• Title/Summary/Keyword: steganography

Search Result 194, Processing Time 0.021 seconds

Advanced Changing Partners Techinque in Reversible Steganography (확장된 파트너 교환을 이용한 복원 가능한 정보 숨김 기술)

  • Woo, Jae-Hyeon;Kim, Hyoung-Joong;Sachnev, vasiliy;Choi, Su-Jeong
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2007.02a
    • /
    • pp.87-90
    • /
    • 2007
  • 기존의 Steganography는 정보를 숨김에 있어 히스토그램을 shifting 하거나 픽셀간의 상관관계를 변형하는 등 다양한 방식이 제안되었다. 그런 논문들이 가지고 있던 용량적 한계를 일부 극복하고, PSNR을 고려하여 새로운 방식을 제안한다. 소개하는 기술은 두 색깔을 파트너로 맺어, 숨김 비트에 따라 서로 파트너로 바뀌도록 설계되었다. 숨긴 용량의 크기와PSNR의 변화를 실험 결과에서 볼 수 있으며, 이는 기존 논문과의 비교를 통해 효율성이 입증된다.

  • PDF

Steganography based Multi-modal Biometrics System (다중생체시스템에 기반한 스테가노그래피)

  • Yu Byeong-Jin;Go Hyeon-Ju;Lee Dae-Jong;Jeon Myeong-Geun
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2006.05a
    • /
    • pp.148-151
    • /
    • 2006
  • 본 논문에서 얼굴과 홍채 데이터를 사용하여 다중생체시스템에 기반한 스테가노그라피 구현을 제안한다. 이를 위해, 얼굴과 홍채 인식 기반의 다중생체인식을 구성하였다. 여기서, 홍채의 특징벡터는 디지털 워터마킹 기법을 이용하여 얼굴 이미지 안에 숨기게 된다. 얼굴과 홍채의 인식시스템은 퍼지집합 이론과 LDA 기법이 결합하여 확장한 Fuzzy-LDA(Fuzzy-Based Linear Discriminant Analysis)기법을 제안한다. 최종적으로 디지털 워터마킹 기법을 적용하여 얼굴이미지 안에 홍채 정보를 삽입하고 얼굴 데이터와 홍채 데이터를 통한 다중생체인식을 구성하였으며, 최종적으로 생체데이터 인식율의 ROC 곡선을 통해 제안된 워터마킹 기법의 좋은 성능을 확인하였고, 얼굴 인식율을 통해 워터마킹된 얼굴 영상과 원본 얼굴 영상을 비교하였다. 다양한 실험을 통해 제안된 기법이 다중생체시스템을 보호하고 효과적으로 사용 될 수 있음을 확인 할 수 있다.

  • PDF

Enhancing LSB Method Performance Using Secret Message Segmentation

  • Khrisat, Mohammad S.;Alqadi, Ziad A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.383-388
    • /
    • 2022
  • Many methods used for secret data steganography are based on least significant bit method, which is suffering from security and the embedded message can be easily hacked. In this paper research a proposed method of adding security issues will be introduced, a complex private key will be constructed, the contents of this key will depend on the results of secrete message segmentation. The proposed method will be implemented and the obtained experimental results will be compared with least significant method results to prove that the proposed method raises the image quality parameters.

Experimental Verification of the Versatility of SPAM-based Image Steganalysis (SPAM 기반 영상 스테그아날리시스의 범용성에 대한 실험적 검증)

  • Kim, Jaeyoung;Park, Hanhoon;Park, Jong-Il
    • Journal of Broadcast Engineering
    • /
    • v.23 no.4
    • /
    • pp.526-535
    • /
    • 2018
  • Many steganography algorithms have been studied, and steganalysis for detecting stego images which steganography is applied to has also been studied in parallel. Especially, in the case of the image steganalysis, the features such as ALE, SPAM, and SRMQ are extracted from the statistical characteristics of the image, and stego images are classified by learning the classifier using various machine learning algorithms. However, these studies did not consider the effect of image size, aspect ratio, or message-embedding rate, and thus the features might not function normally for images with conditions different from those used in the their studies. In this paper, we analyze the classification rate of the SPAM-based image stegnalysis against variety image sizes aspect ratios and message-embedding rates and verify its versatility.

The Large Capacity Steganography Using Adaptive Threshold on Bit Planes (비트 플레인별 적응적 임계값을 이용한 대용량 스테가노그라피)

  • Lee, Sin-Joo;Jung, Sung-Hwan
    • The KIPS Transactions:PartB
    • /
    • v.11B no.4
    • /
    • pp.395-402
    • /
    • 2004
  • In this paper, we proposed a new method of the large capacity steganography using adaptive threshold on bit planes. Applying fixing threshold, if we insert information into all bit planes, all bit planes showed different image quality. Therefore, we first defined the bit plane weight to solve the fixing threshold problem. We then proposed a new adaptive threshold method using the bit plane weight and the average complexity to increase insertion capacity adaptively. In the experiment, we inserted information into the standard images with the same image quality and same insertion capacity, and we analyzed the insertion capacity and image duality. As a result, the proposed method increased the insertion capacity of about 6% and improved the image quality of about 24dB than fixed threshold method.

