• Title/Summary/Keyword: 이미지 암호화

Search Result 96, Processing Time 0.026 seconds

Generalized Steganalysis using Deep Learning (딥러닝을 이용한 범용적 스테그아날리시스)

  • Kim, Hyunjae;Lee, Jaekoo;Kim, Gyuwan;Yoon, Sungroh
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.4
    • /
    • pp.244-249
    • /
    • 2017
  • Steganalysis is to detect information hidden by steganography inside general data such as images. There are stegoanalysis techniques that use machine learning (ML). Existing ML approaches to steganalysis are based on extracting features from stego images and modeling them. Recently deep learning-based methodologies have shown significant improvements in detection accuracy. However, all the existing methods, including deep learning-based ones, have a critical limitation in that they can only detect stego images that are created by a specific steganography method. In this paper, we propose a generalized steganalysis method that can model multiple types of stego images using deep learning. Through various experiments, we confirm the effectiveness of our approach and envision directions for future research. In particular, we show that our method can detect each type of steganography with the same level of accuracy as that of a steganalysis method dedicated to that type of steganography, thereby demonstrating the general applicability of our approach to multiple types of stego images.

DWT Based Multiwatermarking for Authentication and Detection of Image Modification (이미지 인증과 변형 검출을 위한 DWT기반 다중워터마킹)

  • Kang Tae-Hwan;Jang Ho-Hyun;Kim Dong-Seo;Joo Nak-Keun
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.480-484
    • /
    • 2005
  • In this paper, the multiwatermarking method to make it possible to the authentication, modification detection and copyright protection of the digital image was proposed. After the original image is transformed by the DWT(Discrete Wavelet Transform), the encrypted watermark information is embedded into the LSB(Least Significant Bit) of LL band on the low frequence domain for authenticating and detecting modified position in the image. And watermark information is embedded by exchanging the wavelet coefficient for the copyright protection. Thereby, we can authenticate the modification and detect the modified location by extracting the values of LSB on the low frequence domain. And we can perceive the copyright information of original image by extracting the embedded watermark on the high frequence domain.

  • PDF

Hybrid-Watermarking for DWT Based Authentication and Detection of Image Modification (DWT기반 이미지 인증 및 변형 검출을 위한 혼합 워터마킹)

  • Kim Dong-Seo;Joo Nak-Keun;Kang Tae-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.1
    • /
    • pp.170-178
    • /
    • 2006
  • In this paper, the hybrid-watermarking method to make it possible to the authentication, modification detection and copyright protection of the digital image was proposed. After the original image is transformed by the DWT(Discrete Wavelet Transform), the encrypted watermark information is embedded into the LSB(Least Significant Bit) of LL band on the low frequence domain for authenticating and detecting modified position in the image. And watermark information is embedded by exchanging the wavelet coefficient for the copyright protection. Thereby, we can authenticate the modification and detect the modified location by extracting the values of LSB on the low frequence domain. And we can perceive the copyright information of original image by extracting the embedded watermark on the high frequence domain.

  • PDF

IoT based Authentication System Implementation on Raspberry Pi (라즈베리파이에서 사물인터넷 기반의 인증 시스템 구현)

  • Kim, Jeong Won
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.6
    • /
    • pp.31-38
    • /
    • 2017
  • With the Development of Information Technology, Security is becoming very Important. Existing Security Systems are Mostly Expensive and Not Easy to Implement, and are Also very Complex when using Biometric Information. In this paper, We try to solve this Problem by Implementing a Low cost Internet based Security Terminal Using Fingerprint and Face Image. To Implement a Low-cost Security System, a Fingerprint Scanner and a Camera are installed in Raspberry pi, and the Scanned Image is encrypted with the AES-256 Algorithm and Transmitted to Cloud. Through This Study, We confirmed the Possibility of the Proposed System in view of Authentication, Cost Reduction, Security and Scalability.

Watermarking of Gray Logo & Color Image based on Human Visual System (인간시각 시스템 기반의 그레이로고 & 컬러 이미지의 워터마킹)

  • NOH Jin Soo;SHIN Kwang Gyu;RHEE Kang Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.3 s.303
    • /
    • pp.73-82
    • /
    • 2005
  • Recently, The wide range of the Internet applications and the related technology developments enabled the ease use of the digital multimedia contents (fixed images, movies, digital audios). However, due to the replay ability which the contents may be easily duplicated and not only the duplicates are capable of providing the same original quality. There are mainly the encipher techniques and the watermarking techniques which are studied and used as solutions for the above problem in order to protect the license holders' rights. To the protection of the IP(Intellectual Property) rights of the owner, digital watermarking is the technique that authenticates the legal copyrighter. This paper proposed the watermarking algorithms to watermark the 256 gray logo image and the color image by applying the wavelet transformation to the color stand-still images. The proposed algorithms conducted the watermark insertion at the LH frequency region among the wavelet transformation regions (LL, LH, HL, HH). The interleaving algorithms which applied in data communication was applied to the watermark. the amount of watermark increased which consequently caused the PSNR to decrease but this might provide the perseverance against the external attacks such as extraction, filtering, and crop.

