Browse > Article
http://dx.doi.org/10.9708/jksci.2014.19.12.153

Inverse Operation-based Image Steganography using Side Match for Minimum Data Damage  

Che, Won-Seok (Shool of Computer Science and Engineering, Kyungpook National University)
Chung, Kyung-Ho (Department of Computer Engineering, Kyungwoon University)
Kim, Sung-Soo (Department of Mobile Engineering, Kyungwoon University)
Yun, Tae-Jin (Department of Mobile Engineering, Kyungwoon University)
Han, Ki-Jun (Shool of Computer Science and Engineering, Kyungpook National University)
Abstract
The Streganography method for digital images has to insert secret data into the image without image distortion. Side match method is that size of secret data is calculated by difference of embedded pixel value and mean value of side pixels. And the secret value is embedded into the embedded pixel. Therefore, the more secret data increases, the more image distortion increases, too. In this paper, we propose the enhanced method that calculates embedded pixel value by difference of secret value and mean value of side pixels. In proposed method, more secret data is embedded and image distortion has to decreases.
Keywords
Steganography; Digital image; Side match; security;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 C.C.Chang and H.W.Tseng, "A Steganographic Method for Digital Images using Side Match," Pattern Recognition Letters, Vol. 25, Issue 12, pp. 1431-1437, September 2004.   DOI   ScienceOn
2 C.C.Chang, C.Y.Lin and Y.Z.Wang, "New Image Steganographic Methods using Run-length Approach," INFORMATION SCIENCES, February 2006.
3 A. Martin, G. Sapiro and G. Seroussi, "Is Image Steganography Natural?," IEEE TRANSACTIONS ON IMAGE PROCESSING, Vol. 14, No. 12, December 2005.
4 P. Chen, W. Wu, "A Modified Side Match Scheme for Image Steganography," International Jounal of Applied Science and Engineering, Vol. 7(1), pp. 53-60, October 2009.
5 G. Swain, S. K. Lenka, "Steganography using two sided, three sided, and four sided side match methods," CSI Transactions on ICT, Vol. 1, Issue 2, pp. 127-133, June 2013.   DOI
6 G. Swain, "Steganography in Digital Images Using Maximum Difference of Neighboring Pixel Values," International Journal of Security and Its Applications, Vol. 7, No. 6, pp. 285-294, 2013.   DOI
7 M. A. B. Younis, and A. Jantan, "A New Steganography Approach for Image Encryption Exchange by Using Least Significant Bit Insertion," International Journal of Computer Science and Network Security, Vol. 8, No. 6, 2008.
8 M. Juneja, P. S. Sandhu, and E. Walia, "Application of LSB Based Steganographic Technique for 8-bit Color Images," Proceedings of World Academy of Science, Engineering and Technology, Vol. 38, pp. 427-429, 2009.
9 M. Amiri, and M. R. Resketi, "An Edge Method in Steganography," Proceedings of World Academy of Science, Engineering and Technology, Vol. 37, pp. 1058-1063, 2009.
10 S. Arora, and S. Anand, "A New Approach for Image Steganography using Edge Detection Method," International Journal of Innovative Research in Computer and Communication Engineering, Vol. 1, Issue 3, May 2013.
11 G. Yim, and H. Kim, "Chaos-based Image Encryption Scheme using Noise-induced Synchronization," Journal of the Korea Society of Computer and Information, Vol. 13, No. 5, pp. 155-162, September 2008.   과학기술학회마을
12 H. Yang, and J. Choi, "Study on the Correlation between Digital Images using ICOR," Journal of the Korea Society of Computer and Information, Vol. 14, No. 3, pp. 75-82, March 2009.   과학기술학회마을