaps the ideal
combination of processing time and output quality.
For this reason it is a standard in many image
editing programs (including Adobe Photoshop),
printer drivers and in-camera interpolation.
Example bicubic :
NEIGHBOR MEAN INTERPOLATION
Proposed by jung and yoo in 2009.
It uses neighboring pixel values to calculate the
mean and then the calculated mean value is
inserted in to a pixel that has not been allocated
yet.
Complexity is high when number of referenced
pixel is higher.
On the pixel p(i,j) the output pixel p’(i,j) is defined
as:
where p(i,j) denotes the pixel in original image and
m,n=0,1..127 and K is Scaling factor usually assigned
2.












otherwise)/3,)1,('),1('1)-j1,-(p(i
n2j1,m2iifj))/2,,1(ip'j)1,-(i(p'
1n2jm,2iif))/2,1j(i,p'1)-j(i,(p'
n2jm,2iifj),p(i,
j)(i,p'
jipjip
The proposed neighbor mean interpolation
46 112
210 90
46 79 112
128 84 101
210 150 90
84)/312879(46(1,1)p'
128210)/2(46(1,0)p'
79112)/246((0,1)p'
46p(0,0)(0,0)p'




interpolation












otherwise)/3,)1,('),1('1)-j1,-(p(i
n2j1,m2iifj))/2,,1(ip'j)1,-(i(p'
1n2jm,2iif))/2,1j(i,p'1)-j(i,(p'
n2jm,2iifj),p(i,
j)(i,p'
jipjip
Neighbor Mean Interpolation
the neighbor mean interpolation is similar to bilinear interpolation,
but this method has less blurring and greater image resolution.
DATA HIDING
 Data hiding conceals the existence of secret data
while cryptography protects the contents of message.
 Message may be scattered randomly throughout
cover image or straight inserted.
 Methods : LSB insertion, Masking, Filtering,
Transformations , Reversible data hiding
PROPOSED DATA HIDING METHOD
This method utilizes the resulting images(cover) of
the neighbor mean interpolation method.
The sequence of data hiding can be zig-zag ,left to
right and upper to down direction.
Before Secret data is embedded the host image is
partitioned in to four-pixel, non overlapping,
consecutive blocks by zig–zag scanning as shown
below :
For every four non-overlapping consecutive pixel
values i.e., p(i,j) p(i+1,j) p(i,j+1) and p(i+1,j+1), the
corresponding stego image pixel values are p’(i,j)
p’(i+1,j) p’(i,j+1) and p’(i+1,j+1) respectively.
Here we have embed data in to three pixel except
for p(i,j) pixel.
STEPS INVOLVED IN DATA HIDING :
1. First we get a scaling up image by using neighbor
mean interpolation method.
Then for every four non overlapping consecutive
pixel values a difference value d is calculated as:
 d = p’(K . x +β, K .y +δ ) − p’(K .x , K .y)
Where 0≤x, y≤127 β, δ value is 0 or 1, respectively.
The number of bits, say n, which can be embedded
in this pixel, is calculated by
N = ln|d|.
A sub stream with n bits in the embedding data is
selected and converted to integer value b. Then, a
stego image pixel p′’(i,j) is computed as follows.
p’’(i,j) = p’(i,j) + b.
DATA EXTRACTION PROCESS :
1. In the extraction process the stego image is also
partitioned in to 2 x 2 non overlapping
consecutive blocks
2. Then b is calculated as follows :
Where x,y=0,1,..127 and k is defined as two .
. After the secret data is extracted we can convert
value of b to be a binary form and concatenate to
the secret bit stream.
Proposed data hiding method :
EXAMPLE :
46 112
210 90
46 79 112
128 84 101
210 150 90
84)/312879(46(1,1)p'
128210)/2(46(1,0)p'
79112)/246((0,1)p'
46p(0,0)(0,0)p'




interpolation












otherwise)/3,)1,('),1('1)-j1,-(p(i
n2j1,m2iifj))/2,,1(ip'j)1,-(i(p'
1n2jm,2iif))/2,1j(i,p'1)-j(i,(p'
n2jm,2iifj),p(i,
j)(i,p'
jipjip
Neighbor Mean Interpolation
EMBEDDING OF SECRET BIT :
46 79 112
128 84 101
210 150 90
46 98 112
150 89 101
210 150 90
 
