Professional Documents
Culture Documents
Full download Lossless Information Hiding in Images 1st Edition Zhe-Ming Lu file pdf all chapter on 2024
Full download Lossless Information Hiding in Images 1st Edition Zhe-Ming Lu file pdf all chapter on 2024
https://ebookmass.com/product/seeking-truth-and-hiding-facts-
information-ideology-and-authoritarianism-in-china-jeremy-l-
wallace/
https://ebookmass.com/product/chinese-national-identity-in-the-
age-of-globalisation-1st-ed-edition-lu-zhouxiang/
https://ebookmass.com/product/eco-cities-and-green-transport-1st-
edition-huapu-lu/
https://ebookmass.com/product/search-engines-information-
retrieval-in-practice-1st-edition-croft/
Topological Insulator and Related Topics 1st Edition Lu
Li (Editor)
https://ebookmass.com/product/topological-insulator-and-related-
topics-1st-edition-lu-li-editor/
https://ebookmass.com/product/hiding-in-plain-sight-deceptive-
tactics-and-the-criminal-victimization-process-1st-
ed-2020-edition-james-f-kenny/
https://ebookmass.com/product/a-woman-in-hiding-a-woman-lost-
book-10-t-b-markinson/
https://ebookmass.com/product/covid-19-the-essentials-of-
prevention-and-treatment-1st-edition-jie-ming-qu/
https://ebookmass.com/product/images-of-the-past-7th-edition-
ebook-pdf/
Lossless Information
Hiding in Images
This page intentionally left blank
Lossless Information
Hiding in Images
Zhe-Ming Lu
Professor, School of Aeronautics and Astronautics
Zhejiang University
Hangzhou, P.R. China
Shi-Ze Guo
Professor, School of Computer Science
Beijing University of Posts and Communications
Beijing, China
No part of this publication may be reproduced or transmitted in any form or by any means,
electronic or mechanical, including photocopying, recording, or any information storage
and retrieval system, without permission in writing from the publisher. Details on how to
seek permission, further information about the Publisher’s permissions policies and our
arrangements with organizations such as the Copyright Clearance Center and the
Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions.
This book and the individual contributions contained in it are protected under copyright by
the Publisher (other than as may be noted herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research and
experience broaden our understanding, changes in research methods, professional
practices, or medical treatment may become necessary.
Practitioners and researchers must always rely on their own experience and knowledge in
evaluating and using any information, methods, compounds, or experiments described
herein. In using such information or methods they should be mindful of their own safety
and the safety of others, including parties for whom they have a professional responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or
editors, assume any liability for any injury and/or damage to persons or property as a
matter of products liability, negligence or otherwise, or from any use or operation of any
methods, products, instructions, or ideas contained in the material herein.
Preface .................................................................................................. xi
v
vi Contents
Index...................................................................................................403
This page intentionally left blank
Preface
The enormous popularity of the World Wide Web in the early 1990s demonstrated the
commercial potential of offering multimedia resources through digital networks.
Representation of media in digital format facilitates its access. Digital media
includes text, digital audio, images, video, and software. The recent growth of net-
worked multimedia systems has increased the need for the protection of digital
media. Since commercial interests seek to use the digital networks to offer digital
media for profit, it is particularly important for the protection and enforcement of
intellectual property rights, and they have a strong interest in protecting their owner-
ship rights. On the other hand, the age of digital multimedia has brought many advan-
tages in the creation and distribution of information. Representation of media in
digital format enhances the accuracy, efficiency, and portability of existence of
data. The powerful multimedia manipulation software has made it possible to edit
and alter the media’s content seamlessly. Since the ease of copying and editing
decreases the credibility of multimedia, a secure authentication system is needed to
verify data integrity and trustworthiness. Furthermore, the rapid development of
the Internet requires confidential information that needs to be protected from the un-
authorized users. Thus, the standard and concept of “what you see is what you get
(WYSIWYG),” which we encounter sometimes while printing images or other mate-
rials, is no longer precise and would not fool a steganographer as it does not always
hold true. Images can be more than what we see with our human visual system (HVS);
hence, they may convey more than merely 1000 words. For decades, people strove to
develop innovative methods for secret communication.
