• 제목/요약/키워드: Data-hiding

검색결과 302건 처리시간 0.021초

EMD를 사용한 BTC 기반의 데이터 은닉 (Data Hiding Based on BTC using EMD)

  • 김천식
    • 한국인터넷방송통신학회논문지
    • /
    • 제14권2호
    • /
    • pp.11-16
    • /
    • 2014
  • BTC는 단색 이미지 데이터의 압축을 위해서 사용되는 최근의 기술이다. BTC의 알고리즘은 평균과 표준편차를 사용하여 구현한다. 데이터 은닉을 위해, 이미지의 비트-구조를 변경하는 과정이 요구된다. 이러한 변경은 BTC 이미지의 질의 성능을 나쁘게 만든다. 따라서, 우리는 데이터 은닉의 성능 개선을 위해서 BTC를 개선한 IODBTC를 제한하였다. 실험 결과 복원한 비밀 메시지가 원본 비밀 메시지와 같음을 증명하였고 제안한 방법이 이전의 스킴에 비해서 좋은 BTC 이미지임을 증명하였다.

Reversible Data Hiding in Block Compressed Sensing Images

  • Li, Ming;Xiao, Di;Zhang, Yushu
    • ETRI Journal
    • /
    • 제38권1호
    • /
    • pp.159-163
    • /
    • 2016
  • Block compressed sensing (BCS) is widely used in image sampling and is an efficient, effective technique. Through the use of BCS, an image can be simultaneously compressed and encrypted. In this paper, a novel reversible data hiding (RDH) method is proposed to embed additional data into BCS images. The proposed method is the first RDH method of its kind for BCS images. Results demonstrate that our approach performs better compared with other state-of-the-art RDH methods on encrypted images.

다중 픽셀 차이값과 LSB 교체 기법을 이용한 이미지 스테가노그래픽 기법 연구 (A Study on the Image Steganographic method using Multi-pixel Differencing and LSB Substitution Methods)

  • 하경주;정기현;유기영
    • 한국산업정보학회논문지
    • /
    • 제13권3호
    • /
    • pp.23-30
    • /
    • 2008
  • A data hiding method based on least significant bit (LSB) substitution and multi-pixel differencing (MPD) is presented on the proposed method to improve the capacity of the hidden secret data and to provide an imperceptible visual quality. First, a sum of different values for four-pixel sub-block is calculated. The low value of the sum can be located on a smooth block and the high value is located on an edged block. The secret data are hidden into the cover image by LSB method in the smooth block, while MPD method in the edged block. The experimental results show that the proposed method has a higher capacity and maintains a good visual quality.

  • PDF

랜덤시퀀스와 Hadamard 행렬을 이용한 디지털 정보은폐 기술에 관한 연구 (A Study on Digital Information Hiding Technique using Random Sequence and Hadamard Matrix)

  • 김장환;김규태;김은수
    • 한국통신학회논문지
    • /
    • 제24권9A호
    • /
    • pp.1339-1345
    • /
    • 1999
  • 본 논문에서는 랜덤시퀀스와 Hadamard 행렬을 이용하여 다중 정보를 은폐시킬 수 있는 새로운 디지털 제안하였다. 기존의 디지털 정보은폐에 사용된 기법은 하나의 랜덤시퀀스를 정보신호에 직접 곱하여 정보신호에 에너지 레벨을 매우 낮춤으로서 불법 이용자로 하여금 은폐된 정보의 검출이나 교란을 어렵게 하였다. 그러나 여러 개의 정보를 동일한 디지털 영상에 은폐시킬 경우에는 직교성이 보장되는 은폐코드를 사용해야 하기 때문에 어느 정도 상관성을 갖는 랜덤시퀀스만으로는 정보은폐가 어렵다. 따라서, 본 논문에서는 랜덤시퀀스의 장점과 더불어 직교성을 갖을 수 있도록 같은 행렬을 곱할 때만 정확한 신호로 추출되는 Hadamard 행렬을 랜덤시퀀스와 함께 사용하여 다수의 은폐정보에 대해서도 정확하게 은폐된 신호를 추출할 수 있는 새로운 디지털 정보은폐 방법을 제안하였다.

  • PDF

데이터 숨김과 오류 내성 기법을 이용한 빠른 비디오 오류 은닉 (A Fast Error Concealment Using a Data Hiding Technique and a Robust Error Resilience for Video)

  • 김진옥
    • 정보처리학회논문지B
    • /
    • 제10B권2호
    • /
    • pp.143-150
    • /
    • 2003
  • 오류 은닉은 데이타 전송시 발생한 오류를 처리하는 데 중요한 역할을 하는 기술로 우수한 데이타 품질을 보이는 다양한 오류 은닉 방법들은 대개 복잡도가 높다. 하지만 복잡한 알고리즘은 실시간 응용 분야에 적용하기 어렵다. 본 연구에서는 오류 내성 기술과 데이터 숨김 기법을 이용하여 디코더의 오류 은닉 부담을 줄이는 방법을 제안한다. 이를 위해 공간적 오류 내성 인코딩 방법으로써 손실 블록의 확산을 막는 블록 인터리빙을 적용하며, 시간적 오류 내성 방법으로는 움직임 벡터의 손실을 확인할 수 있는 패리티 비트를 데이터 숨김 방법을 이용하여 디코더로 전송하는 구조를 적응한다. 또한 전송 비디오 블록의 경계선 특징을 미리 추출한 후 이 데이터를 데이터 숨김을 통해 디코더로 전달하여 비디오 데이터가 전송시 손상되면 전달된 특징을 이용하여 은닉 처리함으로써 디코더에서 오류 은닉시 손실 정보를 주변 블록으로부터 예측해야 하는 과정을 줄여 계산 복잡도를 낮춘다. 본 연구에서 제안한 움직임 벡터 확인 패리티 비트와 블록 경계선 특징 데이터를 전송 블록에 데이터 숨김방법으로 전송하는 것은 표준 인코더의 복잡도에 큰 영향을 미치지 않는다. 제안 오류 은닉 방법이 인터넷과 같이 버스트 오류가 많은 채널에서도 디코더에서 전송 오류를 효과적으로 빠르게 처리함을 실험 결과를 통해 알 수 있다.

