2021 IEEE International Conference on Acoustics, Speech and Signal Processing

6-11 June 2021 • Toronto, Ontario, Canada

Extracting Knowledge from Information

2021 IEEE International Conference on Acoustics, Speech and Signal Processing

6-11 June 2021 • Toronto, Ontario, Canada

Extracting Knowledge from Information
Login Paper Search My Schedule Paper Index Help

My ICASSP 2021 Schedule

Note: Your custom schedule will not be saved unless you create a new account or login to an existing account.
  1. Create a login based on your email (takes less than one minute)
  2. Perform 'Paper Search'
  3. Select papers that you desire to save in your personalized schedule
  4. Click on 'My Schedule' to see the current list of selected papers
  5. Click on 'Printable Version' to create a separate window suitable for printing (the header and menu will appear, but will not actually print)

Paper Detail

Paper IDIFS-8.5
Paper Title REVERSIBLE DATA HIDING IN JPEG IMAGES FOR PRIVACY PROTECTION
Authors Yuxuan Huang, Xin Cao, Hao-Tian Wu, South China University of Technology, China; Yiu-ming Cheung, Hong Kong Baptist University, Hong Kong SAR China
SessionIFS-8: Watermarking and Data Hiding
LocationGather.Town
Session Time:Friday, 11 June, 11:30 - 12:15
Presentation Time:Friday, 11 June, 11:30 - 12:15
Presentation Poster
Topic Information Forensics and Security: [WAT] Watermarking And Data Hiding
IEEE Xplore Open Preview  Click here to view in IEEE Xplore
Abstract Recently, how to protect privacy in JPEG images has become an important issue in social networks. Besides encryption, reversible visual transformation has been studied for content and privacy protection. In this paper, an improved algorithm is proposed to conceal privacy information in JPEG images. By adopting face detection, the regions to be protected can be identified so that the DC and some AC coefficients in them are modified. The changes that have been made are reversibly saved in the other AC coefficients, and the block selection information is hidden into the whole image also by reversible data hiding. As a secret key is employed to control the process of transformation, the protected content can hardly be obtained without knowing the key. We conduct the proposed algorithm on a set of test images, and compare the performance with several existing algorithms in terms of information leakage, file size increment, and image quality. The experimental results show that improved image quality and less information leakage can be achieved with the proposed reversible transformation algorithm.