Under these circumstances, many approaches have been presented to protect the
digital media itself or utilize the digital media to protect other important informa-
tion. These approaches can be mainly classified into two categories, i.e., cryptog-
raphy and information hiding. In conventional cryptographic systems, the sender
generates a digital signature for an image in advance using a public key cryptog-
raphy system such as the RivesteShamireAdleman system. The sender then trans-
mits both the digital signature and the corresponding image to the receiver. Later, the
receiver can verify the integrity and authenticity of the received image by using the
corresponding digital signature. The cryptographic system permits only valid key-
holders access to encrypted data, but once such data is decrypted there is no way
to track its reproduction or retransmission. Information hiding, which is also known
as data hiding, is distinct from cryptography as it aims to make the embedded data
unrecoverable and inviolateable. Information hiding is a method of hiding secret
messages into a cover medium so that an unintended observer will not be aware
of the existence of the hidden messages.
Information hiding techniques can be classified into three techniques, i.e., steg-
anography, watermarking, and fingerprinting. These techniques are quite difficult to
tease apart especially for people coming from different disciplines. The term steg-
anography is retrieved from the Greek words stegos means cover and grafia meaning
xi
xii Preface
lossless information hiding methods. Chapter 4 focuses on the VQ-based lossless in-
formation hiding schemes. We first review the schemes related to VQ-based infor-
mation hiding. Then, we mainly focus on three kinds of VQ-based lossless
information hiding schemes. Chapter 5 discusses the topic of embedding data in
BTC-compressed images with lossless hiding techniques. First, we introduce the
block truncation coding technique. Then, we review the schemes related to BTC-
based information hiding. Then, we focus on two topics, i.e., lossless information
hiding schemes for BTC-compressed grayscale images and color images. Chapter
6 first introduces JPEG and JPEG2000 compression techniques in brief, together
with the embedding challenges. Then, we introduce the lossless information hiding
schemes for JEPG- and JPEG2000-compressed images.
This book is a monograph in the area of information hiding. It focuses on one
branch of the field of information hiding, i.e., lossless information hiding. Further-
more, it focuses on the most popular media, images. This book embodies the
following characteristics. (1) Novelty: This book introduce many state-of-the-art
lossless hiding schemes, most of that come from the authors’ publications in the
past 5 years. The content of this book covers the research hotspots and their recent
progress in the field of lossless information hiding. After reading this book, readers
can immediately grasp the status, the typical algorithms, and the trend in the field of
lossless information hiding. For example, in Chapter 6, reversible data hiding in
JPEG2000 images is a very new research branch. (2) All roundedness: In this
book, lossless information hiding schemes for images are classified into three cate-
gories, i.e., spatial domainebased, transform domainebased, and compressede
domain based schemes. Furthermore, the compressed domainebased methods are
classified into VQ-based, BTC-based, and JPEG/JPEG2000-based methods. Espe-
cially, the lossless information hiding in JPEG images is very useful since most of
the images are stored in the JPEG format. Therefore, the classification of lossless
hiding schemes covers all kinds of methods. (3) Theoretical: This book embodies
many theories related to lossless information hiding, such as image compression,
integer transforms, multiresolution analysis, VQ, BTC, JPEG, and JPEG2000. For
example, in Chapter 3, several definitions related to invertible mappings and integer
DCT transforms are introduced in detail to understand the content of later chapters
easily. (4) Practical: It is suitable for all researchers, students, and teachers in the
fields of information security, image processing, information hiding, and communi-
cations. It can guide the engineers to design a suitable hiding scheme for their spe-
cial purpose, such as copyright protection, content authentication, and secret
communication in the fields of military, medicine, and law.
