• Title/Summary/Keyword: steganography

Search Result 194, Processing Time 0.024 seconds

Hiding Secret Data in an Image Using Codeword Imitation

  • Wang, Zhi-Hui;Chang, Chin-Chen;Tsai, Pei-Yu
    • Journal of Information Processing Systems
    • /
    • v.6 no.4
    • /
    • pp.435-452
    • /
    • 2010
  • This paper proposes a novel reversible data hiding scheme based on a Vector Quantization (VQ) codebook. The proposed scheme uses the principle component analysis (PCA) algorithm to sort the codebook and to find two similar codewords of an image block. According to the secret to be embedded and the difference between those two similar codewords, the original image block is transformed into a difference number table. Finally, this table is compressed by entropy coding and sent to the receiver. The experimental results demonstrate that the proposed scheme can achieve greater hiding capacity, about five bits per index, with an acceptable bit rate. At the receiver end, after the compressed code has been decoded, the image can be recovered to a VQ compressed image.

Implementation of Digital Contents Safety Trade System using Encryption Technology (암호 기술을 이용한 디지털 콘텐츠 안전 거래 시스템 구현)

  • Yang, Jeong Mo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.4
    • /
    • pp.119-125
    • /
    • 2013
  • The amount of digital content grows exponentially by the development of the internet and the change of computing environments and the target also is getting wider. The industry using this digital content has been growing greatly. However, the distribution of pirated digital content is increasing using internet because digital content is easy to store and transmit and the damage is growing. In this paper, we propose safety trading system which can conceal the author's information safely in digital content in order to block illegal distribution of digital content. ARIA encryption algorithm is used to protect the concealed information of author in digital content and it is a help to track the illegal traders by doing fingerprinting of buyer information to digital content and managing the transaction information. The technical support for copyright dispute is to allow by providing the capability to verify illegal edit to original digital contents.

The Method to Estimate Quality Degradation from Information Hiding in JPEG Compression Environment (JPEG 압축 환경의 정보은닉에서 영상 질 저하 예측방법)

  • Choi, Yong-Soo;Kim, Hyoung-Joong;Lee, Dal-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.551-555
    • /
    • 2008
  • In these days, compressed file is useful in internet environment and has many advantages. So a lot of data hiding algorithms works on JPEG compressed file. Of course they know basic rules of transformation and quantization and they utilize those rules to implement their programming. But most of them evaluate the affection of data hiding after data modification. We propose how to predict the affection of data modification in course of data hiding process. Through some kind of experiments, several valuable facts are revealed which used in data hiding in compressed domain such as JPEG. These facts will improve existing data hiding algorithms (F3, F4 and F5 which including Matrix Encoding)[1],[5],[6].

  • PDF

A Data Hiding Method of Binary Images Using Pixel-value Weighting (이진 이미지에 대한 픽셀값 가중치를 이용한 자료 은닉 기법 연구)

  • Jung, Ki-Hyun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.4
    • /
    • pp.68-75
    • /
    • 2008
  • This paper proposes a new data hiding method for binary images using the weighting value of pixel-value differencing. The binary cover image is partitioned into non-overlapping sub-blocks and find the most suitable position to embed a secret bit for each sub-block. The proposed method calculates the weighted value for a sub-block to pivot a pixel to be changed. This improves the image quality of the stego-image. The experimental results show that the proposed method achieves a good visual quality and high capacity.

A Study on the Application of Steganography for Moving Picture Caption Information (동영상 자막 정보를 위한 스테가노그래피 적용에 관한 연구)

  • Ham, Jun-Sick;Ryou, Hwang-Bin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.883-886
    • /
    • 2002
  • 인터넷의 시대에 들어오게 되면서 현대는 무한한 정보바다의 물결에 휩쓸려가고 있으며 이러한 경향과 더불어 멀티미디어 데이터의 양도 급격히 늘어나고 있다. 인터넷의 가장 큰 특징이자 장점인 접근 가능성은 무제한으로 어떠한 정보 컨텐츠라도 이용 가능하게 한다. 그렇지만 접근 가능성은 누구나 쉽게 디지털 정보의 복제를 가능하게 함으로써 타인의 지적 재산권에 침해를 줄 수 있게 되었다. 이를 해결하기 위한 방법으로 워터마크 연구가 활발히 이루어지고 있다. 본 논문에서는 동영상 자막 정보인 SMI 파일을 동영상 내에 숨기는 방법을 이용하여 자막 정보 및 동영상 정보의 저작권 및 무결성 보호를 하고자 한다. 본 논문에서는 자막 정보를 분리, 암호화하여 동영상 내의 프레임에 삽입하는 방법을 제시한다. 동영상에 영향을 미치지 않는 각 프레임 내의 최하위 비트에 자막 정보를 삽입하여 다른 사람들이 동영상을 편집한 경우에는 자막 정보를 제공받지 못하도록 한다.