 
 


















538log
682log
533log
384684
8246128
3346-79
d
2
2
2
n
Embed secret bit
Cover image Stego image









5)00101(
22)010110(
19(10011)
b
2
2
2
89584(1,1)p'
15022128(1,0)p'
981979(0,1)p'



20001011001101011BitsSecret 
d = p’(K . x +β, K .y +δ ) − p’(K .x , K .y)
 
 
 








2
2
2
)00101(5210)/3112(4689
)010110(22210)/2(46150
)10011(19112)/2(46-98
b
 
 
 


















538log
682log
533log
384684
8246128
3346-79
d
2
2
2
n
46 98 112
150 89 101
210 150 90
46 79 112
128 84 101
210 150 90
Stego image Cover image
Recover
Extract
20001011001101011BitsSecret 
RECOVERY OF SECRET DATA
IMPROVED DATA HIDING METHOD
Proposed in 2011 seventh international conference
on Intelligent information hiding and multimedia
signal processing.
The weakness of jung and yoo’s method is that
pixel extended from the original image have to be
recomputed before extracting the secret data.
The algorithm of the new proposed method is as
follows :
1. Utilize the neighbor mean interpolation to create
a cover image.
2. Divide the cover image from left to right, top to
down, to form 2x2 non-overlapping blocks.
3. In each block, pixels p(i,j), p(i,j+1), p(i+1,j) and
p(i+1,j+1) are renamed as p0, p1, p2, p3, respectively.
Then, we made these four pixels into three groups(p0,
p1), (p0, p2), and (p0, p3).The differences di =pi-p0,
i=1, 2, 3. The capacity ni of the pixel pairs are
computed by eq :
4 Selecting the number of bits from the secret bit
stream and then convert it to decimal form b. the
new difference is computed by
5. The corresponding pixel are
computed by equation :
6.Repeat steps 3-5 in predefined order, top to down
and left to right, until all secret data is embedded or
blocks are exhausted.
EXTRACTING THE DATA :
Apply the hiding algorithm step 2 and 3 to the
stego image we can get new difference and
number of bits embedded with in the
pixel.
Then the secret data can be extracted using the
eq.
According to the number of bits embedded
the extracted secret data b can be translated to
the binary digit which became a part of the secret
data stream.
REFERENCES :
•http://en.wikipedia.org/wiki/Information_hiding
•http://www.sciencedirect.com/science/article/pii/S092548908000846
•http:// http://en.wikipedia.org/wiki/Bicubic_interpolation
•http:// http://en.wikipedia.org/wiki/image_interpolation
•http://en.wikipedia.org/wiki/Image_processing
Data hiding using image interpolation

Contenu connexe

Tendances

Convolutional Neural Network - CNN | How CNN Works | Deep Learning Course | S...
Convolutional Neural Network - CNN | How CNN Works | Deep Learning Course | S...Convolutional Neural Network - CNN | How CNN Works | Deep Learning Course | S...
Convolutional Neural Network - CNN | How CNN Works | Deep Learning Course | S...
Simplilearn
 
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII
 
高次アンビソニックスのための マイクロホンアレイ設計の研究
高次アンビソニックスのための マイクロホンアレイ設計の研究高次アンビソニックスのための マイクロホンアレイ設計の研究
高次アンビソニックスのための マイクロホンアレイ設計の研究
horieyuto
 

Tendances (20)

Gradient-Based Low-Light Image Enhancement
Gradient-Based Low-Light Image EnhancementGradient-Based Low-Light Image Enhancement
Gradient-Based Low-Light Image Enhancement
 
Image to image translation with Pix2Pix GAN
Image to image translation with Pix2Pix GANImage to image translation with Pix2Pix GAN
Image to image translation with Pix2Pix GAN
 
Convolutional Neural Network - CNN | How CNN Works | Deep Learning Course | S...
Convolutional Neural Network - CNN | How CNN Works | Deep Learning Course | S...Convolutional Neural Network - CNN | How CNN Works | Deep Learning Course | S...
Convolutional Neural Network - CNN | How CNN Works | Deep Learning Course | S...
 