This book is completely written by Prof. Zhe-Ming Lu. The research fruits of this
book are based on the work accumulation of the author for over a decade, most of
which comes from the fruits of PhD and master students supervised by Prof. Lu.
For example, Dr. Zhen-Fei Zhao and Dr. Hao Luo carried out the research work
on reversible secret sharingebased lossless information hiding schemes supervised
by Prof. Lu. Dr. Bian Yang, who was a former masters and PhD student, cosuper-
vised by Prof. Lu, carried out the research work in Germany on lossless information
Preface xv
hiding schemes based on integer DCT/DWT transforms as the main part of his thesis
topic. Dr. Yu-Xin Su, who was a former masters student, supervised by Prof. Lu, car-
ried out the research work on lossless information hiding schemes for BTC-
compressed color images as part of his thesis topic. Mr. Xiang Li, who was a former
masters student, supervised by Prof. Lu, carried out the research work on lossless
information hiding in JPEG/JPEG2000-compressed images as part of his thesis
topic. We would like to show our great appreciation of the assistance from other
teachers and students at the Institute of Astronautics Electronics Engineering of
Zhejiang University. Part of research work in this book was supported by the
National Scientific Foundation of China under the grants 61171150 and 61003255
and the Zhejiang Provincial Natural Science Foundation of China under the grants
R1110006 and RLY14F020024. Owing to our limited knowledge, it is inevitable
that errors and defects will appear in this book, and we adjure readers to criticize.
Zhe-Ming Lu
Hangzhou, China
June 2016
This page intentionally left blank
CHAPTER
Introduction
1
1.1 BACKGROUND
1.1.1 DEFINITION OF IMAGES
1.1.1.1 Images
An image is a visual representation of something that depicts or records visual
perception. For example, a picture is similar in appearance to some subject, which
provides a depiction of a physical object or a person. Images may be captured by
either optical devices, such as cameras, mirrors, lenses, and telescopes, or natural
objects and phenomena, such as human eyes or water surfaces. For example, in a
film camera works the lens focuses an image onto the film surface. The color film
has three layers of emulsion, each layer being sensitive to a different color, and
the (slide) film records on each tiny spot of the film to reproduce the same color
as the image projected onto it, the same as the lens saw. This is an analog image,
the same as our eyes can see, so we can hold the developed film up and look at it.
Images may be two-dimensional, such as a photograph, or three-dimensional,
such as a statue or a hologram. An image in a broad sense also refers to any two-
dimensional figure such as a map, a graph, a pie chart, or an abstract painting. In
this sense, images can also be rendered manually, such as by drawing, painting, carv-
ing; can be rendered automatically by printing or computer graphics technology; or
can be developed by a combination of methods, especially in a pseudophotograph. In
photography, visual media, and the computer industries, the phrase “still image” re-
fers to a single static image that is distinguished from a kinetic or moving image
(often called video), which emphasizes that one is not talking about movies. The
phrase “still image” is often used in very precise or pedantic technical writing
such as an image compression standard.
In this book, we consider two-dimensional still images in a broad sense. Thus, an
analog image (physical image) I defined in the “real world” is considered to be a
function of two real variables as follows:
I ¼ fIðx; yÞ˛½0; Bj0 x X; 0 y Yg (1.1)
where I(x,y) is the amplitude (e.g., brightness or intensity) of the image at the real
coordinate position (x,y), B is the possible maximum amplitude, and X and Y define
the maximum coordinates. An image may be considered to contain subimages
Lossless Information Hiding in Images. http://dx.doi.org/10.1016/B978-0-12-812006-4.00001-2 1
Copyright © 2017 Zhejiang University Press Co., Ltd., published by Elsevier Inc. All rights reserved.
2 CHAPTER 1 Introduction
sometimes referred to as regions. This concept reflects the fact that images
frequently contain collections of objects, each of which can be the basis for a region.
FIGURE 1.1
Digitalization of the Physical Image by Pixels.
