DOI QR코드

DOI QR Code

Data Hiding using Improving Hamming Code

성능을 개선한 해밍 코드 기법을 이용한 데이터 은닉

  • 김천식 (안양대학교 디지털미디어공학과)
  • Received : 2013.03.25
  • Published : 2013.08.15

Abstract

The primary goal of attack on steganographic images, termed steganalysis, is to detect the presence of hidden data by finding statistical abnormality of a stego-media caused by data embedding. This paper proposes a novel steganographic scheme based on improving the (7, 4) Hamming code for digital images. The proposed scheme embeds a segment of six secret bits into a group of nine cover pixels at a time. The experimental results show that the proposed scheme achieves a 0.67bpp embedding payload and a slightly higher visual quality of stego images compared with the previous arts.

스테고(Stego) 이미지 분석 측면에서 스테고-분석(Steganalysis) 툴의 기본적인 공격 목표는 데이터 은닉에 의한 스테고-미디어의 통계적으로 비정상적인 부분을 찾음으로서 데이터 은닉의 존재를 탐지 하는 것이다. 본 논문에서는 디지털 이미지를 위해 (7, 4) 해밍코드를 개선한 방법으로 데이터 은닉 스킴을 제안하였다. 제안한 방법은 원 영상이미지에 9비트 마다 6비트의 데이터를 은닉하는 방법이다. 실험결과 제안한 방법은 0.67bpp의 데이터 은닉 성능을 보이며 기존의 방법들에 비해서 스테고 영상의 질이 평균적으로 약간 더 좋은 것으로 나타났다.

Keywords

References

  1. Bender W., D. Gruhl, N. Mormoto, A.Lu. "Techniques for data hiding", IBM systems journal, vol. 35, pp.313-336 (1996). https://doi.org/10.1147/sj.353.0313
  2. Hamming, R.W., "Error detecting and error correcting codes", Bell System Technical Journal, vol.29, no.2, pp.147-160, 1950. https://doi.org/10.1002/j.1538-7305.1950.tb00463.x
  3. Zhang, W., Wang, S., and Zhang, X., "Improve embedding efficiency of covering codes for applications in steganography", IEEE Communications Letters, vol.11, no.8, pp.680-682, 2007. https://doi.org/10.1109/LCOMM.2007.070438
  4. Chang, C. -C., T. D. Kieu, and Y.-C. Chou. "A high payload steganographic scheme based on (7, 4) Hamming code for digital images", International Symposium on Electronic Commerce and Security, Guangzhou, China, pp.16-21, 2002.
  5. Chao, R. M., H. C. Wu, C. -C. Lee, and Y.-P. Chu. "A novel image data hiding scheme with diamond encoding", EURASIP Journal on Information Security, vol. 2009, pp.1-9 (2009).
  6. Fridrich, J., M. Goljan, and R. Du. "Detecting LSB steganography in color, and gray-scale images", IEEE Transactions on Multimedia, vol. 8, pp. 22-28, 2001.
  7. Lee, C. F., C. C. Chang, and K. H. Wang. "Improvement of EMD embedding method for large payloads by pixel segmentation strategy", Image and Vision Computing, vol. 26, no. 12, pp. 1670-1676, 2008. https://doi.org/10.1016/j.imavis.2008.05.005
  8. Lin, P. L., C.-K. Hsieh, and P.-W. Huang, "A hierarchical digital watermarking method for image tamper detection and recovery", Pattern Recognition, vol. 38, no. 12, pp. 2519-2529, 2005. https://doi.org/10.1016/j.patcog.2005.02.007
  9. Mielikainen, J. "LSB matching revisited", IEEE Signal Processing Letters, vol. 13, no. 5, pp. 285-287, 2006. https://doi.org/10.1109/LSP.2006.870357
  10. Provos, N. and P. Honeyman. "Hide and seek: An introduction to steganography", IEEE Security and Privacy, vol. 1, no. 3, pp. 32-44, 2003. https://doi.org/10.1109/MSECP.2003.1203220
  11. Ni, Z., Y. Q. Shi, N. Ansari, W. Su, Q. Sun, and X. Lin. "Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication", IEEE transactions on circuits and systems for video technology, vol. 18, no.4, pp.497-509, 2008. https://doi.org/10.1109/TCSVT.2008.918761
  12. Spaulding, J., H. Noda, M. N. Shirazi, and E. Kawaguchi. "BPCS steganography using EZW lossy compressed images", Pattern Recognition Letters, vol. 23, no. 13, pp. 1579-1587, 2002. https://doi.org/10.1016/S0167-8655(02)00122-8
  13. University of Southern California. The USC-SIPI Image Database. Retrieved fro http://sipi.usc.edu/database/ on March 1, 2011.
  14. Wang, H. and S. Wang. "Cyber warfare: Steganography vs. steganalysis," Communications of the ACM, vol. 47, no.10, pp.76-82, 2004.
  15. Westfeld, A. "F5: A steganographic algorithm", Proceedings of the 4th International Workshop on Information Hiding 2001, Lecture Notes in Computer Science, vol. 2137, Pittsburgh, PA, USA, pp.289-302, 2004.
  16. Westfeld, A. "Attacks on steganographic systems", Proceedings of the 3rd Information Hiding Workshops, Dresden, Germany, September 28-October 1, pp.61-75, 1999.
  17. Yu, Y. H., C. C. Chang, and Y. C. Hu. "Hiding secret data in images via predictive coding", Pattern Recognition, vol.38, no.5, pp.691-705, 2005. https://doi.org/10.1016/j.patcog.2004.11.006
  18. Zhang, X. and S. Wang. "Efficient steganographic embedding by exploiting modification direction", IEEE Communications Letters, vol.10, no.11, pp.781-783, 2006. https://doi.org/10.1109/LCOMM.2006.060863
  19. Chang, C.C., T.S. Chen, and L.Z. Chung. "A steganographic method based upon JPEG and quantization table modification", Information Sciences-Informatics and Computer Science, vol.141, no.1-2, pp.123-138, 2002.
  20. Lin, W.H., Wang, Y.R., Horng, S.J., "A wavelet-tree-based watermarking method using distance vector of binary cluster", Expert Systems with Applications, vol.36, no.6, pp.9869-9878, 2009. https://doi.org/10.1016/j.eswa.2009.02.036
  21. 김천식, 윤은준, 조민호, 홍유식, "의료영상을 위한 복원 가능한 정보 은닉 및 메시지 인증", 대한전자 공학회 논문지 CI편, 제 47권, 1호, pp.65-72, 2010.

Cited by

  1. Hamming Code Strategy for Medical Image Sharing vol.3, pp.1, 2013, https://doi.org/10.3390/asi3010008