Image compression .
Image compression .Image compression .
Image compression .
 
Automatic Mixed Precision の紹介
Automatic Mixed Precision の紹介Automatic Mixed Precision の紹介
Automatic Mixed Precision の紹介
 
Depth Fusion from RGB and Depth Sensors II
Depth Fusion from RGB and Depth Sensors IIDepth Fusion from RGB and Depth Sensors II
Depth Fusion from RGB and Depth Sensors II
 
image classification
image classificationimage classification
image classification
 
Image compression standards
Image compression standardsImage compression standards
Image compression standards
 
Generative Adversarial Networks
Generative Adversarial NetworksGenerative Adversarial Networks
Generative Adversarial Networks
 
Cv_Chap 4 Segmentation
Cv_Chap 4 SegmentationCv_Chap 4 Segmentation
Cv_Chap 4 Segmentation
 
Mask R-CNN
Mask R-CNNMask R-CNN
Mask R-CNN
 
Introduction to Digital Image Processing Using MATLAB
Introduction to Digital Image Processing Using MATLABIntroduction to Digital Image Processing Using MATLAB
Introduction to Digital Image Processing Using MATLAB
 
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
 
유니티 그래픽 최적화, 어디까지 해봤니 (Optimizing Unity Graphics) Unite Seoul Ver.
유니티 그래픽 최적화, 어디까지 해봤니 (Optimizing Unity Graphics) Unite Seoul Ver.유니티 그래픽 최적화, 어디까지 해봤니 (Optimizing Unity Graphics) Unite Seoul Ver.
유니티 그래픽 최적화, 어디까지 해봤니 (Optimizing Unity Graphics) Unite Seoul Ver.
 
Region filling
Region fillingRegion filling
Region filling
 
UNet-VGG16 with transfer learning for MRI-based brain tumor segmentation
UNet-VGG16 with transfer learning for MRI-based brain tumor segmentationUNet-VGG16 with transfer learning for MRI-based brain tumor segmentation
UNet-VGG16 with transfer learning for MRI-based brain tumor segmentation
 
PR 127: FaceNet
PR 127: FaceNetPR 127: FaceNet
PR 127: FaceNet
 
高次アンビソニックスのための マイクロホンアレイ設計の研究
高次アンビソニックスのための マイクロホンアレイ設計の研究高次アンビソニックスのための マイクロホンアレイ設計の研究
高次アンビソニックスのための マイクロホンアレイ設計の研究
 
point operations in image processing
point operations in image processingpoint operations in image processing
point operations in image processing
 
Faster R-CNN: Towards real-time object detection with region proposal network...
Faster R-CNN: Towards real-time object detection with region proposal network...Faster R-CNN: Towards real-time object detection with region proposal network...
Faster R-CNN: Towards real-time object detection with region proposal network...
 

En vedette

Interpolation
InterpolationInterpolation
Interpolation
mbhuiya6
 
interpolation
interpolationinterpolation
interpolation
8laddu8
 

En vedette (20)

Image interpolation
Image interpolationImage interpolation
Image interpolation
 
Image Interpolation
Image InterpolationImage Interpolation
Image Interpolation
 
Interpolation and extrapolation
Interpolation and extrapolationInterpolation and extrapolation
Interpolation and extrapolation
 
Image Interpolation Techniques with Optical and Digital Zoom Concepts -semina...
Image Interpolation Techniques with Optical and Digital Zoom Concepts -semina...Image Interpolation Techniques with Optical and Digital Zoom Concepts -semina...
Image Interpolation Techniques with Optical and Digital Zoom Concepts -semina...
 
Effective Pixel Interpolation for Image Super Resolution
Effective Pixel Interpolation for Image Super ResolutionEffective Pixel Interpolation for Image Super Resolution
Effective Pixel Interpolation for Image Super Resolution
 
A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...
 
