• 제목/요약/키워드: Data-hiding

검색결과 302건 처리시간 0.02초

암호화된 영상의 데이터 은닉 기법의 오류 개선을 위한 섭동 함수 설계 (Design of Fluctuation Function to Improve BER Performance of Data Hiding in Encrypted Image)

  • 김영훈;임대운;김영식
    • 한국통신학회논문지
    • /
    • 제41권3호
    • /
    • pp.307-316
    • /
    • 2016
  • 가역적 데이터 은닉은 원본 이미지에 미치는 영향 없이 임의의 데이터를 숨길 수 있는 기술이다. Zhang은 원본 영상을 암호화하고 암호화된 영상에 데이터를 은닉하는 방법을 제안하였다. 이 때 은닉된 데이터를 추출하기 위해서 먼저 암호화된 영상을 복호화하고, 복호화된 영상의 공간 상관 특성을 나타내는 섭동 함수(Fluctuation Function)를 이용한다. 본 논문에서는 은닉된 데이터를 추출 과정에서 발생하는 오류를 감소시키기 위한 섭동 함수를 제안하고 모의실험을 통해 성능을 검증하였다.

Reversible Data Hiding Scheme for VQ Indices Based on Absolute Difference Trees

  • Chang, Chin-Chen;Nguyen, Thai-Son;Lin, Chia-Chen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권7호
    • /
    • pp.2572-2589
    • /
    • 2014
  • Reversible data hiding is a technique for recovering original images without any distortion after secret data are extracted from the image. The technique continues to attract attention from many researchers. In this paper, we introduce a new reversible data hiding scheme based on the adjacent index differences of vector quantization (VQ) indices. The proposed scheme exploits the differences between two adjacent indices to embed secret data. Experimental results show that our scheme can achieve a lower compression rate than an earlier scheme by Yang and Lin. Our scheme's average compression rate, 0.44 bpp, outperforms that of Yang and Lin's scheme, which averages 0.53 bpp. Moreover, the embedding capacity of our scheme can rise to 1.45 bpi, which also is superior to that of Chang et al.'s scheme [35] (1.00 bpi)Yang and Lin's scheme [27] (0.91 bpi) as well as Chang et al.'s scheme [26] (0.74 bpi).

A Novel Reversible Data Hiding Scheme for VQ-Compressed Images Using Index Set Construction Strategy

  • Qin, Chuan;Chang, Chin-Chen;Chen, Yen-Chang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권8호
    • /
    • pp.2027-2041
    • /
    • 2013
  • In this paper, we propose a novel reversible data hiding scheme in the index tables of the vector quantization (VQ) compressed images based on index set construction strategy. On the sender side, three index sets are constructed, in which the first set and the second set include the indices with greater and less occurrence numbers in the given VQ index table, respectively. The index values in the index table belonging to the second set are added with prefixes from the third set to eliminate the collision with the two derived mapping sets of the first set, and this operation of adding prefixes has data hiding capability additionally. The main data embedding procedure can be achieved easily by mapping the index values in the first set to the corresponding values in the two derived mapping sets. The same three index sets reconstructed on the receiver side ensure the correctness of secret data extraction and the lossless recovery of index table. Experimental results demonstrate the effectiveness of the proposed scheme.

Reversible and High-Capacity Data Hiding in High Quality Medical Images

  • Huang, Li-Chin;Hwang, Min-Shiang;Tseng, Lin-Yu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권1호
    • /
    • pp.132-148
    • /
    • 2013
  • Via the Internet, the information infrastructure of modern health care has already established medical information systems to share electronic health records among patients and health care providers. Data hiding plays an important role to protect medical images. Because modern medical devices have improved, high resolutions of medical images are provided to detect early diseases. The high quality medical images are used to recognize complicated anatomical structures such as soft tissues, muscles, and internal organs to support diagnosis of diseases. For instance, 16-bit depth medical images will provide 65,536 discrete levels to show more details of anatomical structures. In general, the feature of low utilization rate of intensity in 16-bit depth will be utilized to handle overflow/underflow problem. Nowadays, most of data hiding algorithms are still experimenting on 8-bit depth medical images. We proposed a novel reversible data hiding scheme testing on 16-bit depth CT and MRI medical image. And the peak point and zero point of a histogram are applied to embed secret message k bits without salt-and-pepper.

A New Digital Image Steganography Approach Based on The Galois Field GF(pm) Using Graph and Automata

  • Nguyen, Huy Truong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권9호
    • /
    • pp.4788-4813
    • /
    • 2019
  • In this paper, we introduce concepts of optimal and near optimal secret data hiding schemes. We present a new digital image steganography approach based on the Galois field $GF(p^m)$ using graph and automata to design the data hiding scheme of the general form ($k,N,{\lfloor}{\log}_2p^{mn}{\rfloor}$) for binary, gray and palette images with the given assumptions, where k, m, n, N are positive integers and p is prime, show the sufficient conditions for the existence and prove the existence of some optimal and near optimal secret data hiding schemes. These results are derived from the concept of the maximal secret data ratio of embedded bits, the module approach and the fastest optimal parity assignment method proposed by Huy et al. in 2011 and 2013. An application of the schemes to the process of hiding a finite sequence of secret data in an image is also considered. Security analyses and experimental results confirm that our approach can create steganographic schemes which achieve high efficiency in embedding capacity, visual quality, speed as well as security, which are key properties of steganography.

