DOI QR코드

DOI QR Code

암호화된 영상의 데이터 은닉 기법의 오류 개선을 위한 섭동 함수 설계

Design of Fluctuation Function to Improve BER Performance of Data Hiding in Encrypted Image

  • Kim, Young-Hun (Dongguk University Department of Information Security Code and Cipher laboratory) ;
  • Lim, Dae-Woon (Chosun University, Department of Information and Communication Engineering) ;
  • Kim, Young-Sik (Dongguk University Department of Information and Communication Engineering)
  • 투고 : 2015.12.10
  • 심사 : 2016.02.23
  • 발행 : 2016.03.31

초록

가역적 데이터 은닉은 원본 이미지에 미치는 영향 없이 임의의 데이터를 숨길 수 있는 기술이다. Zhang은 원본 영상을 암호화하고 암호화된 영상에 데이터를 은닉하는 방법을 제안하였다. 이 때 은닉된 데이터를 추출하기 위해서 먼저 암호화된 영상을 복호화하고, 복호화된 영상의 공간 상관 특성을 나타내는 섭동 함수(Fluctuation Function)를 이용한다. 본 논문에서는 은닉된 데이터를 추출 과정에서 발생하는 오류를 감소시키기 위한 섭동 함수를 제안하고 모의실험을 통해 성능을 검증하였다.

Reversible data hiding is a technique to hide any data without affecting the original image. Zhang proposed the encryption of original image and a data hiding scheme in encrypted image. First, the encrypted image is decrypted and uses the fluctuation function which exploits the spatial correlation property of decrypted image to extract hidden data. In this paper, the new fluctuation function is proposed to reduce errors which arise from the process extracting hidden data and the performance is verified by simulation.

