DOI QR코드

DOI QR Code

A New Information Data Hiding Scheme based on Pattern Information of Secret Data

비밀데이터의 패턴정보에 기반한 새로운 정보은닉 기법

  • 김기종 (영진전문대학 컴퓨터정보계열) ;
  • 신상호 (경북대학교 전자전기컴퓨터학부) ;
  • 유기영 (경북대학교 컴퓨터학부)
  • Received : 2011.10.18
  • Accepted : 2012.02.01
  • Published : 2012.04.30

Abstract

This paper proposes a high capacity data hiding method using high frequence secret data indexing algorithm. Many novel data hiding methods based on LSB and PVD methods were presented to enlarge hiding capacity and provide an imperceptible quality. In this paper, first, calculating data iteration frequency of the secret message and make up the high frequency data index matrix (HFDT) using high frequence data's location information. Next, HFDT uses to that data hiding process on the cover image and recovering process on the stego image. The experimental results demonstrate the efficiency of the proposed high frequency secret data indexing method. For the data hiding method, experiments are conducted for four cases: 2 pattern secret data (2PD), 4 pattern secret data (4PD), 8 pattern secret data (8PD) and higher pattern secret data (HPD). When comparing the proposed method with other data hiding methods, for the HPD case, the results show that the proposed method has a good PSNR and more capacity, and for the other case, the results show that the proposed method has a higher PSNR and larger capacity.

현재까지 연구된 대부분의 정보은닉 기법관련 알고리듬들은 커버영상(cover image)의 변경 또는 조작을 통해 비밀데이터를 삽입(embedding)하여 스테고영상(stego image)을 생성하고, 생성된 스테고영상으로부터 비밀데이터를 추출(extraction)하였다. 이러한 알고리듬은 PSNR의 수치가 높고, 비밀데이터의 수용량(capacity)이 많을수록 좋은 것으로 간주한다. 본 논문에서는 비밀데이터의 패턴(pattern)을 분석하여 숨기는 비밀데이터의 양이 많고, PSNR의 값이 우수한 효율적인 정보은닉 알고리듬을 제안한다. 제안하는 정보은닉 알고리듬은 비밀데이터를 분석하여 비밀데이터 내의 빈도수가 높은 값들을 찾고, 이들의 좌표 값과 인덱스(index)정보를 이용해 커버영상에 삽입한다. 이를 통해 커버영상과 스테고영상 간의 차이는 줄이면서 기존의 제안되었던 알고리듬에 비해 높은 수용량을 보여줌을 실험을 통해 비교한다. 실험결과에서는 5 종류의 비밀 데이터와 8 가지 이하의 패턴을 이용해 커버영상에 삽입하여 생성된 스테고영상과의 차이를 측정한 PSNR과 숨겨진 비밀데이터의 양의 결과를 통해 기존에 제안되었던 알고리듬들 비해 제안하는 정보은닉 알고리듬이 우수함을 보여준다.