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...
 
iNEDI - Accuracy Improvements and Artifacts Removal in Edge Based Image Inter...
iNEDI - Accuracy Improvements and Artifacts Removal in Edge Based Image Inter...iNEDI - Accuracy Improvements and Artifacts Removal in Edge Based Image Inter...
iNEDI - Accuracy Improvements and Artifacts Removal in Edge Based Image Inter...
 
Digital Image Watermarking
Digital Image WatermarkingDigital Image Watermarking
Digital Image Watermarking
 
Interpolation 2013
Interpolation 2013Interpolation 2013
Interpolation 2013
 
Digital Image Fundamentals - II
Digital Image Fundamentals - IIDigital Image Fundamentals - II
Digital Image Fundamentals - II
 
Report medical image processing image slice interpolation and noise removal i...
Report medical image processing image slice interpolation and noise removal i...Report medical image processing image slice interpolation and noise removal i...
Report medical image processing image slice interpolation and noise removal i...
 
Digital image watermarking
Digital image watermarkingDigital image watermarking
Digital image watermarking
 
Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryption
 
Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniques
 
Interpolation
InterpolationInterpolation
Interpolation
 
Binary to grey code conversion
Binary to grey code conversionBinary to grey code conversion
Binary to grey code conversion
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) Images
 
Image processing fundamentals
Image processing fundamentalsImage processing fundamentals
Image processing fundamentals
 
interpolation
interpolationinterpolation
interpolation
 

Similaire à Data hiding using image interpolation

ee8220_project_W2013_v5
ee8220_project_W2013_v5ee8220_project_W2013_v5
ee8220_project_W2013_v5
Farhad Gholami
 

Similaire à Data hiding using image interpolation (20)

Digital image forgery detection
Digital image forgery detectionDigital image forgery detection
Digital image forgery detection
 
Performance analysis of high resolution images using interpolation techniques...
Performance analysis of high resolution images using interpolation techniques...Performance analysis of high resolution images using interpolation techniques...
Performance analysis of high resolution images using interpolation techniques...
 
Reversible image data hiding with contrast enhancement
Reversible image data hiding with contrast enhancementReversible image data hiding with contrast enhancement
Reversible image data hiding with contrast enhancement
 
Digital.cc
Digital.ccDigital.cc
Digital.cc
 
ee8220_project_W2013_v5
ee8220_project_W2013_v5ee8220_project_W2013_v5
ee8220_project_W2013_v5
 
Denoising Process Based on Arbitrarily Shaped Windows
Denoising Process Based on Arbitrarily Shaped WindowsDenoising Process Based on Arbitrarily Shaped Windows
Denoising Process Based on Arbitrarily Shaped Windows
 
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement  Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement
 
Performance analysis of transformation and bogdonov chaotic substitution base...
Performance analysis of transformation and bogdonov chaotic substitution base...Performance analysis of transformation and bogdonov chaotic substitution base...
Performance analysis of transformation and bogdonov chaotic substitution base...
 
Ijetcas14 372
Ijetcas14 372Ijetcas14 372
Ijetcas14 372
 
Segmentation
SegmentationSegmentation
Segmentation
 
Translation Invariance (TI) based Novel Approach for better De-noising of Dig...
Translation Invariance (TI) based Novel Approach for better De-noising of Dig...Translation Invariance (TI) based Novel Approach for better De-noising of Dig...
Translation Invariance (TI) based Novel Approach for better De-noising of Dig...
 
Log polar coordinates
Log polar coordinatesLog polar coordinates
Log polar coordinates
 
Multimedia image compression standards
Multimedia image compression standardsMultimedia image compression standards
Multimedia image compression standards
 
SinGAN for Image Denoising
SinGAN for Image DenoisingSinGAN for Image Denoising
SinGAN for Image Denoising
 
Image Denoising by using Modified SGHP Algorithm
Image Denoising by using Modified SGHP Algorithm Image Denoising by using Modified SGHP Algorithm
Image Denoising by using Modified SGHP Algorithm
 
B070306010
B070306010B070306010
B070306010
 
ANALYSIS OF IMAGE ENHANCEMENT TECHNIQUES USING MATLAB
ANALYSIS OF IMAGE ENHANCEMENT TECHNIQUES USING MATLABANALYSIS OF IMAGE ENHANCEMENT TECHNIQUES USING MATLAB
ANALYSIS OF IMAGE ENHANCEMENT TECHNIQUES USING MATLAB
 
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKING
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKINGA PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKING
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKING
 
Contrast enhancement using various statistical operations and neighborhood pr...
Contrast enhancement using various statistical operations and neighborhood pr...Contrast enhancement using various statistical operations and neighborhood pr...
Contrast enhancement using various statistical operations and neighborhood pr...
 
