Robust Lossless Image Data Hiding Designed for SemiFragile Image Authentication ZHICHENG NI, YUN Q. SHI, FELLOW, IEEE, NIRWAN ANSARI, SENIOR MEMBER, IEEE, WEI SU, SENIOR MEMBER, IEEE, QIBIN SUN, AND XIAO LIN, SENIOR MEMBER, IEEE IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 18, NO. 4, APRIL 2008 報告人: 曹仁傑 1 Outline Lossless Data Hiding Lossless Image Data Hiding Algorithm Experimental Results Conclusions 2 Lossless Data Hiding C. De Vleeschouwer, J. F. Delaigle, and B. Macq, “Circular interpretation of bijective transformations in lossless watermarking for media asset management,” IEEE Trans. Multimedia, vol. 5, no. 1, pp. 97–105,Mar. 2003. 3 Histogram mapping onto a circle 4 Data (bit “1”) embedding diagram 5 6 Lossless Image Data Hiding Algorithm Distribution of difference value α 7 Bit embedding algorithm in each block (where K is threshold, is difference value). 8 9 Category 1 10 Category 2 & 3 11 Category 4 12 Data Extraction 13 1) If the absolute difference value α is larger than the threshold K. 2) If the absolute value of the difference value α is less than the threshold K. 3) Error Correction Code 14 Experimental Results 15 16 17 Conclusions This technique has the following advantages: 1) no salt-and-pepper noise 2) applicable to virtually all images 18