Keywords

References

  1. N.F. Johnson and S. Jajodia, "Exploring Steganography : Seeing the Unseen," Computer Practices, Vol.31, No.2, pp. 26-34, 1998.
  2. R.J. Anderson and F.A.P. Petitcolas, "On the Limits of Steganography," IEEE Journal on Selected Areas in Communications, Vol.16, No.4, pp. 474-481, 1998. https://doi.org/10.1109/49.668971
  3. N. Johnson and S. Jajodia, "Steganalysis of Images Created using Current Steganography Software," Second Information Hiding Workshop held in Portland, Oregon, USA, LNCS 1525, pp. 273-289, 1998. https://doi.org/10.1007/3-540-49380-8_19
  4. S. Katzenbeisser and F.A.P. Peticolas, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House Books, London, 2000.
  5. E. Kawaguchi, H. Noda, and M. Niimi, "Image Data Based Steganograpy," Information Processing Society of Japan(IPSJ MAGAZINE), Vol.44, No.3, pp. 236-241, 2003.
  6. J. Zollner, H. Federrath, H. Klimant, A. Pfitzmann, R. Piotraschke, A. Westfeld, G. Wicke, and G. Wolf, "Modeling the Security of Steganographic Systems," Proceedings of 2nd Workshop on Information Hiding, pp. 345-355, 1998.
  7. Z. Ni, Y.Q. Shi, N. Ansari, and W. Su, "Reversible Data Hiding," Proceedings of International Symposiumon Circuits and Systems, Vol.2, pp. 912-915, 2003.
  8. K. Nozaki, M. Maeda, K. Tsuda, and E. Kawaguchi, "A Model of Anonymous Covert Internet Mailing System using Steganograpy," Proceedings of Pacific Rim Workshop on Digital Steganograpy (STEG 2002) , pp. 7-10, 2002.
  9. H. Noda, J. Spaulding, M.N. Shirazi, M. Nimi, and E. Kawaguchi, "BPCS Steganograpy Combined with JPEG2000 Compreasion," Proceedings of Pacific Rim Workshop on Digital Steganograpy (STEG 2002), pp. 98- 107, 2002.
  10. C. Cox, J. Killian, T. Leighton, and T. Shamoon, Secure Spread Spectrum Communication for Multimedia, Technical Report, N.E.C. Research Institute, 1995.
  11. M. Swanson, M. Kobayashi, and A. Tewfik, "Multimedia Data Embedding and Watermarking Technologies," Proceedings of IEEE, Vol.86, No.6, pp. 1064-1087, 1998.
  12. F. Hartung and M. Kutter, "Multimedia Watermarking Techniques," Proceedings of IEEE, Vol.86, No.6, pp. 1079-1107, 1998.
  13. G.W. Braudaway, K. A. Magerlein, and F. Mintzer, "Protecting Publicly-available Images with a Visible Image Watermark," Proceedings of the SPIE International Conference on Electronic Imaging, Vol.2659, pp. 126-133, 1996.
  14. T. Kalker, Watermark Estimation Through Detector Observation, Philips Research Eindhoven, Netherland, preprint, 1998.
  15. J.P.M.G. Linnartz, A.C.C. Kalker, G.F. Depovere, and R. Beuker, "A Reliability Model for Detection of Electronic Watermarks in Digital Images," Proceedings of Benelux Symposiumon Communication Theory, pp. 202-208, 1997.
  16. I.J. Cox, J. Kilian, T. Leighton, and T. Shamoon, "Secure Spread Spectrum Watermarking for Images, Audio and Video," Proceedings of International Conference on Image Processing( ICIP96) , pp. 243-246, 1996.
  17. B. Macq, "Lossless Multi-Resolution Transform for Image Authenticating Watermarking," Proceedings of EUSIPCO, 2000.
  18. C.K. Chan and L.M. Cheng. "Hiding Data in Images by Simple LSB Substitution," Journal of Pattern Recognition, Vol.37, No.3, pp.469-474, 2004. https://doi.org/10.1016/j.patcog.2003.08.007
  19. R.Z. Wang, C.F. Lin, and J.C. Lin. "Image Hiding by Optimal LSB Substitution and Genetic Algorithm," Journal of Pattern Recognition, Vol.34, No.3, pp. 671-683, 2001. https://doi.org/10.1016/S0031-3203(00)00015-7
  20. D.C. Wu and W.H. Tsai. "A Steganographic Method for Images by Pixel-Value Differencing," Journal of Pattern Recognition Letters, Vol.24, No.9-10, pp. 1613-1626, 2003. https://doi.org/10.1016/S0167-8655(02)00402-6
  21. C.M. Wang, N.I. Wu, C.S. Tsai, and M.S. Hwang. "A High Quality Steganographic Method with Pixel-value Differencing and Modulus Function," Journal of Systems and Software, Vol.81, No.1, pp. 150-158, 2008. https://doi.org/10.1016/j.jss.2007.01.049
  22. H.C. Wu, N.I. Wu, C.S. Tsai, and M.S. Hwang. "Image Steganographic Scheme based on Pixel-value Differencing and LSB replacement Methods," Visual Image Signal Processing, Vol.152, No.5, pp. 611-615, 2005. https://doi.org/10.1049/ip-vis:20059022
  23. David A. Huffman, "A Method for the Construction of Minimum-Redundancy Codes," Proceedings of the I.R.E., pp. 1098-1101, 1951.
  24. Y.R Park and J.H Park, "A Study of Steganograhpy Using Cartoon Image," Journal of Korea Multimedia Society, Vol.7, No.7, pp.913-921, 2004.

Cited by

  1. Secret Image Sharing Scheme using Matrix Decomposition and Adversary Structure vol.17, pp.8, 2014, https://doi.org/10.9717/kmms.2014.17.8.953
  2. Reversible Secret Image Sharing Scheme Using Histogram Shifting and Difference Expansion vol.17, pp.7, 2014, https://doi.org/10.9717/kmms.2014.17.7.849