LSB 기법을 이용하는 개선된 오디오 스테가노그래피 (The Improved-Scheme of Audio Steganography using LSB Techniques)

  • 지선수
    • 한국산업정보학회논문지
    • /
    • 제17권5호
    • /
    • pp.37-42
    • /
    • 2012
  • 오디오 스테가노그래피는 오디오 매체(신호)에 암호화된 비밀 메시지를 은닉하여 전송하는 일반적이고, 폭넓게 이용되는 통신기법이다. 인간은 청각시스템의 지각능력의 한계 때문에 커버 오디오 파일과 스테고 오디오 파일의 지각품질(perceptual quality) 차이는 없다. 또한 공격자로부터의 안전성과 견고성 측면에서 LSB 기법은 디지털화된 오디오 신호에 메시지를 삽입하는 효율적이고, 경제적인 방법으로 널리 이용되고 있다. 이 논문에서는 LSB 기법을 기반으로 하고, 디지털화된 비밀 메시지의 비트별 위치를 변경하고, 암호화한 후 커버 오디오 매체에 은닉하는 개선된 방법을 제시한다.

메타데이터 은닉에 기반한 컨텐츠 적응변환 (Content Adaptation based on Metadata Hiding)

  • Jung, Yong-Ju;Kang, Ho-Kyung;Ro, Yong-Man
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2003년도 컴퓨터소사이어티 추계학술대회논문집
    • /
    • pp.31-34
    • /
    • 2003
  • In this paper, we propose an application of data hiding, especially for content adaptation, where one can reduce computational time and get better transcoding results or qualify. Hiding some useful information for content adaptation can help resource tailor to do effective transcoding so that one can achieve lower complexity as well as better quality in content adaptation. Experimental results show that the proposed method based on data hiding gives effectiveness to content adaptation with reasonable subjective quality.

  • PDF

A High Quality Steganographic Method Using Morphing

  • Bagade, Anant M.;Talbar, Sanjay N.
    • Journal of Information Processing Systems
    • /
    • 제10권2호
    • /
    • pp.256-270
    • /
    • 2014
  • A new morphed steganographic algorithm is proposed in this paper. Image security is a challenging problem these days. Steganography is a method of hiding secret data in cover media. The Least Significant Bit is a standard Steganographic method that has some limitations. The limitations are less capacity to hide data, poor stego image quality, and imperceptibility. The proposed algorithm focuses on these limitations. The morphing concept is being used for image steganography to overcome these limitations. The PSNR and standard deviation are considered as a measure to improve stego image quality and morphed image selection, respectively. The stego keys are generated during the morphed steganographic embedding and extracting process. Stego keys are used to embed and extract the secret image. The experimental results, which are based on hiding capacity and PSNR, are presented in this paper. Our research contributes towards creating an improved steganographic method using image morphing. The experimental result indicates that the proposed algorithm achieves an increase in hiding capacity, stego image quality, and imperceptibility. The experimental results were compared with state of the art steganographic methods.

Data Hiding in NTFS Timestamps for Anti-Forensics

  • Cho, Gyu-Sang
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제8권3호
    • /
    • pp.31-40
    • /
    • 2016
  • In this paper, we propose a new anti-forensic method for hiding data in the timestamp of a file in the Windows NTFS filesystem. The main idea of the proposed method is to utilize the 16 least significant bits of the 64 bits in the timestamps. The 64-bit timestamp format represents a number of 100-nanosecond intervals, which are small enough to appear in less than a second, and are not commonly displayed with full precision in the Windows Explorer window or the file browsers of forensic tools. This allows them to be manipulated for other purposes. Every file has $STANDARD_INFORMATION and $FILE_NAME attributes, and each attribute has four timestamps respectively, so we can use 16 bytes to hide data. Without any changes in an original timestamp of "year-month-day hour:min:sec" format, we intentionally put manipulated data into the 16 least significant bits, making the existence of the hidden data in the timestamps difficult to uncover or detect. We demonstrated the applicability and feasibility of the proposed method with a test case.

효율적인 가역 데이터 은닉 기법 (An Efficient Reversible Data Hiding Algorithm)

  • 정수목
    • 서비스연구
    • /
    • 제6권1호
    • /
    • pp.71-81
    • /
    • 2016
  • Cover image에 데이터를 임베딩 하여 stego-image를 생성하고, stego-image로부터 cover image를 손실 없이 복원하며 임베딩 된 데이터를 손실 없이 복원할 수 있는 가역 데이터 은닉기법의 성능을 개선하는 효율적인 기법을 제안하였다. 제안된 기법에서의 임베딩 된 데이터 크기는 이전의 기법에 비하여 더 크고, stego-image의 PSNR값은 48dB보다 더 크게 되는 것이 보장된다. 실험을 통하여 제안된 기법의 성능을 확인하였다.