Reversible Watermarking Method Using Optimal Histogram Pair Shifting Based on Prediction and Sorting

  • Hwang, Hee-Joon;Kim, Hyoung-Joong;Sachnev, Vasiliy;Joo, Sang-Hyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제4권4호
    • /
    • pp.655-670
    • /
    • 2010
  • To be reversible as a data hiding method, the original content and hidden message should be completely recovered. One important objective of this approach is to achieve high embedding capacity and low distortion. Using predicted errors is very effective for increasing the embedding capacity. Sorting the predicted errors has a good influence on decreasing distortion. In this paper, we present an improved reversible data hiding scheme using upgraded histogram shifting based on sorting the predicted errors. This new scheme is characterized by the algorithm which is able to find the optimum threshold values and manage the location map effectively. Experimental results compared with other methods are presented to demonstrate the superiority of the proposed method.

Indicator Elimination for Locally Adaptive Scheme Using Data Hiding Technique

  • Chang, Hon-Hang;Chou, Yung-Chen;Shih, Timothy K.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권12호
    • /
    • pp.4624-4642
    • /
    • 2014
  • Image compression is a popular research issue that focuses on the problems of reducing the size of multimedia files. Vector Quantization (VQ) is a well-known lossy compression method which can significantly reduce the size of a digital image while maintaining acceptable visual quality. A locally adaptive scheme (LAS) was proposed to improve the compression rate of VQ in 1997. However, a LAS needs extra indicators to indicate the sources, consequently the compression rate of LAS will be affected. In this paper, we propose a novel method to eliminate the LAS indicators and so improve the compression rate. The proposed method uses the concept of data hiding to conceal the indicators, thus further improving the compression rate of LAS. From experimental results, it is clearly demonstrated that the proposed method can actually eliminate the extra indicators while successfully improving the compression rate of the LAS.

Data Hiding in Halftone Images by XOR Block-Wise Operation with Difference Minimization

  • Yang, Ching-Nung;Ye, Guo-Cin;Kim, Cheon-Shik
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권2호
    • /
    • pp.457-476
    • /
    • 2011
  • This paper presents an improved XOR-based Data Hiding Scheme (XDHS) to hide a halftone image in more than two halftone stego images. The hamming weight and hamming distance is a very important parameter affecting the quality of a halftone image. For this reason, we proposed a method that involves minimizing the hamming weights and hamming distances between the stego image and cover image in $2{\times}2$-pixel grids. Moreover, our XDHS adopts a block-wise operation to improve the quality of a halftone image and stego images. Furthermore, our scheme improves security by using a block-wise operation with A-patterns and B-patterns. Our XDHS method achieves a high quality with good security compared to the prior arts. An experiment verified the superiority of our XDHS compared with previous methods.

Image Steganography to Hide Unlimited Secret Text Size

  • Almazaydeh, Wa'el Ibrahim A.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.73-82
    • /
    • 2022
  • This paper shows the hiding process of unlimited secret text size in an image using three methods: the first method is the traditional method in steganography that based on the concealing the binary value of the text using the least significant bits method, the second method is a new method to hide the data in an image based on Exclusive OR process and the third one is a new method for hiding the binary data of the text into an image (that may be grayscale or RGB images) using Exclusive and Huffman Coding. The new methods shows the hiding process of unlimited text size (data) in an image. Peak Signal to Noise Ratio (PSNR) is applied in the research to simulate the results.

New Text Steganography Technique Based on Part-of-Speech Tagging and Format-Preserving Encryption

  • Mohammed Abdul Majeed;Rossilawati Sulaiman;Zarina Shukur
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권1호
    • /
    • pp.170-191
    • /
    • 2024
  • The transmission of confidential data using cover media is called steganography. The three requirements of any effective steganography system are high embedding capacity, security, and imperceptibility. The text file's structure, which makes syntax and grammar more visually obvious than in other media, contributes to its poor imperceptibility. Text steganography is regarded as the most challenging carrier to hide secret data because of its insufficient redundant data compared to other digital objects. Unicode characters, especially non-printing or invisible, are employed for hiding data by mapping a specific amount of secret data bits in each character and inserting the character into cover text spaces. These characters are known with limited spaces to embed secret data. Current studies that used Unicode characters in text steganography focused on increasing the data hiding capacity with insufficient redundant data in a text file. A sequential embedding pattern is often selected and included in all available positions in the cover text. This embedding pattern negatively affects the text steganography system's imperceptibility and security. Thus, this study attempts to solve these limitations using the Part-of-speech (POS) tagging technique combined with the randomization concept in data hiding. Combining these two techniques allows inserting the Unicode characters in randomized patterns with specific positions in the cover text to increase data hiding capacity with minimum effects on imperceptibility and security. Format-preserving encryption (FPE) is also used to encrypt a secret message without changing its size before the embedding processes. By comparing the proposed technique to already existing ones, the results demonstrate that it fulfils the cover file's capacity, imperceptibility, and security requirements.