Browse > Article
http://dx.doi.org/10.7236/IJIBC.2019.11.1.85

A Study on Confidential Data Hiding Technique with Spatial Encryption for Color Image  

Jung, Soo-Mok (Division of Computer Science & Engineering, Sahmyook University)
Publication Information
International Journal of Internet, Broadcasting and Communication / v.11, no.1, 2019 , pp. 85-88 More about this Journal
Abstract
In this paper, we propose a technique for spatially encrypting confidential data into R, G, B planes of color image and extracting spatially encrypted confidential data. The effectiveness of the proposed technique is verified by mathematically analyzing the quality of the stego-image generated using the proposed technique. The proposed technique can hide confidential data securely into cover image by spatially encrypting the confidential data, and can extract confidential data from the stego-image. The quality of the stego-image created by applying the proposed technique is very good. The average value of the quality of the stego-image is 51.14 dB. Therefore, it is not visually recognizable whether the confidential data is hidden in the stego-image. The proposed technique can be widely used for military and intellectual property protection.
Keywords
Data Hiding; Cover Image; Stego-image; Confidential Data; Confidential Data Extraction;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 H. C. Huang, C. M. Chu, and J. S. Pan, “The optimized copyright protection system with genetic watermarking,” Soft Computing, Vol. 13, No. 4, pp. 333-343, Feb. 2009.   DOI
2 Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Trans. on Circuits and Systems for Video Technology, Vol. 16, No. 3, pp. 354-362, March 2006.   DOI
3 A.Z. Tirkel, G.A. Rankin, R.M. van Schyndel, W.J. Ho, N.R.A. Mee, and C.F. Osborne, "Electronic watermark", In Digital Image Computing, Technology and Applications, pp. 666-673, Macquarie University, Sidney, 1993.
4 Y. C. Li, C. M. Yeh, and C. C. Chang, “Data hiding based on the similarity between neighboring pixels with reversibility,” Digital Signal Processing, Vol. 20, No. 4, pp. 1116-1128, July 2010.   DOI
5 C. L. Tsai, K. C. Fan, C. D. Chung, and T. C. Chuang, "Reversible and lossless data hiding with application in digital library," Proc. 38th Annual 2004 Int. Canahan Conf. on Security Technology, pp. 226-232, Albuquerque, New Mexico, USA, Oct. 2004.
6 M. U. Celik, G. Sharma, A. M. Tekalp, E Saber, "Reversible data hiding," Proc. 2002 Intl. Conf. on Image Processing, Vol 3, pp. 157-160, Rochester, New York, USA, Sep. 2002.
7 C. C. Chang, W. L. Tai, and C. C. Lin, “A reversible data hiding scheme based on side match vector quantization,” IEEE Trans. on Circuits and Systems for Video Technology, Vol. 16, No. 10, pp. 1301-1308, Oct. 2006.   DOI
8 L. Kamstra, H.J.A.M. Heijmans, “Reversible data embedding into images using wavelet techniques and sorting,” IEEE Trans. on Image Process, Vol. 14, No. 12, pp. 2082-2090, Dec. 2005.   DOI
9 G.S. Cho, “Data Hiding in NTFS Timestamps for Anti-Forensics,” International Journal of Internet, Broadcasting and Communication, Vol. 8, No. 3, pp. 31-40, Aug. 2016.   DOI