  • PDF

Steganography-based Product Information Representation Scheme for Digital Signage (은닉형 광고 디스플레이 제품 정보 표현 기법)

  • Choi, Young-Hwan;Hwang, Eenjun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.378-381
    • /
    • 2012
  • 최근 들어, 정보 광고 디스플레이 (Digital Signage)는 영상 재현 및 IT 기술 발전으로 비약적 성장을 거듭하고 있다. 기업들의 마케팅이나 광고, 트레이닝 효과 및 고객 경험을 유도할 수 있는 커뮤니케이션 도구로써 공항이나 호텔, 병원 등 공공 장소에서 방송 프로그램뿐 아니라 특정한 정보를 함께 제공하는 디지털 영상 장치로써 다양하게 사용되고 있다. 현재는 기존 상업용 디지털 정보 디스플레이(DID)에 주요 기능을 제어할 수 있는 소프트웨어나 관리 플랫폼까지 종합적으로 공급하는 형태로 시장에 공급되고 있다. 현재 거의 대부분의 프로그램은 플래시를 이용하여 정보를 일방적으로 전달하는 모습을 하고 있어 사용자의 요구나 다양한 정보의 표현에 제약이 많았다. 본 논문에서는 사용자와의 쌍방향 통신을 유도를 통하여 광고의 예술성뿐 아니라 정보제공의 기능까지도 동시에 만족시킬 수 있는 은닉형 광고 디스플레이 제품 정보 표현 기법을 제안한다. 구체적으로 예로써 Histogram shifting 을 이용한 QR 코드 은닉을 통해 영상에서 사용자가 원하는 제품에 대한 QR 코드를 숨기고 표출하는 방법을 보인다.

IoT and Smart City Technology: Challenges, Opportunities, and Solutions

  • Jeong, Young-Sik;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.15 no.2
    • /
    • pp.233-238
    • /
    • 2019
  • Internet of Things (IoT) technology has been recently utilized in diverse fields. Smart city is one of the IoT application domains with a lot of research topics and which is operated by integrated IoT applications. In this paper, diverse kinds of solutions, processes, and frameworks to address the existing challenges in information technology are introduced. Such solutions involve various future track topics including blockchain, security, steganography, optimization, machine learning, smart system, and so on. In the subsequent paragraphs, we describe each topic in a summarized way in terms of the existing challenges and their solutions. Specifically, this paper introduced 18 novel and enhanced research studies from different countries in the world. We present diverse kinds of paradigms to subjects that tackle diverse kinds of research areas such as IoT and Smart City, and so on.

Hierarchical CNN-Based Senary Classification of Steganographic Algorithms (계층적 CNN 기반 스테가노그래피 알고리즘의 6진 분류)

  • Kang, Sanhoon;Park, Hanhoon
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.4
    • /
    • pp.550-557
    • /
    • 2021
  • Image steganalysis is a technique for detecting images with steganographic algorithms applied, called stego images. With state-of-the-art CNN-based steganalysis methods, we can detect stego images with high accuracy, but it is not possible to know which steganographic algorithm is used. Identifying stego images is essential for extracting embedded data. In this paper, as the first step for extracting data from stego images, we propose a hierarchical CNN structure for senary classification of steganographic algorithms. The hierarchical CNN structure consists of multiple CNN networks which are trained to classify each steganographic algorithm and performs binary or ternary classification. Thus, it classifies multiple steganogrphic algorithms hierarchically and stepwise, rather than classifying them at the same time. In experiments of comparing with several conventional methods, including those of classifying multiple steganographic algorithms at the same time, it is verified that using the hierarchical CNN structure can greatly improve the classification accuracy.

A Systematic Literature Review on Security Challenges In Image Encryption Algorithms for Medical Images

  • Almalki, Nora;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.75-82
    • /
    • 2022
  • Medical data is one of the data that must be kept in safe containers, far from intrusion, viewing and modification. With the technological developments in hospital systems and the use of cloud computing, it has become necessary to save, encrypt and even hide data from the eyes of attackers. Medical data includes medical images, whether they are x-ray images of patients or others, or even documents that have been saved in the image format. In this review, we review the latest research and the latest tools and algorithms that are used to protect, encrypt and hide these images, and discuss the most important challenges facing these areas.

A Study on Steganography for Block Illegal Use of Digital Multimedia Content (디지털 멀티미디어 컨텐츠 불법 사용 차단을 위한 스테가노그라피 연구)

  • Kim, Dae-Kyeong;Lee, Sang-Soon;Lee, Byung-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.788-791
    • /
    • 2010
  • 본 연구는 디지털 멀티미디어 컨텐츠에 대한 불법 사용 차단 및 저작권 보호 기술에 대한 연구이다. 본 연구 주제와 관련해서 스테가노그라피 기술 자체에 대한 연구와 저작권을 위한 워터마킹 기술, 정당한 수신자의 권리를 위한 스크램블링 연구로 나뉜다. 본 논문은 저작권 증명, 원본 증명, 정보 추출, 정보 은닉을 위해 활용되어질 수 있는 스테가노그라피 기술을 다룬다.