1.1 Background 3
called RGB), or sometimes one digital value representing the brightness of the color.
Similarly, a scanner has a one-row array of similar cells, and a carriage motor moves
this row of sensors down the page, making columns in many rows to form the full
image grid. Both scanners and cameras generate images composed of pixels, and
a pixel contains the digital RGB color data or brightness of one tiny surface area.
This process is called digitization. Printers and video screens are digital devices
too, and their only purpose in life is to display pixels.
From these descriptions, we come to know that a digital image contains a fixed
number of rows and columns of pixels. Pixels are the smallest individual element in
a digital image, holding quantized values that represent the brightness of a given co-
lor at any specific point. Typically, the pixels are stored in computer memory as a
raster image or raster map, a two-dimensional array of small integers. Thus, a digital
image I can be defined as an array, or a matrix, of square pixels arranged in columns
and rows as follows:
I ¼ fIðm; nÞj0 m M 1; 0 n N 1g (1.2)
where I(m,n) is the color data or brightness value of the pixel at the mth column and
nth row, and M and N define the width (number of columns) and height (number of
rows) of the digital image.
According to the range of I(m,n), we can classify digital images into binary im-
ages, grayscale images, and color images, and three examples are shown in Fig. 1.2.
In color images, each pixel’s color sample has three numerical RGB components to
represent the color of that tiny area, i.e., I(m,n) is denoted by (R, G, B) with R˛[0,
255], G˛[0, 255], and B˛[0, 255]. Typically, for each pixel, its three RGB compo-
nents are three 8-bit numbers. These 3 bytes (1 byte for each RGB) compose a 24-bit
color. Each byte can have 256 possible values, ranging from 0 to 255. In the RGB
system, we know red and green make yellow. Thus (255, 255, 0) means both red
and green are fully saturated (255 is as large as an 8-bit value can be), with no
FIGURE 1.2
The (a) Binary, (b) Grayscale, and (c) Color Images of Lena.
Another random document with
no related content on Scribd:
and disjoin the closest affinities. And if we note the differences of
leaves, or even flowers, we fall into the same difficulty; for many
plants very different in kind have leaves very similar, as Polygonum
and Hypericum, Ernea and Sesamois, Apium and Ranunculus; and
plants of the same genus have sometimes very different 376 leaves,
as the several species of Ranunculus and of Lactuca. Nor will color
or shape of the flowers help us better; for what has Vitis in common
with Œnanthe, except the resemblance of the flower?” He then goes
on to say, that if we seek a too close coincidence of all the
characters we shall have no Species; and thus shows us that he had
clearly before his view the difficulty, which he had to attack, and
which it is his glory to have overcome, that of constructing Natural
Orders.
46 Lib. vi.
47 Lib. vii.
48 Lib. x.
49 Lib. xii.
50 Lib. xi.
and similar language of praise has been applied to him by the best
botanists up to Cuvier, 55 who justly terms his book “a work of
genius.”
54 Philosoph. Bot. p. 19.
380 At the same time, the New World excited also the curiosity of
botanists. Hans Sloane collected the plants of Jamaica; John
Banister those of Virginia; William Vernon, also an Englishman, and
David Kriege, a Saxon, those of Maryland; two Frenchmen, Surian
and Father Plumier, those of Saint Domingo.
We may add that public botanical gardens were about this time
established all over Europe. We have already noticed the institution
of that of Pisa in 1543; the second was that of Padua in 1545; the
next, that of Florence in 1556; the fourth, that of Bologna, 1568; that
of Rome, in the Vatican, dates also from 1568.
