• Title/Summary/Keyword: HIDE

Search Result 327, Processing Time 0.022 seconds

Image Steganography and Its Discrimination (영상 스테가노그래피의 개념과 판별)

  • Lee, Jae Hoon;Kim, Chanran;Lee, Sang Hwa;Park, Jong-Il
    • Journal of Broadcast Engineering
    • /
    • v.23 no.4
    • /
    • pp.462-473
    • /
    • 2018
  • Steganography is to hide information in a media data so naturally that the other users can not notice the existence of hidden information. Data encryption focuses on the complex encoding methods of information data in order to make it difficult to decode the information even though the other users notice the existence of information. On the other hand, steganography methods concentrate on natural hiding information into other media. Since the other users do not recognize the existence of hidden information, the information can be better protected. This paper introduces the concept of image steganography that an image information is concealed into another image (cover image), and proposes a new discrimination method of steganography. This paper explains the spatial methods with LSB manipulation and frequency methods using DCT coefficients. Finally, this paper proposes a new discrimination method of image steganography by inspecting that an image information is correctly decoded.

Efficient Metadata Management Scheme in NAND Flash based Storage Device (플래시 메모리기반 저장장치에서 효율적 메타데이터 관리 기법)

  • Kim, Dongwook;Kang, Sooyong
    • Journal of Digital Contents Society
    • /
    • v.16 no.4
    • /
    • pp.535-543
    • /
    • 2015
  • Recently, NAND flash based storage devices are being used as a storage device in various fields through hiding the limitations of NAND flash memory and maximizing the advantages. In particular, those storage devices contain a software layer called Flash Translation Layer(FTL) to hide the "erase-before-write" characteristics of NAND flash memory. FTL includes the metadata for managing the data requested from host. That metadata is stored in internal memory because metadata is very frequently accessed data for processing the requests from host. Thus, if the power-loss occurs, all data in memory is lost. So metadata management scheme is necessary to store the metadata periodically and to load the metadata in the initialization step. Therefore we proposed the scheme which satisfies the core requirements for metadata management and efficient operation. And we verified the efficiency of proposed scheme by experiments.

Fast Multi-Phase Packet Classification Architecture using Internal Buffer and Single Entry Caching (내부 버퍼와 단일 엔트리 캐슁을 이용한 다단계 패킷 분류 가속화 구조)

  • Kang, Dae-In;Park, Hyun-Tae;Kim, Hyun-Sik;Kang, Sung-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.9
    • /
    • pp.38-45
    • /
    • 2007
  • With the emergence of new applications, packet classification is essential for supporting advanced internet applications, such as network security and QoS provisioning. As the packet classification on multiple-fields is a difficult and time consuming problem, internet routers need to classify incoming packet quickly into flows. In this paper, we present multi-phase packet classification architecture using an internal buffer for fast packet processing. Using internal buffer between address pair searching phase and remained fields searching phases, we can hide latency from the characteristic that search times of source and destination header fields are different. Moreover we guarantee the improvement by using single entry caching. The proposed architecture is easy to apply to different needs owing to its simplicity and generality.

Steganographic Model based on Low bit Encoding for VoIP (VoIP 환경을 위한 Low bit Encoding 스테가노그라픽 모델)

  • Kim, Young-Mi
    • Journal of Internet Computing and Services
    • /
    • v.8 no.5
    • /
    • pp.141-150
    • /
    • 2007
  • This paper proposes new Steganographic model for VoIP that has very effective method using low bit encoding. Most of Steganographic models using Low bit Encoding have two disadvantages; one is that the existence of hidden secret message can be easily detected by auditory, the other is that the capacity of stego data is low. To solve these problems, this method embed more than one bit in inaudible range, so this method can improve the capacity of the hidden message in cover data. The embedding bit position is determined by using a pseudo random number generator which has seed with remaining message length, so it is hard to detect the stego data produced by the proposed method. This proposed model is able to use not only to communicate wave file with hidden message in VoIP environment but also to hide vary information which is user basic information, authentication system, etc.

  • PDF

High-Capacity Robust Image Steganography via Adversarial Network

  • Chen, Beijing;Wang, Jiaxin;Chen, Yingyue;Jin, Zilong;Shim, Hiuk Jae;Shi, Yun-Qing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.366-381
    • /
    • 2020
  • Steganography has been successfully employed in various applications, e.g., copyright control of materials, smart identity cards, video error correction during transmission, etc. Deep learning-based steganography models can hide information adaptively through network learning, and they draw much more attention. However, the capacity, security, and robustness of the existing deep learning-based steganography models are still not fully satisfactory. In this paper, three models for different cases, i.e., a basic model, a secure model, a secure and robust model, have been proposed for different cases. In the basic model, the functions of high-capacity secret information hiding and extraction have been realized through an encoding network and a decoding network respectively. The high-capacity steganography is implemented by hiding a secret image into a carrier image having the same resolution with the help of concat operations, InceptionBlock and convolutional layers. Moreover, the secret image is hidden into the channel B of carrier image only to resolve the problem of color distortion. In the secure model, to enhance the security of the basic model, a steganalysis network has been added into the basic model to form an adversarial network. In the secure and robust model, an attack network has been inserted into the secure model to improve its robustness further. The experimental results have demonstrated that the proposed secure model and the secure and robust model have an overall better performance than some existing high-capacity deep learning-based steganography models. The secure model performs best in invisibility and security. The secure and robust model is the most robust against some attacks.