키워드

참고문헌

  1. W. Stallings, Cryptography and Network Security: Principles and Practice. New Jersey: Pearson Education, 2003.
  2. M. Park, E. Cho, and T. T. Kwon, "Multi server password authenticated key exchange using attribute-based encryption," J. KICS, vol. 40, no. 8, pp. 1597-1605, Aug. 2015. https://doi.org/10.7840/kics.2015.40.8.1597
  3. J.-H. Kim, S.-K. Yoo, and S.-H. Lee, "Fully homomorphic encryption scheme without key switching," J. KICS, vol. 38, no. 5, pp. 428-433, May 2015.
  4. Fabien A. P. Petitcolas, Ross J. Anderson and Markus G. Kuhn "Information hiding-a survey," in Proc. IEEE, special issue on protection of multimedia content, May 1999. Invited paper.
  5. R. J. Anderson and F. A. P. Petitcolas. "On the limits of steganography," IEEE J. Sel. Areas on Commun., vol. 16, pp. 474-481, 1998. https://doi.org/10.1109/49.668971
  6. J. Tian, "Reversible data embedding using a difference expansion," IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890-896, Aug. 2003. https://doi.org/10.1109/TCSVT.2003.815962
  7. M. U. Celik, G. Sharma, A. M. Tekalp, and E.Saber, "Lossless generalized-lsb data embedding," IEEE Trans. Image Process., vol. 14, no. 2, pp. 253-266, Feb. 2005. https://doi.org/10.1109/TIP.2004.840686
  8. Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, "Reversible data hiding," IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354-362, 2006. https://doi.org/10.1109/TCSVT.2006.869964
  9. L. Luo, Z. Chen, M. Chen, X. Zeng, and Z. Xiong, "Reversible image watermarking using interpolation technique," IEEE Trans. Inf. Forensics Secur., vol. 5, no. 1, pp. 187-193, 2010. https://doi.org/10.1109/TIFS.2009.2035975
  10. X. Zhang, "Reversible data hiding in encrypted image," IEEE Signal Processing Lett., vol. 18, no. 4, pp. 255-258, Apr. 2011. https://doi.org/10.1109/LSP.2011.2114651
  11. W. Hong, T.-S. Chen, and H.-Y. Wu, "An improved reversible data hiding in encrypted images using side match," IEEE Signal Processing Lett., vol. 19, no. 4, pp. 199-202, Apr. 2012. https://doi.org/10.1109/LSP.2012.2187334
  12. J. Fridirich, M. Goljan, and R Du, "Lossless data embedding for all image formats," SPIE Proc. photonics West, Electronic Imaging, Security and Watermarking of multimedia Contents, vol. 4675, pp. 572-583, 2002.
  13. Y. C. Li, C. M. Yeh, and C. C. Chang, "Data hiding based on the similarity between neighboring pixels with reversibility," Digital Signal Processing, vol. 20, pp. 1116-1128, 2010.
  14. P. Tsai, Y. C. Hu, and H. L. Yeh, "Reversible image hiding scheme using predictive coding and histogram shifting," Signal Processing, vol. 89, no. 6, pp. 1129-1143, 2009.
  15. W. L. Tai, C. M. Yeh, and C. C. Chang, "Reversible data hiding based on histogram modification of pixel differences," IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 6, pp. 906-910, Jun. 2009. https://doi.org/10.1109/TCSVT.2009.2017409
  16. H. C. Wu, H. C. Wang, C. S. Tsai, and C. M. Wang, "Reversible image steganographic scheme via predictive coding," Displays, vol. 31, no. 1, pp. 35-43, Jan. 2010. https://doi.org/10.1016/j.displa.2009.10.002
  17. C.-C. Chang, C.-C. Lin, and Y.-H. Chen, "Reversible data-embedding scheme using differences between original and predicted pixel values," Inf. Secur., vol. 2, no. 2, pp. 35-46, 2008. https://doi.org/10.1049/iet-ifs:20070004
  18. S. Lian, Z. Liu, Z. Ren, and H. Wang, "Commutative encryption and watermarking in video compression," IEEE Trans. Circuits Syst. Video Technol., vol. 17, no. 6, pp. 774-778, 2007. https://doi.org/10.1109/TCSVT.2007.896635
  19. Y.-S. Kim, C.-J. Ryu, and S.-J. Han, "Refined reversible data hiding scheme in encrypted image," in Proc. KIIT Summer Conf. 2011, pp. 78-82, May 2011.
  20. J.-H. Jeong, K.-J. Kang, Y.-S. Kim, and D.-W. Lim, "Reversible data hiding scheme using dynamic bit selection in encrypted image," in Proc. KIISC Int. Conf. 2012, pp. 56-59, Dec. 2012.
  21. Y.-S. Kim and D.-W. Lim, "Reversible data hiding scheme based on lattices," J. KMMS, vol. 16, no. 4, pp. 27-33, Dec. 2012.
  22. S.-H. Cho, D.-S. Kim, and K.-Y. Yoo, "Improved reversible data hiding scheme based on difference value of adjacent pixels," in Proc. KICS Int. Conf. Commun., pp. 205-206, Jeju Island, Korea, Jun. 2013.
  23. T.-S. Kim, M.-H. Jang, and S.-H. Kim, "Transmission methods using RS codes to improve spatial relationship of images in reversible data hiding systems," J. KICS, vol. 40, no. 8, pp. 1477-1484, Aug. 2015. https://doi.org/10.7840/kics.2015.40.8.1477

피인용 문헌

  1. 영역 분할을 이용한 변형된 스위칭 필터에 관한 연구 vol.41, pp.10, 2016, https://doi.org/10.7840/kics.2016.41.10.1284
  2. 암호화된 영상의 가역적 데이터 은닉을 위한 일반화된 섭동 함수 설계 vol.41, pp.11, 2016, https://doi.org/10.7840/kics.2016.41.11.1329
  3. New Fluctuation Functions to Measure Spatial Correlation of Encrypted Images in Reversible Data Hiding vol.42, pp.2, 2016, https://doi.org/10.7840/kics.2017.42.2.331