DOI QR코드

DOI QR Code

Inverse Operation-based Image Steganography using Side Match for Minimum Data Damage

데이터 손상을 최소화하는 사이드 매치를 이용한 역연산 기반 이미지 스테가노그래피

  • Che, Won-Seok (Shool of Computer Science and Engineering, Kyungpook National University) ;
  • Chung, Kyung-Ho (Department of Computer Engineering, Kyungwoon University) ;
  • Kim, Sung-Soo (Department of Mobile Engineering, Kyungwoon University) ;
  • Yun, Tae-Jin (Department of Mobile Engineering, Kyungwoon University) ;
  • Han, Ki-Jun (Shool of Computer Science and Engineering, Kyungpook National University)
  • 최원석 (경북대학교 컴퓨터학부) ;
  • 정경호 (경운대학교 컴퓨터공학과) ;
  • 김성수 (경운대학교 모바일공학과) ;
  • 윤태진 (경운대학교 모바일공학과) ;
  • 한기준 (경북대학교 컴퓨터학부)
  • Received : 2014.09.03
  • Accepted : 2014.12.01
  • Published : 2014.12.31

Abstract

The Streganography method for digital images has to insert secret data into the image without image distortion. Side match method is that size of secret data is calculated by difference of embedded pixel value and mean value of side pixels. And the secret value is embedded into the embedded pixel. Therefore, the more secret data increases, the more image distortion increases, too. In this paper, we propose the enhanced method that calculates embedded pixel value by difference of secret value and mean value of side pixels. In proposed method, more secret data is embedded and image distortion has to decreases.

디지털 이미지에 대한 스테가노그래피 방법들은 원본 이미지의 왜곡 없이 많은 데이터들을 숨겨야 한다. 그 방법들 중 하나로써 비밀 데이터를 삽입 할 픽셀 주위에 있는 픽셀들의 평균값을 이용하여 해당 픽셀에 들어갈 비밀 데이터를 생성하여 삽입하는 기법은 삽입할 비밀 데이터가 클수록 기존 픽셀 값의 변화도 커지기 때문에 원본 이미지에 대한 손상 또한 커지게 된다. 본 논문에서는, 측면 픽셀들의 평균값에 비밀 데이터 값의 차를 이용하여 비밀 데이터를 삽입할 픽셀의 값을 연산함으로써 기존 픽셀 값과의 차이를 줄이는 기법을 제안한다. 본 기법을 적용함으로써 더 많은 비밀 데이터의 삽입이 가능하였고 이미지의 품질 손상 또한 줄일 수 있었다.

Keywords

References

  1. C.C.Chang and H.W.Tseng, "A Steganographic Method for Digital Images using Side Match," Pattern Recognition Letters, Vol. 25, Issue 12, pp. 1431-1437, September 2004. https://doi.org/10.1016/j.patrec.2004.05.006
  2. C.C.Chang, C.Y.Lin and Y.Z.Wang, "New Image Steganographic Methods using Run-length Approach," INFORMATION SCIENCES, February 2006.
  3. A. Martin, G. Sapiro and G. Seroussi, "Is Image Steganography Natural?," IEEE TRANSACTIONS ON IMAGE PROCESSING, Vol. 14, No. 12, December 2005.
  4. P. Chen, W. Wu, "A Modified Side Match Scheme for Image Steganography," International Jounal of Applied Science and Engineering, Vol. 7(1), pp. 53-60, October 2009.
  5. G. Swain, S. K. Lenka, "Steganography using two sided, three sided, and four sided side match methods," CSI Transactions on ICT, Vol. 1, Issue 2, pp. 127-133, June 2013. https://doi.org/10.1007/s40012-013-0015-3
  6. G. Swain, "Steganography in Digital Images Using Maximum Difference of Neighboring Pixel Values," International Journal of Security and Its Applications, Vol. 7, No. 6, pp. 285-294, 2013. https://doi.org/10.14257/ijsia.2013.7.6.29
  7. M. A. B. Younis, and A. Jantan, "A New Steganography Approach for Image Encryption Exchange by Using Least Significant Bit Insertion," International Journal of Computer Science and Network Security, Vol. 8, No. 6, 2008.
  8. M. Juneja, P. S. Sandhu, and E. Walia, "Application of LSB Based Steganographic Technique for 8-bit Color Images," Proceedings of World Academy of Science, Engineering and Technology, Vol. 38, pp. 427-429, 2009.
  9. M. Amiri, and M. R. Resketi, "An Edge Method in Steganography," Proceedings of World Academy of Science, Engineering and Technology, Vol. 37, pp. 1058-1063, 2009.
  10. S. Arora, and S. Anand, "A New Approach for Image Steganography using Edge Detection Method," International Journal of Innovative Research in Computer and Communication Engineering, Vol. 1, Issue 3, May 2013.
  11. G. Yim, and H. Kim, "Chaos-based Image Encryption Scheme using Noise-induced Synchronization," Journal of the Korea Society of Computer and Information, Vol. 13, No. 5, pp. 155-162, September 2008.
  12. H. Yang, and J. Choi, "Study on the Correlation between Digital Images using ICOR," Journal of the Korea Society of Computer and Information, Vol. 14, No. 3, pp. 75-82, March 2009.