DOI QR코드

DOI QR Code

A Steganography Method Improving Image Quality and Minimizing Image Degradation

영상의 화질 개선과 열화측정 시간을 최소화하는 스테가노그라피 방법

  • Received : 2016.10.10
  • Accepted : 2016.10.31
  • Published : 2016.10.31

Abstract

In this paper, we propose a optimized steganography how to improve the image degradation of the existing data hiding techniques. This method operates in the compressed domain(JPEG) of an image. Most of the current information concealment methods generally change the coefficients to hide information. And several methods have tried to improve the performance of a typical steganography method such as F5 including a matrix encoding. Those papers achieved the object of reducing the distortion which is generated as hiding data in coefficients of compressed domain. In the proposed paper we analyzed the effect of the quantization table for hiding the data in the compressed domain. As a result, it found that can decrease the distortion that occur in the application of steganography techniques. This paper provides a little (Maximum: approximately 6.5%) further improved results in terms of image quality in a data hiding on compressed domain. Developed algorithm help improve the data hiding performance of compressed image other than the JPEG.

본 논문에서는 기존의 데이터 은닉 기법들을 개선하는 스테가노그라피 방법을 제시한다. 이 방법은 이미지의 압축 도메인(JPEG)에서 동작한다. 현재 정보은닉 방법의 대부분은 일반적으로 정보를 숨길 계수를 변경한다. 그리고 몇 가지 방법은 매트릭스 인코딩을 포함하는 F5 같은 일반적인 스테가노그라피 방법의 성능을 향상시키기 위해 노력하였다. 이러한 논문들은 압축 도메인 계수에 데이터를 숨길 때 발생하는 왜곡을 감소시키는 목적을 달성하였다. 제안 논문에서는 압축 도메인에서 데이터를 숨기는 동안 양자화 테이블의 효과를 분석 하였다. 결과적으로, 스테가노그라피 기술의 적용에서 발생하는 왜곡을 양자화 테이블의 효율적 이용에 의해 감소시킬 수 있음을 알아냈다. 본 논문에서는 이미지 품질의 관점에서 일부(최대: 약 6.5%) 더 개선 된 결과를 제공한다. 제안한 논문에서 개발한 알고리즘은 JPEG 외의 압축영역 정보 은닉 기법들의 성능 개선에 도움을 줄 수 있다.

Keywords

References

  1. George Berg, Ian Davidson, Ming-Yuan Duan and Goutam Paul, "Searching For Hidden Message: Automatic Detection of Steganography," American Associstion of Artificial Intelligence, pp.51-56, 2003
  2. J. Fridrich, M. Goljan and D. Hogea, "Attacking the OutGuess," Proc. of the ACM Workshop on Multimedia and Security. Juan-les-Pins, France, December 6, 2002.
  3. J. Fridrich, M. Goljan and D. Hogea, "New Methodolo gy for Breaking Steganographic Techniques for JPEGs," Proc. SPIE Electronic Imaging, Santa Clara, CA, USA, pp.143-155, Jan 2003.
  4. Andreas Westfeld, "F5-A Steganographic Algorithm: High Capacity Despite Better Steganalysis," 4th Information Hiding International Workshop, Pittsburgh,USA, April 2001.
  5. Bret Dunber, "A detailed look at Steganographic Techniques and their use in an Open-Systems Environment.", SANS Institute, January 2002.
  6. J. Fridrich and D. Soukal, "Matrix Embedding for Large Payload," IEEE Tran. on Information Forensics and Security. Vol 1, pp.390-295, September2006. https://doi.org/10.1109/TIFS.2006.879281
  7. M. Chen, R. Zhang, X. Niu and Y. Yang, "Analysis of Current Steganography Tools: Classification & Features," Proc. of the 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Pasadena. CA, USA, December 2006.
  8. Y.H. Kim, Z. Duric and D. Richards, "Modified Matrix Encoding Technique for Minimal Distortion Steganography," Proc. of Information Hiding 2006, pp.314-327, 2007
  9. Y.S. Choi, H.J. Kim, and C.M.Park,"The Influence of Quantizatrion Table in view of Information Hiding Techniques Modifying Coefficients in Frequency Domain, " Journal of IEEK, Vol46, pp.56-63, January 2009.
  10. Andreas Westfeld: The Steganographic Algorithm F5, 1999, http://www.wwwrn.inf.tu-dresden.de/-w estfeld/f5.html
  11. Derek Upham: Jsteg, 1997, e.g. http://www.tiac.net/users/korejwa/jsteg.htm
  12. Crandall, R.: Some Notes on Steganography. Posted on Steganography Mailing List http://os.inf.tu-dresden.de/westfeld /crandall.pdf, 1998
  13. The USC-SIPI Image Database, http://sipi.usc.edu/database/
  14. H, Y, Hwang and H. J. Kim "Reversible Watermarking for Audio Using Recompression Method," J. of Digital Contents Society, Vol. 14, No. 2, pp. 199-206, 2013 https://doi.org/10.9728/dcs.2013.14.2.199