DOI QR코드

DOI QR Code

New Fluctuation Functions to Measure Spatial Correlation of Encrypted Images in Reversible Data Hiding

가역적 데이터 은닉에서 암호화된 이미지의 공간 상관관계를 측정하기 위한 새로운 섭동 함수 연구

  • Received : 2016.08.23
  • Accepted : 2016.12.09
  • Published : 2017.02.28

Abstract

In this work, we propose an improved form of Zhang's reversible data hiding technique in encrypted image. In the original work, average value of neighboring pixels is used for fluctuation calculation which fails to give good performance. In proposed scheme, to reduce the bit error rate a new function is calculated by summing difference from four neighboring pixels for measuring fluctuation. Moreover, modified calculation of fluctuation function is also proposed where border pixels are considered. The simulation results show that the performance of proposed method outperforms Zhang's and Hong's work. From the results, more information can be sent by using proposed system

본 논문에서는 암호화된 이미지에서 Zhang의 가역적 데이터 은닉 기법을 개선하는 알고리즘을 제안한다. 기존의 기법에서는 주변 픽셀의 평균값이 섭동함수로 사용되었고 모의실험 시 오류 성능이 저하됨을 확인되었다. 제안하는 시스템에서는 비트 오류율을 줄이고자 섭동을 측정 할 때 주변 함수와의 차이의 합을 더하여 계산한다. 또한 경계 픽셀을 고려한 변동함수의 새로운 계산법을 제안한다. Zhang과 Hong의 시스템과 비교 시 제안 기법의 성능이 우수함을 모의실험을 통해 확인할 수 있다. 이 결과로부터 제안 시스템을 사용할 경우 오류 없이 정보를 더 전송할 수 있음을 확인할 수 있다.

Keywords

References

  1. J. Tian, "Reversible data embedding using a difference expansion," IEEE Trans. Cir. Syst. Video Technol., vol. 13, no. 8, pp. 890-896, 2003. https://doi.org/10.1109/TCSVT.2003.815962
  2. Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, "Reversible data hiding," IEEE Trans. Cir. Syst. Video Technol., vol. 16, no. 8, pp. 354- 362, 2006. https://doi.org/10.1109/TCSVT.2006.869964
  3. M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, "Lossless generalized-LSB data embedding," IEEE Trans. Image Process., vol. 14, no. 2, pp. 253-266, 2005. https://doi.org/10.1109/TIP.2004.840686
  4. D. M. Thodi and J. J. Rodriguez, "Expansion embedding techniques for reversible watermarking," IEEE Trans. Image Process., vol. 16, no. 3, pp. 721-730, 2007. https://doi.org/10.1109/TIP.2006.891046
  5. C. C. Chang, C. C. Lin, and Y. H. Chen, "Reversible data-embedding scheme using differences between original and predicted pixel values," Inform. Secur., vol. 2, no. 2, pp. 35-46, 2008. https://doi.org/10.1049/iet-ifs:20070004
  6. L. Luo, Z. Chen, M. Chen, X. Zeng, and H Xiong, "Reversible image watermarking using interpolation technique," IEEE Trans. Inf. Foren. Secur., vol. 5, no. 1, Mar. 2010.
  7. W. Hong and T. S. Chen, "Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism," J. Vis. Commun. Image Represent., vol. 22, no. 2, pp. 131-140, 2011. https://doi.org/10.1016/j.jvcir.2010.11.004
  8. S. Kang, H.-J. Hwang, and H.-J. Kim, "Reversible watermark using an accurate predictor and sorter based on payload balancing," ETRI J., vol. 34, no. 3, pp. 410-420, Jun. 2012. https://doi.org/10.4218/etrij.12.0111.0075
  9. J.-H. Kim, S.-K. Yoo, and S.-H. Lee, "Fully homomorphic encryption scheme without key switching," J. KICS, vol. 38C, no. 5, pp. 428-433, Jun. 2013. https://doi.org/10.7840/kics.2013.38C.5.428
  10. K. Ma, W. Zhang, X. Zhao, N. Yu, and F. Li, "Reversible data Hiding in encrypted images reserving room before encryption," IEEE Trans. Inf. Foren. Secur., vol. 8, no. 3, Mar. 2013.
  11. X. Zhang, "Reversible data hiding in encrypted images," IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255-258, 2011. https://doi.org/10.1109/LSP.2011.2114651
  12. X. Zhang, "Separable reversible data hiding in encrypted image," IEEE Trans. Inf. Foren. Secur., vol. 7, no. 2, Apr. 2012.
  13. T. Kim, M.-H. Jang, and S. Kim, "Transmission methods using RS codes to improve spacial relationship of images in reversible data hiding system," J. KICS, vol. 40, no. 8, pp. 1477-1484, Aug. 2015. https://doi.org/10.7840/kics.2015.40.8.1477
  14. F.-T.-Z. Khanam, D. M. Nguyen, and S. Kim, "Improved reversible data hiding in encrypted image using new fluctuation function," in Proc. KICS Int. Conf. Commun, Jeju island, Jun. 2016.
  15. Y.-H. Kim, D.-W. Lim, and Y.-S. Kim, "Design of fluctuation function to improve BER performance of data hiding in encrypted image," J. KICS, vol. 41, no. 3, pp. 307-316, Mar. 2016. https://doi.org/10.7840/kics.2016.41.3.307
  16. W. Hong, T. S. Chen, and H.-Y. Wu, "An improved reversible data hiding in encrypted images using side match," IEEE Sign. Process. Lett., vol. 19, no. 4, pp. 199-202, Apr. 2012. https://doi.org/10.1109/LSP.2012.2187334