Applications of Image Steganography Using Secret Quantization Ranges (비밀 양자화 범위를 이용한 화상 심층암호 응용)

  • Shin Sang-Uk;Park Young-Ran
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.3
    • /
    • pp.379-388
    • /
    • 2005
  • Image steganography Is a secret communication scheme to transmit a secret message, which is embedded into an image. The original image and the embedded image are called the cover image and the stego image, respectively. In other words, a sender embeds a secret message into a cover image and transmits a stego image to a receiver, while the receiver takes the stego image, extracts the message from it, and reads the message. General requirements for steganography are great capacity of secret messages, imperceptibility of stego images, and confidentiality between a sender and a receiver. In this paper, we propose a method for being satisfied with three requirements. In order to hide a secret message into a cover image safely, we use a difference value of two consecutive pixels and a secret quantization range. The former is used for the imperceptibility and the latter for the confidentiality. Furthermore, the number of insertion bits is changed according to the difference value for the imperceptibility. Through experiments, we have shown that our method is more good quality of stego images than many other related methods and increases the amount o( message insertion by performing dual insertion processing for some pixels.

  • PDF

A Targeted Counter-Forensics Method for SIFT-Based Copy-Move Forgery Detection (SIFT 기반 카피-무브 위조 검출에 대한 타켓 카운터-포렌식 기법)

  • Doyoddorj, Munkhbaatar;Rhee, Kyung-Hyune
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.5
    • /
    • pp.163-172
    • /
    • 2014
  • The Scale Invariant Feature Transform (SIFT) has been widely used in a lot of applications for image feature matching. Such a transform allows us to strong matching ability, stability in rotation, and scaling with the variety of different scales. Recently, it has been made one of the most successful algorithms in the research areas of copy-move forgery detections. Though this transform is capable of identifying copy-move forgery, it does not widely address the possibility that counter-forensics operations may be designed and used to hide the evidence of image tampering. In this paper, we propose a targeted counter-forensics method for impeding SIFT-based copy-move forgery detection by applying a semantically admissible distortion in the processing tool. The proposed method allows the attacker to delude a similarity matching process and conceal the traces left by a modification of SIFT keypoints, while maintaining a high fidelity between the processed images and original ones under the semantic constraints. The efficiency of the proposed method is supported by several experiments on the test images with various parameter settings.

Implementation of StegoWaveK using an Improved Lowbit Encoding Method (개선된 Lowbit Encoding 방법을 이용한 StegoWavek의 구현)

  • 김영실;김영미;백두권
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.4
    • /
    • pp.470-485
    • /
    • 2003
  • The steganography is one of methods that users can hide data. Some steganography softwares use audio data among multimedia data. However, these commercialized audio steganography softwares have disadvantages that the existence of hidden messages can or easily recognized visually and only certain-sized data can be hidden. To solve these problems, this study suggested, designed and implemented Dynamic Message Embedding (DME) algorithm. Also, to improve the security level of the secret message, the file encryption algorithm has been applied. Through these, StegoWaveK system that performs audio steganography was designed and implemented. Then, the suggested system and the commercialized audio steganography system were compared and analyzed on criteria of the Human Visilable System (HVS), Human Auditory System (HAS), Statistical Analysis (SA), and Audio Measurement (AM).

A Study on Fashion Design of Silver Age -Focused on Elderly Women's Clothing Design Preference : An Application of Delphi Method- (실버패션디자인 연구 - 노년여성의 의복디자인선호도를 중심으로: 델파이법의 적용 -)

  • Chang, An-Hua
    • Fashion & Textile Research Journal
    • /
    • v.7 no.6
    • /
    • pp.577-584
    • /
    • 2005
  • The aims of this study are primary data offer to silver fashion enterprise. In order to deduce design from diverse needs of silver generation, this study is required expert knowledge. For this purpose, this study applied two rounded Delphi method in which 31 experts. As a result, the following findings were obtained; From the previous studies, we found the physical changes of women in silver generation; i.e. the size of their waist and abdomen gets larger, their breasts are sagging, their limbs are thinner, upper body is bending, their height and weight get shorter and lighter. Their choice criterion of design of clothing is hide their weak points in body, youthfulness, moderate, and fashion style. Youthful design but patterns should agree with their body line so that they should be easily fit and look young. They like a jacket and pants set best regardless of spring or summer and as upper garment, they like semi fit, as pants, they prefer straight line of ankle length, and as skirts, partial elastic band and pleats, and the length of the skirts just cover their knees. This pattern in choosing their clothes represents they consider functionality as well as the aesthetics. Their preferred color for spring is lt/pink, lt/violet lt/green for summer, white and blue. Their preferred materials are wool/poly/spandex and cotton/spandex for functionality for spring, and for summer, linen poly and cotton poly seersucker for cool feeling and stability. In both top and bottom item, solid pattern follows small one in their preference on patterns, which shows that they are in pursuit of an elegant style. Our research based on this survey tries to establish what the fashion design for the silver generation should take into consideration.

Emotion Research of Paper-like E-ink E-book (종이같은 E-ink 전자책의 감성연구)

  • Park, YungKyung;Lee, Hye-Mi;Lee, Seol-Hee
    • Science of Emotion and Sensibility
    • /
    • v.18 no.4
    • /
    • pp.119-128
    • /
    • 2015
  • The demand of reflective display devices are increasing by widespread of electronic books. In this study, the emotional and reading state for reading material of paper books, reflective display, and LCD display were compared to each other. In order to determine the consumers' sensibility of E-ink e-book the emotional assessment of three different types of books was evaluated following with readability assessment and preference experiment. These experiments controlled contents on the screen by using masks to hide hardware aspects of contents. The results of the sensibility reactions by emotional-vocabulary-experiment using semantic scale show that E-ink is closer to paper than LCD. The readability and preference questionnaire for the experimental results show that e-ink is preferred than LCD and paper was preferred or seem similar to E-ink. The conclusions shows that E-ink and paper has similar sensibility and E-ink e-book is expected to replace paper books.