Ransomware Prevention and Steganography Security Enhancement Technology Using Format Preserving Encryption (형태보존암호화를 이용한 랜섬웨어 방지 및 스테가노그래피 보안강화기술)

  • Lim, Ji-hwan;Na, Gwan-Woo;Woo, Jae-Min;Seo, Hwa-joeng
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.5
    • /
    • pp.805-811
    • /
    • 2018
  • Recently, Format-Preserving-Encryption (FEA) was suggested by the National Security Research institute (NSR) as an encryption method while maintaining the format without a distortion to the intended information to be encrypted. In this paper, we propose a scheme to solve conventional cyber security problems by using FEA scheme. First, we present the method to encrypt signatures and extensions with FEA in order to effectively defend against Ransomeware attacks. This technique can mitigate the exposure to the Ransomeware by encrypting the minimum information. Second, in order to reduce the secret information for Steganography, we introduce a new way to minimize the secret information with FEA. Finally, we compare the operation speed by encryption with FEA and Lightweight Encryption Algorithm (LEA), furthermore when we optimize FEA we want to compare with the performance improvement accompanying with it.

Private Key Management Scheme Using Secret Sharing and Steganography (비밀 분산 및 스테가노그래피를 이용한 개인 키 보관 기법)

  • Lee, Jaeheung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.35-41
    • /
    • 2017
  • This paper introduces a new method for storing a private key. This method can be achieved by dividing the private key into "n" pieces by a (k, n) secret sharing method, and then storing each piece into photo files utilizing a steganography method. In this way, a user can restore a private key as long as he can remember the locations of "k" photos among the entire photo files. Attackers, meanwhile, will find it extremely difficult to extract the private key if a user has hidden the pieces of the private key into numerous photo files stored in the system. It also provides a high degree of user convenience, as the user can restore the private key from his memory of k positions among n photo files. Coupled with this, a certain level of security can be guaranteed because the attacker cannot restore a private key, even if he knows k-1 photo file locations.

Adaptive LSB Steganography for High Capacity in Spatial Color Images (컬러이미지 대상 고용량 적응형 LSB 스테가노그라피)

  • Lee, Haeyoung
    • Journal of the Korea Computer Graphics Society
    • /
    • v.24 no.1
    • /
    • pp.27-33
    • /
    • 2018
  • This paper presents a new adaptive LSB steganography for high capacity in spatial color images. The number of least signi ficant bit (LSB) of each RGB component in a color image pixel, to replace with the data bits to be hidden, was determine d through analysis of the worst case peak signal noise ratio (PSNR). In addition, the combination of the number of bits is determined adaptively according to image content. That is, 70% of the data to be hidden is proposed to be replaced with 3 bit LSB of two components, 2 bit LSB of the rest component, and 30% be replaced with 4 bit LSB of each RGB compon ent. To find edge areas in an image, delta sorting in local area is also suggested. Using the proposed method, the data cap acity is 9.2 bits per pixel (bpp). The average PSNR value of the tested images with concealed data of up to 60Kbyte was 43.9 db and also natural histograms were generated.

An Effective Mixed Steganography Based on LSB and LDR (LSB와 LDR을 기반한 효과적인 혼합 스테가노그래피)

  • Ji, Seon-Su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.6
    • /
    • pp.561-566
    • /
    • 2019
  • In the Internet space, integrity and security must be maintained for secure and confidential communication, which ensures reliability between sender and receiver. Cryptography is an important factor in maintaining robustness against external attacks. For this purpose, encryption and steganography methods are used. Steganography is a method of hiding confidential information without making statistically significant changes to digital media. I propose a method of transforming the Hangul-Jamo consisting of choseong, jungseong and jongseong, and inserting them into RGB pixel values of the cover image. In order to improve security, a new blending method was used to hide the altered information in the lowest region. In this case, a mixture of LSB and LDR techniques was applied. PSNR was calculated for image quality. The PSNR of the proposed method is 43.225dB, which satisfies the lowest level.

A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption

  • Muhammad, Khan;Ahmad, Jamil;Farman, Haleem;Jan, Zahoor;Sajjad, Muhammad;Baik, Sung Wook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1938-1962
    • /
    • 2015
  • Security of information during transmission is a major issue in this modern era. All of the communicating bodies want confidentiality, integrity, and authenticity of their secret information. Researchers have presented various schemes to cope with these Internet security issues. In this context, both steganography and cryptography can be used effectively. However, major limitation in the existing steganographic methods is the low-quality output stego images, which consequently results in the lack of security. To cope with these issues, we present an efficient method for RGB images based on gray level modification (GLM) and multi-level encryption (MLE). The secret key and secret data is encrypted using MLE algorithm before mapping it to the grey-levels of the cover image. Then, a transposition function is applied on cover image prior to data hiding. The usage of transpose, secret key, MLE, and GLM adds four different levels of security to the proposed algorithm, making it very difficult for a malicious user to extract the original secret information. The proposed method is evaluated both quantitatively and qualitatively. The experimental results, compared with several state-of-the-art algorithms, show that the proposed algorithm not only enhances the quality of stego images but also provides multiple levels of security, which can significantly misguide image steganalysis and makes the attack on this algorithm more challenging.