Interpolation Technique using Non Linear Partial Differential Equation with E...
Interpolation Technique using Non Linear Partial Differential Equation with E...Interpolation Technique using Non Linear Partial Differential Equation with E...
Interpolation Technique using Non Linear Partial Differential Equation with E...
 

Plus de Vikrant Arya (6)

Variable , Array , Dictionary of swift -IOS Development - a hub for beginner
Variable , Array , Dictionary of swift -IOS Development - a hub for beginnerVariable , Array , Dictionary of swift -IOS Development - a hub for beginner
Variable , Array , Dictionary of swift -IOS Development - a hub for beginner
 
Hello World Program in xcode ,IOS Development using swift
Hello World Program in xcode ,IOS Development using swiftHello World Program in xcode ,IOS Development using swift
Hello World Program in xcode ,IOS Development using swift
 
Resume Building By Sudhir Agarwal
Resume Building By Sudhir AgarwalResume Building By Sudhir Agarwal
Resume Building By Sudhir Agarwal
 
Recommendation system
Recommendation system Recommendation system
Recommendation system
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Fast and secure protocol (fasp)
Fast and secure protocol (fasp)Fast and secure protocol (fasp)
Fast and secure protocol (fasp)
 

Dernier

VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 

Dernier (20)

Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 

Data hiding using image interpolation

  • 1. DATA HIDING USING IMAGE INTERPOLATION
  • 2. INTRODUCTION Interpolation is the process of determining the values of a function at positions lying between its samples.  It achieves this process by fitting a continuous function through the discrete input samples.  This permits input values to be evaluated at arbitrary positions in the input, not just those defined at the sample points.
  • 3. Image interpolation occurs in all digital photos at some stage whether this be in bayer demosaicing or in photo enlargement. It happens anytime you resize or remap (distort) your image from one pixel grid to another.  Image resizing is necessary when you need to increase or decrease the total number of pixels, whereas remapping can occur under a wider variety of scenarios: correcting for lens distortion, changing perspective, and rotating an image.
  • 4. CONCEPT Interpolation works by using known data to estimate values at unknown points.  For example: if you wanted to know the temperature at noon, but only measured it at 11AM and 1PM, you could estimate its value by performing a linear interpolation:
  • 5. If you had an additional measurement at 11:30AM, you could see that the bulk of the temperature rise occurred before noon, and could use this additional data point to perform a quadratic interpolation:
  • 6. IMAGE RESIZE EXAMPLE Original 183% 2d interpolation before after No interpolation
  • 7. Unlike air temperature fluctuations and the ideal gradient above, pixel values can change far more abruptly from one location to the next.  As with the temperature example, the more you know about the surrounding pixels, the better the interpolation will become.
  • 8. IMAGE ROTATION EXAMPLE Interpolation also occurs each time you rotate or distort an image. The previous example was misleading because it is one which interpolators are particularly good at. This next example shows how image detail can be lost quite rapidly: ORIGINAL 45° rotation 90° Rotation (Lossless) 2 X 45° Rotatio ns 6 X 15° Rotations
  • 9. The 90° rotation is lossless because no pixel ever has to be repositioned onto the border between two pixels (and therefore divided). Note how most of the detail is lost in just the first rotation, although the image continues to deteriorate with successive rotations.  The above results use what is called a "bicubic" algorithm, and show significant deterioration. .