VLSI Architecture of Fast Jacket Transform (Fast Jacket Transform의 VLSI 아키텍쳐)

  • 유경주;홍선영;이문호;정진균
    • Proceedings of the IEEK Conference
    • /
    • 2001.09a
    • /
    • pp.769-772
    • /
    • 2001
  • Waish-Hadamard Transform은 압축, 필터링, 코드 디자인 등 다양한 이미지처리 분야에 응용되어왔다. 이러한 Hadamard Transform을 기본으로 확장한 Jacket Transform은 행렬의 원소에 가중치를 부여함으로써 Weighted Hadamard Matrix라고 한다. Jacket Matrix의 cocyclic한 특성은 암호화, 정보이론, TCM 등 더욱 다양한 응용분야를 가질 수 있고, Space Time Code에서 대역효율, 전력면에서도 효율적인 특성을 나타낸다 [6],[7]. 본 논문에서는 Distributed Arithmetic(DA) 구조를 이용하여 Fast Jacket Transform(FJT)을 구현한다. Distributed Arithmetic은 ROM과 어큐뮬레이터를 이용하고, Jacket Watrix의 행렬을 분할하고 간략화하여 구현함으로써 하드웨어의 복잡도를 줄이고 기존의 시스톨릭한 구조보다 면적의 이득을 얻을 수 있다. 이 방법은 수학적으로 간단할 뿐 만 아니라 행렬의 곱의 형태를 단지 덧셈과 뺄셈의 형태로 나타냄으로써 하드웨어로 쉽게 구현할 수 있다. 이 구조는 입력데이타의 워드길이가 n일 때, O(2n)의 계산 복잡도를 가지므로 기존의 시스톨릭한 구조와 비교하여 더 적은 면적을 필요로 하고 FPGA로의 구현에도 적절하다.

  • PDF

Advanced LSB Technique for Hiding Messages in Audio Steganography (오디오 스테가노그래피에 자료를 숨기기 위한 개선된 LSB 기법)

  • Ji, Seon Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.1
    • /
    • pp.69-75
    • /
    • 2014
  • Audio seganography is the art and science of writing hidden messages that evolves as a new secret communication method. And audio steganography is similar to the process of modifying the Least Significant Bit of image files 8th LSB layer embedding has been done for desired binary messages. The effective of steganographic tools is to obtain imperceptible and robust way to conceal high rate of secret data. The objective of this paper is to propose a method for hiding the secret messages in safer manner from external attacks by modified LSB technique and encryption rearrangement key.

Indented Surface Configuration and its Volume Calculation (압입 표면형상의 구현과 체적계산법)

  • Yang, Jae-Yong;Yoon, Moon-Chul
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.21 no.5
    • /
    • pp.708-713
    • /
    • 2012
  • The indented geometry for rockwell hardness indenter has been configured by using Confocal Laser Scanning Microscopy (CLSM). For this purpose, the CLSM can be well suited to construct the three-dimensional indented volume from the indented surface by rockwell hardness tester. Furthermore, the height data of HEI(height encoded image) by CLSM must be acquired at first and converted to indented surface later. And the indented surface patterns enable us to predict the indenter shape and volume. This volume can be used to study the rockwell hardness model as a volume parameter. As a result, the technique performed in this study by combining the CLSM with compensation technique is an excellent one to obtain the geometries of indented surfaces over a wide range of surface resolution in a micro scale. And it can be used for micro volume calculation.

Designing the structure for secure transmission of spatial data (공간 데이터의 안전한 전송을 위한 구조설계)

  • Chang, Min-Young;Lim, Jung-Eun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.699-702
    • /
    • 2005
  • 최근 컴퓨터 성능과 네트워크 속도의 발전은 다양한 형태의 데이터를 유선 혹은 무선 환경상에서 주고 받고 처리할 수 있게 해주고 있다. 또한 일차원적인 텍스트, 이미지, 음성, 동영상뿐만 아니라 다차원 형태의 공간 데이터도 다양한 형태의 서비스로 제공되고 있다. 하지만 공간 데이터에 대한 연구는 공간 데이터 표준, 서비스, 성능적인 측면에 대한 연구만 진행이 되었을 뿐 보안적인 측면에 대한 연구는 미비한 상태이다. 이에 XML 의 보안 기법을 공간 데이터에 적용하여 공간 데이터 자체에 대한 보안 레벨과 암호화를 적용하여 공간 데이터 전송을 위한 보안구조를 제시하고자 한다.

  • PDF

Design of a Block Cipher Algorithm for Database (데이터베이스를 위한 블록 암호 알고리즘 설계)

  • Kim, Wha-Young;Suh, Yong-Moo
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2003.05a
    • /
    • pp.560-567
    • /
    • 2003
  • 최근 기업의 업무처리에 정보시스템의 의존도가 높아짐에 따라, 정보 보안 침해가 더욱 심해지고 있으며, 정보 유출 사례도 증가하고 있다. 이러한 가운데 기업은 중요한 정보를 보호하기 위해서 각종 보안시스템을 도입하여 사용하고 있으나, 해커들의 불법적인 침입과 기업 내 정보시스템 사용자들에 의한 정보유출 문제에 매우 취약한 실정이다. 이로 인하여 기업의 중요한 정보가 침해를 받거나 적절하게 보호되지 못하면, 기업의 이미지나 고객의 프라이버시 보호에 매우 큰 손상을 입을 수 있다. 그러므로 데이터베이스의 자료는 변조, 훼손, 유출 등 각종 내 외부의 위협으로부터 안전하게 보호되어야 한다. 이를 위해 기업의 중요 자산인 데이터베이스의 정보보호, 즉 데이터베이스의 정보를 암호화함으로써 정보의 유출 및 침해를 예방하고자, 이에 필요한 효율적이고 안전한 블록 암호 알고리즘의 설계 결과를 제시한다.

  • PDF