DOI QR코드

DOI QR Code

Data Hiding Based on BTC using EMD

EMD를 사용한 BTC 기반의 데이터 은닉

  • Kim, Cheonshik (Dept. of Digital Medial Engineering, Anyang University)
  • 김천식 (안양대학교 디지털미디어공학과)
  • Received : 2014.02.08
  • Accepted : 2014.04.11
  • Published : 2014.04.28

Abstract

Block truncation coding (BTC) is a recent technique used for compression of monochrome image data. The original algorithm of BTC implement to use the standard mean and the standard deviation. For data hiding, it is needed to modify bit-planes of an images. These modifications yields unacceptable quality of BTC images. Thus, we propose IODBTC (Improved Ordered dithering BTC) improving BTC. In this paper, we improve this problem. Experimental results show that the reconstructed secret messages are the same as the original secret messages, and that the proposed scheme exhibits a good BTC images compared to that of previous schemes.

BTC는 단색 이미지 데이터의 압축을 위해서 사용되는 최근의 기술이다. BTC의 알고리즘은 평균과 표준편차를 사용하여 구현한다. 데이터 은닉을 위해, 이미지의 비트-구조를 변경하는 과정이 요구된다. 이러한 변경은 BTC 이미지의 질의 성능을 나쁘게 만든다. 따라서, 우리는 데이터 은닉의 성능 개선을 위해서 BTC를 개선한 IODBTC를 제한하였다. 실험 결과 복원한 비밀 메시지가 원본 비밀 메시지와 같음을 증명하였고 제안한 방법이 이전의 스킴에 비해서 좋은 BTC 이미지임을 증명하였다.

Keywords

References

  1. E. Delp and O. Mitchell, "Image compression using block truncation coding," IEEE Transactions on Communications, vol. 27, no. 9, pp. 1335-1342, 1979. https://doi.org/10.1109/TCOM.1979.1094560
  2. Guo, J.-M., "Watermarking in dithered halftone images with embeddable cells selection and inverse halftoning," Signal Processing, vol. 88, 1496-1510, 2008. https://doi.org/10.1016/j.sigpro.2007.12.015
  3. J.-S. Pan, H. Luo and Z.-M. Lu, "Look-up Table Based Reversible Data Hiding for Error Diffused Halftone Images," Informatica, vol. 18, No. 4, 615-628. 2007.
  4. S. F. Tu and C. S. Hsu, "A BTC-based watermarking scheme for digital images," Information & security, vol.15, no.2, 2004,216-228.
  5. Tseng, H.W., and C.C. Chang, "Hiding data in halftone images," Informatica, 16(3), 419-430, 2005.
  6. X. Zhang, S. Wang, "Efficient Steganographic Embedding by Exploiting Modification Direction," Communications Letters, IEEE, vol.10, Issue: 11, pp. 781-783, 2006. https://doi.org/10.1109/LCOMM.2006.060863
  7. C. Kim, "Data hiding by an improved exploiting modification direction," Multimedia Tools and Appl., vol.69, no.3, pp.569-584, 2014. https://doi.org/10.1007/s11042-012-1114-0
  8. P. T. Huy, N. H. Thanh, C. Kim, C.-N. Yang, "Data-Hiding for Halftone Images Using an Improved CPT scheme," KSII Transactions on Internet and Information Systems, vol.7, no.2, pp.405-424, 2013 https://doi.org/10.3837/tiis.2013.02.013
  9. C. Kim, Y.-S. Hong, C.-P. Han, and S. Oh, "Binary and Halftone Image Data Hiding Technique using Run-Length," The Journal of The Institute of Webcasting, Internet Television and Telecommunication, vol.9, no.3, pp.37-43, 2009.
  10. Y.S. Im, E.Y. Kang, "Watermarking and QR Code in Digital Image Coding," The Journal of The Institute of Webcasting, Internet Television and Telecommunication, vol.12, no.6, pp.99-104, 2012. https://doi.org/10.7236/JIWIT.2012.12.6.99
  11. X. Wu, W. Sun, "Data Hiding in Block Truncation Coding," 2010 International Conference on Computational Intelligence and Security, pp.406-410, 2010.
  12. M. Lin and C. Chang, "A novel information hiding scheme based on BTC," The 4th International Conference Computer and Information Technology, pp. 66-71, 2004.
  13. Boo-Hyung Lee, "Technique for production and encoding of New dot-type Print Watermark Pattern," Journal of the Korea Academia-Industrial cooperation Society, vol.10, no.5, pp.979-984, 2009. https://doi.org/10.5762/KAIS.2009.10.5.979