DOI QR코드

DOI QR Code

A Statistical Approach for Improving the Embedding Capacity of Block Matching based Image Steganography

블록 매칭 기반 영상 스테가노그래피의 삽입 용량 개선을 위한 통계적 접근 방법

  • Kim, Jaeyoung (Department of Electronic Engineering, Pukyong National University) ;
  • Park, Hanhoon (Department of Electronic Engineering, Pukyong National University) ;
  • Park, Jong-Il (Department of Computer and Software, Hanyang University)
  • 김재영 (부경대학교 전자공학과) ;
  • 박한훈 (부경대학교 전자공학과) ;
  • 박종일 (한양대학교 컴퓨터소프트웨어학과)
  • Received : 2017.07.11
  • Accepted : 2017.08.28
  • Published : 2017.09.30

Abstract

Steganography is one of information hiding technologies and discriminated from cryptography in that it focuses on avoiding the existence the hidden information from being detected by third parties, rather than protecting it from being decoded. In this paper, as an image steganography method which uses images as media, we propose a new block matching method that embeds information into the discrete wavelet transform (DWT) domain. The proposed method, based on a statistical analysis, reduces loss of embedding capacity due to inequable use of candidate blocks. It works in such a way that computes the variance of each candidate block, preserves candidate blocks with high frequency components while reducing candidate blocks with low frequency components by compressing them exploiting the k-means clustering algorithm. Compared with the previous block matching method, the proposed method can reconstruct secret images with similar PSNRs while embedding higher-capacity information.

스테가노그래피는 정보 은닉 기법중의 하나로, 제 3자에 의해 은닉 정보의 존재를 알지 못하게 방지한다는 점에서 정보의 해독을 막기 위한 암호 기법과는 구별된다. 본 논문에서는 영상을 미디어로 사용하는 영상 스테가노그래피 방법으로, 블록 매칭을 이용하여 이산웨이블릿 변환 영역에 정보를 삽입하는 새로운 스테가노그래피 방법을 제안한다. 제안 방법은 블록 매칭 후보군 블록의 불균등한 사용으로 인해서 발생하는 삽입 용량의 손실을 개선하여 고용량의 영상 정보를 삽입할 수 있다. 이를 위해, 블록 내부의 분산값을 고려하여 고주파수 성분을 갖는 후보군 블록은 최대한 보존하고, 저주파수 성분의 후보군 블록의 수는 k-평균 군집화 알고리즘을 이용한 압축을 통해 줄인다. 제안된 방법을 통해 기존 블록 매칭 기반 스테가노그래피 방법과 유사한 PSNR을 갖는 비밀 영상의 추출이 가능하면서 동시에 고용량의 영상 정보 삽입이 가능한 것을 확인할 수 있었다.

Keywords

References

  1. J. Zollner, H. Federrath, H. Klimant, A. Pfitzmann, R Piotraschke, A. Westfeld, G. Wicke, and G. Wolf, "Modeling the Security of Steganographic Systems," Proc. of Workshop on Information Hiding, pp. 345-355, 1988.
  2. H. Kim, "Theoretical Background and Detection Technique of Steganography," Journal of the Korea Information Security, Vol. 12, No. 1, pp. 34-47, 2002.
  3. K. Jung, J. Lee, and K. Yoo, "Steganography on Android Smart Devices," Journal of the Institute of Electronics and Information Engineers, Vol. 52, No. 4, pp. 100-105, 2015. https://doi.org/10.5573/ieie.2015.52.7.100
  4. D. C. Wu and W. H. T, "A Steganographic Method for Images by Pixel-Value Differencing," Pattern Recognition Letters, Vol. 24, pp. 1613-1626, 2003. https://doi.org/10.1016/S0167-8655(02)00402-6
  5. J. Kim, H. Park, and J-I. Park, "PVD Image Steganography with Locally-fixed Number of Embedding Bits," Journal of Broadcast Engineering, Vol. 22, No. 3, pp. 350-365, 2017. https://doi.org/10.5909/JBE.2017.22.3.350
  6. S. Ji, "A Study of Optimal Image Steganography Based on LSB Techniques," Journal of the Korea Industrial Information Systems Research, Vol. 20, No. 3, pp. 29-36, 2015. https://doi.org/10.9723/jksiis.2015.20.3.029
  7. Y. Lee, Y. Seo, and D. Kim, "Hologram Watermarking using Fresnel Diffraction Model," Proc. of the Korea Society of Broadcast Engineers Conference, Vol. 19, No. 5, pp. 606-615, 2014.
  8. W. Sohn and L. N. T. dung, "A Blind Watermarking Scheme using Singular Vector Based on DWT/RDWT/SVD," Journal of Broadcast Engineering, Vol. 21, No. 2, pp. 149-156, 2016. https://doi.org/10.5909/JBE.2016.21.2.149
  9. Y. Lee, Y. Seo, and D. Kim, "A Robust Blind Watermarking for Digital Image using DWT According to Its Resolution," Journal of Broadcast Engineering, Vol. 20, No. 6, pp. 888-900, 2015. https://doi.org/10.5909/JBE.2015.20.6.888
  10. S. Youssef, A. A. elfarag, and R. Raouf, "A Robust Steganography Model using Wavelet-based Block-partition Modification," International Journal of Computer Science & Information Technology, Vol. 3, No. 4, pp. 15-28, 2011. https://doi.org/10.5121/ijcsit.2011.3402
  11. S. Singh and T. J. Siddiqui, "A Security Enhanced Robust Steganography Algorithm for Data Hiding," International Journal of Computer Science Issues, Vol. 9, No. 1, pp. 131-139, 2012.
  12. J. Kim, H. Park, and J-I. Park, "Image Steganography Based on Block Matching in DWT Domain," Proc. of BMSB, Cagliary, Italy, 2017.
  13. T. Kanungo, D. Mount, N. Netanyahu, C. Piako, R. Silverman, and A. Wu, "An Efficient ${\kappa}$-means Clustering Algorithm: Analysis and Implementation," IEEE Trans. Pattern Anal. Mach. Intell., Vol. 24, No. 7, pp. 881-892, 2000.