  • 10. TYPES OF INTERPOLATION ALGORITHMS Common interpolation algorithms can be grouped into two categories: adaptive and non-adaptive. Adaptive methods change depending on what they are interpolating (sharp edges vs. smooth texture).  whereas non-adaptive methods treat all pixels equally.
  • 11. Non-adaptive algorithms include: nearest neighbor, bilinear, bicubic, spline, sinc, lanczos and others. Depending on their complexity, these use anywhere from 0 to 256 (or more) adjacent pixels when interpolating. The more adjacent pixels they include, the more accurate they can become, but this comes at the expense of much longer processing time.
  • 12. Adaptive algorithms include many proprietary algorithms in licensed software such as: Qimage, PhotoZoom Pro, Genuine Fractals and others. Many of these apply a different version of their algorithm (on a pixel-by-pixel basis).
  • 13. NEAREST NEIGHBOR INTERPOLATION Nearest neighbor is the most basic and requires the least processing time of all the interpolation algorithms because it only considers one pixel — the closest one to the interpolated point. This has the effect of simply making each pixel bigger. It suffers from aliasing effects on enlarging or reducing images.
  • 14. BILINEAR INTERPOLATION Bilinear interpolation considers the closest 2x2 neighborhood of known pixel values surrounding the unknown pixel.  It then takes a weighted average of these 4 pixels to arrive at its final interpolated value. This results in much smoother looking images than nearest neighbor. But blurr & it requires 3-4 times higher computation.
  • 15. The above diagram is for a case when all known pixel distances are equal, so the interpolated value is simply their sum divided by four.
  • 16. BICUBIC INTERPOLATION Bicubic goes one step beyond bilinear by considering the closest 4x4 neighborhood of known pixels — for a total of 16 pixels.  Since these are at various distances from the unknown pixel, closer pixels are given a higher weighting in the calculation. Bicubic produces noticeably sharper images than the previous two methods, and is perhaps the ideal combination of processing time and output quality. For this reason it is a standard in many image editing programs (including Adobe Photoshop), printer drivers and in-camera interpolation.
  • 18. NEIGHBOR MEAN INTERPOLATION Proposed by jung and yoo in 2009. It uses neighboring pixel values to calculate the mean and then the calculated mean value is inserted in to a pixel that has not been allocated yet. Complexity is high when number of referenced pixel is higher.
  • 19. On the pixel p(i,j) the output pixel p’(i,j) is defined as: where p(i,j) denotes the pixel in original image and m,n=0,1..127 and K is Scaling factor usually assigned 2.             otherwise)/3,)1,('),1('1)-j1,-(p(i n2j1,m2iifj))/2,,1(ip'j)1,-(i(p' 1n2jm,2iif))/2,1j(i,p'1)-j(i,(p' n2jm,2iifj),p(i, j)(i,p' jipjip
  • 20. The proposed neighbor mean interpolation
  • 21. 46 112 210 90 46 79 112 128 84 101 210 150 90 84)/312879(46(1,1)p' 128210)/2(46(1,0)p' 79112)/246((0,1)p' 46p(0,0)(0,0)p'     interpolation             otherwise)/3,)1,('),1('1)-j1,-(p(i n2j1,m2iifj))/2,,1(ip'j)1,-(i(p' 1n2jm,2iif))/2,1j(i,p'1)-j(i,(p' n2jm,2iifj),p(i, j)(i,p' jipjip Neighbor Mean Interpolation
  • 22. the neighbor mean interpolation is similar to bilinear interpolation, but this method has less blurring and greater image resolution. DATA HIDING  Data hiding conceals the existence of secret data while cryptography protects the contents of message.  Message may be scattered randomly throughout cover image or straight inserted.  Methods : LSB insertion, Masking, Filtering, Transformations , Reversible data hiding
  • 23. PROPOSED DATA HIDING METHOD This method utilizes the resulting images(cover) of the neighbor mean interpolation method. The sequence of data hiding can be zig-zag ,left to right and upper to down direction.
