DOI QR코드

DOI QR Code

성능을 개선한 해밍 코드 기법을 이용한 데이터 은닉

Data Hiding using Improving Hamming Code

  • 김천식 (안양대학교 디지털미디어공학과)
  • 투고 : 2013.03.25
  • 발행 : 2013.08.15

초록

스테고(Stego) 이미지 분석 측면에서 스테고-분석(Steganalysis) 툴의 기본적인 공격 목표는 데이터 은닉에 의한 스테고-미디어의 통계적으로 비정상적인 부분을 찾음으로서 데이터 은닉의 존재를 탐지 하는 것이다. 본 논문에서는 디지털 이미지를 위해 (7, 4) 해밍코드를 개선한 방법으로 데이터 은닉 스킴을 제안하였다. 제안한 방법은 원 영상이미지에 9비트 마다 6비트의 데이터를 은닉하는 방법이다. 실험결과 제안한 방법은 0.67bpp의 데이터 은닉 성능을 보이며 기존의 방법들에 비해서 스테고 영상의 질이 평균적으로 약간 더 좋은 것으로 나타났다.

The primary goal of attack on steganographic images, termed steganalysis, is to detect the presence of hidden data by finding statistical abnormality of a stego-media caused by data embedding. This paper proposes a novel steganographic scheme based on improving the (7, 4) Hamming code for digital images. The proposed scheme embeds a segment of six secret bits into a group of nine cover pixels at a time. The experimental results show that the proposed scheme achieves a 0.67bpp embedding payload and a slightly higher visual quality of stego images compared with the previous arts.

키워드

참고문헌

  1. Bender W., D. Gruhl, N. Mormoto, A.Lu. "Techniques for data hiding", IBM systems journal, vol. 35, pp.313-336 (1996). https://doi.org/10.1147/sj.353.0313
  2. Hamming, R.W., "Error detecting and error correcting codes", Bell System Technical Journal, vol.29, no.2, pp.147-160, 1950. https://doi.org/10.1002/j.1538-7305.1950.tb00463.x
  3. Zhang, W., Wang, S., and Zhang, X., "Improve embedding efficiency of covering codes for applications in steganography", IEEE Communications Letters, vol.11, no.8, pp.680-682, 2007. https://doi.org/10.1109/LCOMM.2007.070438
  4. Chang, C. -C., T. D. Kieu, and Y.-C. Chou. "A high payload steganographic scheme based on (7, 4) Hamming code for digital images", International Symposium on Electronic Commerce and Security, Guangzhou, China, pp.16-21, 2002.
  5. Chao, R. M., H. C. Wu, C. -C. Lee, and Y.-P. Chu. "A novel image data hiding scheme with diamond encoding", EURASIP Journal on Information Security, vol. 2009, pp.1-9 (2009).
  6. Fridrich, J., M. Goljan, and R. Du. "Detecting LSB steganography in color, and gray-scale images", IEEE Transactions on Multimedia, vol. 8, pp. 22-28, 2001.
  7. Lee, C. F., C. C. Chang, and K. H. Wang. "Improvement of EMD embedding method for large payloads by pixel segmentation strategy", Image and Vision Computing, vol. 26, no. 12, pp. 1670-1676, 2008. https://doi.org/10.1016/j.imavis.2008.05.005
  8. Lin, P. L., C.-K. Hsieh, and P.-W. Huang, "A hierarchical digital watermarking method for image tamper detection and recovery", Pattern Recognition, vol. 38, no. 12, pp. 2519-2529, 2005. https://doi.org/10.1016/j.patcog.2005.02.007
  9. Mielikainen, J. "LSB matching revisited", IEEE Signal Processing Letters, vol. 13, no. 5, pp. 285-287, 2006. https://doi.org/10.1109/LSP.2006.870357
  10. Provos, N. and P. Honeyman. "Hide and seek: An introduction to steganography", IEEE Security and Privacy, vol. 1, no. 3, pp. 32-44, 2003. https://doi.org/10.1109/MSECP.2003.1203220
  11. Ni, Z., Y. Q. Shi, N. Ansari, W. Su, Q. Sun, and X. Lin. "Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication", IEEE transactions on circuits and systems for video technology, vol. 18, no.4, pp.497-509, 2008. https://doi.org/10.1109/TCSVT.2008.918761
  12. Spaulding, J., H. Noda, M. N. Shirazi, and E. Kawaguchi. "BPCS steganography using EZW lossy compressed images", Pattern Recognition Letters, vol. 23, no. 13, pp. 1579-1587, 2002. https://doi.org/10.1016/S0167-8655(02)00122-8
  13. University of Southern California. The USC-SIPI Image Database. Retrieved fro http://sipi.usc.edu/database/ on March 1, 2011.
  14. Wang, H. and S. Wang. "Cyber warfare: Steganography vs. steganalysis," Communications of the ACM, vol. 47, no.10, pp.76-82, 2004.
  15. Westfeld, A. "F5: A steganographic algorithm", Proceedings of the 4th International Workshop on Information Hiding 2001, Lecture Notes in Computer Science, vol. 2137, Pittsburgh, PA, USA, pp.289-302, 2004.
  16. Westfeld, A. "Attacks on steganographic systems", Proceedings of the 3rd Information Hiding Workshops, Dresden, Germany, September 28-October 1, pp.61-75, 1999.
  17. Yu, Y. H., C. C. Chang, and Y. C. Hu. "Hiding secret data in images via predictive coding", Pattern Recognition, vol.38, no.5, pp.691-705, 2005. https://doi.org/10.1016/j.patcog.2004.11.006
  18. Zhang, X. and S. Wang. "Efficient steganographic embedding by exploiting modification direction", IEEE Communications Letters, vol.10, no.11, pp.781-783, 2006. https://doi.org/10.1109/LCOMM.2006.060863
  19. Chang, C.C., T.S. Chen, and L.Z. Chung. "A steganographic method based upon JPEG and quantization table modification", Information Sciences-Informatics and Computer Science, vol.141, no.1-2, pp.123-138, 2002.
  20. Lin, W.H., Wang, Y.R., Horng, S.J., "A wavelet-tree-based watermarking method using distance vector of binary cluster", Expert Systems with Applications, vol.36, no.6, pp.9869-9878, 2009. https://doi.org/10.1016/j.eswa.2009.02.036
  21. 김천식, 윤은준, 조민호, 홍유식, "의료영상을 위한 복원 가능한 정보 은닉 및 메시지 인증", 대한전자 공학회 논문지 CI편, 제 47권, 1호, pp.65-72, 2010.

피인용 문헌

  1. Hamming Code Strategy for Medical Image Sharing vol.3, pp.1, 2013, https://doi.org/10.3390/asi3010008