Lobel, who was botanist to James the First, and who published his
Stirpium Adversaria Nova in 1571, brings together the natural
families of plants more distinctly than his predecessors, and even
distinguishes (as Cuvier states, 67 ) monocotyledonous from
dicotyledonous plants; one of the most comprehensive division-lines
of botany, of which succeeding times discovered the value more
completely. Fabius Columna, 68 in 1616, gave figures of the
fructification of plants on copper, as Gessner had before done on
wood. But the elder Bauhin (John), notwithstanding all that
Cæsalpinus had done, retrograded, in a work published in 1619, into
the less precise and scientific distinctions of—trees with nuts; with
berries; with acorns; with pods; creeping plants, gourds, &c.: and no
clear progress towards a system was anywhere visible among the
authors of this period.
67 Cuv. Leçons, &c. 198.
68 Ib. 206.
While this continued to be the case, and while the materials, thus
destitute of order, went on accumulating, it was inevitable that the
evils which Cæsalpinus had endeavored to remedy, should become
more and more grievous. “The nomenclature of the subject 69 was in
such disorder, it was so impossible to determine with certainty the
plants spoken of by preceding writers, that thirty or forty different
botanists had given to the same plant almost as many different
names. Bauhin called by one appellation, a species which Lobel or
Matheoli designated by another. There was an actual chaos, a
universal confusion, in which it was impossible for men to find their
way.” We can the better understand such a state of things, from
having, in our own time, seen another classificatory science,
Mineralogy, in the very condition thus described. For such a state of
confusion there is no remedy but the establishment of a true system
of classification; which by its real foundation renders a reason for the
place of each species; and which, by the fixity of its classes, affords
a basis for a standard nomenclature, as finally took place in Botany.
But before such a remedy is obtained, men naturally try to alleviate
the evil by tabulating the synonyms of different writers, as far as they
are able to do so. The task of constructing such a Synonymy of
botany at the period of which we speak, was undertaken by Gaspard
Bauhin, the brother of John, but nineteen years younger. This work,
the Pinax Theatri Botanici, was printed 382 at Basil in 1623. It was a
useful undertaking at the time; but the want of any genuine order in
the Pinax itself, rendered it impossible that it should be of great
permanent utility.
69 Ib. 212.
After this period, the progress of almost all the sciences became
languid for a while; and one reason of this interruption was, the wars
and troubles which prevailed over almost the whole of Europe. The
quarrels of Charles the First and his parliament, the civil wars and
the usurpation, in England; in France, the war of the League, the
stormy reign of Henry the Fourth, the civil wars of the minority of
Louis the Thirteenth, the war against the Protestants and the war of
the Fronde in the minority of Louis the Fourteenth; the bloody and
destructive Thirty Years’ War in Germany; the war of Spain with the
United Provinces and with Portugal;—all these dire agitations left
men neither leisure nor disposition to direct their best thoughts to the
promotion of science. The baser spirits were brutalized; the better
were occupied by high practical aims and struggles of their moral
nature. Amid such storms, the intellectual powers of man could not
work with their due calmness, nor his intellectual objects shine with
their proper lustre.
Soon after the period of which we now speak, that of the restoration
of the Stuarts to the throne of England, systematic arrangements of
plants appeared in great numbers; and in a manner such as to show
that the minds of botanists had gradually been ripening for this
improvement, through the influence of preceding writers, and the
growing acquaintance with plants. The person whose name is
usually placed first on this list, Robert Morison, appears to me to be
much less meritorious than many of those who published very
shortly after him; but I will give him the precedence in my narrative.
He was a Scotchman, who was wounded fighting on the royalist side
in the civil wars of England. On the triumph of the republicans, he
withdrew to France, when he became director of the garden of
Gaston, Duke of Orléans at Blois; and there he came under the
notice of our Charles 383 the Second; who, on his restoration,
summoned Morison to England, where he became Superintendent of
the Royal Gardens, and also of the Botanic Garden at Oxford. In
1669, he published Remarks on the Mistakes of the two Bauhins, in
which he proves that many plants in the Pinax are erroneously
placed, and shows considerable talent for appreciating natural
families and genera. His great systematic work appeared from the
University press at Oxford in 1680. It contains a system, but a
system, Cuvier says, 70 which approaches rather to a natural method
than to a rigorous distribution, like that of his predecessor
Cæsalpinus, or that of his successor Ray. Thus the herbaceous
plants are divided into climbers, leguminous, siliquose, unicapsalar,
bicapsular, tricapsular, quadricapsular, quinquecapsular; this division
being combined with characters derived from the number of petals.