  • 24. Before Secret data is embedded the host image is partitioned in to four-pixel, non overlapping, consecutive blocks by zig–zag scanning as shown below :
  • 25. For every four non-overlapping consecutive pixel values i.e., p(i,j) p(i+1,j) p(i,j+1) and p(i+1,j+1), the corresponding stego image pixel values are p’(i,j) p’(i+1,j) p’(i,j+1) and p’(i+1,j+1) respectively. Here we have embed data in to three pixel except for p(i,j) pixel. STEPS INVOLVED IN DATA HIDING : 1. First we get a scaling up image by using neighbor mean interpolation method.
  • 26. Then for every four non overlapping consecutive pixel values a difference value d is calculated as:  d = p’(K . x +β, K .y +δ ) − p’(K .x , K .y) Where 0≤x, y≤127 β, δ value is 0 or 1, respectively. The number of bits, say n, which can be embedded in this pixel, is calculated by N = ln|d|.
  • 27. A sub stream with n bits in the embedding data is selected and converted to integer value b. Then, a stego image pixel p′’(i,j) is computed as follows. p’’(i,j) = p’(i,j) + b.
  • 28. DATA EXTRACTION PROCESS : 1. In the extraction process the stego image is also partitioned in to 2 x 2 non overlapping consecutive blocks 2. Then b is calculated as follows : Where x,y=0,1,..127 and k is defined as two .
  • 29. . After the secret data is extracted we can convert value of b to be a binary form and concatenate to the secret bit stream. Proposed data hiding method :
  • 30. EXAMPLE : 46 112 210 90 46 79 112 128 84 101 210 150 90 84)/312879(46(1,1)p' 128210)/2(46(1,0)p' 79112)/246((0,1)p' 46p(0,0)(0,0)p'     interpolation             otherwise)/3,)1,('),1('1)-j1,-(p(i n2j1,m2iifj))/2,,1(ip'j)1,-(i(p' 1n2jm,2iif))/2,1j(i,p'1)-j(i,(p' n2jm,2iifj),p(i, j)(i,p' jipjip Neighbor Mean Interpolation
  • 31. EMBEDDING OF SECRET BIT : 46 79 112 128 84 101 210 150 90 46 98 112 150 89 101 210 150 90                         538log 682log 533log 384684 8246128 3346-79 d 2 2 2 n Embed secret bit Cover image Stego image          5)00101( 22)010110( 19(10011) b 2 2 2 89584(1,1)p' 15022128(1,0)p' 981979(0,1)p'    20001011001101011BitsSecret  d = p’(K . x +β, K .y +δ ) − p’(K .x , K .y)
  • 32.               2 2 2 )00101(5210)/3112(4689 )010110(22210)/2(46150 )10011(19112)/2(46-98 b                         538log 682log 533log 384684 8246128 3346-79 d 2 2 2 n 46 98 112 150 89 101 210 150 90 46 79 112 128 84 101 210 150 90 Stego image Cover image Recover Extract 20001011001101011BitsSecret  RECOVERY OF SECRET DATA
  • 33. IMPROVED DATA HIDING METHOD Proposed in 2011 seventh international conference on Intelligent information hiding and multimedia signal processing. The weakness of jung and yoo’s method is that pixel extended from the original image have to be recomputed before extracting the secret data. The algorithm of the new proposed method is as follows : 1. Utilize the neighbor mean interpolation to create a cover image. 2. Divide the cover image from left to right, top to down, to form 2x2 non-overlapping blocks.
  • 34. 3. In each block, pixels p(i,j), p(i,j+1), p(i+1,j) and p(i+1,j+1) are renamed as p0, p1, p2, p3, respectively. Then, we made these four pixels into three groups(p0, p1), (p0, p2), and (p0, p3).The differences di =pi-p0, i=1, 2, 3. The capacity ni of the pixel pairs are computed by eq : 4 Selecting the number of bits from the secret bit stream and then convert it to decimal form b. the new difference is computed by
  • 35. 5. The corresponding pixel are computed by equation : 6.Repeat steps 3-5 in predefined order, top to down and left to right, until all secret data is embedded or blocks are exhausted.
  • 36. EXTRACTING THE DATA : Apply the hiding algorithm step 2 and 3 to the stego image we can get new difference and number of bits embedded with in the pixel. Then the secret data can be extracted using the eq. According to the number of bits embedded the extracted secret data b can be translated to the binary digit which became a part of the secret data stream.