But along with these numerical elements, are introduced others of a
loose and heterogeneous kind, for instance, the classification of
herbs as lactescent and emollient. It is not unreasonable to say, that
such a scheme shows no talent for constructing a complete system;
and that the most distinct part of it, that dependent on the fruit, was
probably borrowed from Cæsalpinus. That this is so, we have, I
think, strong proof; for though Morison nowhere, I believe, mentions
Cæsalpinus, except in one place in a loose enumeration of botanical
writers, 71 he must have made considerable use of his work. For he
has introduced into his own preface a passage copied literally 72 from
the dedication of Cæsalpinus; which passage we have already
quoted (p. 374,) beginning, “Since all science consists in the
collection of similar, and the distinction of dissimilar things.” And that
the mention of the original is not omitted by accident, appears from
this; that Morison appropriates also the conclusion of the passage,
which has a personal reference, “Conatus sum id præstare in
universa plantarum historia, ut si quid pro ingenii mei tenuitate in
hujusmodi studio profecerim, ad communem utilitatem proferrem.”
That Morison, thus, at so long an interval after the publication of the
work of Cæsalpinus, borrowed from him without acknowledgement,
and adopted his system so as to mutilate it, proves that he had
neither the temper nor the talent of a discoverer; and justifies us
withholding from him the credit which belongs to those, who, in his
time, resumed the great undertaking of constructing a vegetable
system.
70 Cuv. Leçons, &c. p. 486.
71 Pref. p. i.
72 Ib. p. ii.
Among those whose efforts in this way had the greatest and
earliest 384 influence, was undoubtedly our countryman, John Ray,
who was Fellow of Trinity College, Cambridge, at the same time with
Isaac Newton. But though Cuvier states 73 that Ray was the model of
the systematists during the whole of the eighteenth century, the
Germans claim a part of his merit for one of their countrymen,
Joachim Jung, of Lubeck, professor at Hamburg. 74 Concerning the
principles of this botanist, little was known during his life. But a
manuscript of his book was communicated 75 to Ray in 1660, and
from this time forwards, says Sprengel, there might be noticed in the
writings of Englishmen, those better and clearer views to which
Jung’s principles gave birth. Five years after the death of Jung, his
Doxoscopia Physica was published, in 1662; and in 1678, his
Isagoge Phytoscopica. But neither of these works was ever much
read; and even Linnæus, whom few things escaped which
concerned botany, had, in 1771, seen none of Jung’s works.
73 Leçons Hist. Sc. p. 487.
I do not see in this much that interferes with the originality of Ray’s
method, 77 of which, in consequence of the importance ascribed to it
by Cuvier, as we have already seen, I shall give an account,
following that great naturalist. 78 I confine myself to the ordinary
plants, and omit the more obscure vegetables, as mushrooms,
mosses, ferns, and the like.
77 Methodus Plantarum Nova, 1682. Historia Plantarum, 1686.
So much for simple flowers with naked seeds. In those where the
seeds are surrounded by a pericarp, or fruit, this fruit is large, soft,
and fleshy, and the plants are pomiferous; or it is small and juicy, and
the fruit is a berry, as a Gooseberry.
Thus Ray constructed his system partly on the fruit and partly on
the flower; or more properly, according to the expression of Linnæus,
386 comparing his earlier with his later system, he began by being a
fructicist, and ended by being a corollist. 80 ~Additional material in the
3rd edition.~
80 Ray was a most industrious herbalizer, and I cannot
understand on what ground Mirbel asserts (Physiol. Veg., tom. ii.
p. 531,) that he was better acquainted with books than with plants.
85 Linn.