Browse > Article
http://dx.doi.org/10.9717/kmms.2016.19.9.1669

Hybrid Information Hiding Method Based on the Characteristics of Military Images on Naval Combat System  

Lee, Joon-Ho (The 6th R&D Institute, Agency for Defense Development)
Jung, Ki-Hyun (Dept. of Cyber Security, Kyungil University)
Yoo, Kee-Young (Dept. of Computer Science and Engineering, Kyungpook National University)
Publication Information
Abstract
There are many kinds of military images used in naval combat system because various sensors are operated. The military images are displayed, analysed and stored with analysed informations according to the tactical purpose on combat system. These images are used to target detection, analysis and classification. Thus the analysed information and images must be secured, the information hiding methods are the most eligible solutions to get secured informations and images. In this paper, the hybrid information hiding method based on the characteristics of the military images is proposed and the effectiveness is shown by experiments.
Keywords
Naval Combat System; Military Image; Hybrid Information Hiding; Data Hiding;
Citations & Related Records
Times Cited By KSCI : 7  (Citation Analysis)
연도 인용수 순위
1 J.H. Lee, S.H. Shin, K.H. Jung, and K.Y. Yoo, “Study of Information Hiding Methods for SONAR Images in the Naval Combat System,” Journal of the Korea Institute of Military Science and Technology, Vol. 18, No. 6, pp. 779-788, 2015.   DOI
2 W.J. Kim, P.H. Kim, J.H. Lee, K.H. Jung, and K.Y. Yoo, “Reversible Data Hiding Method Based on Min/Max in 2x2 Sub-blocks,” Journal of Korea Institute of Electronic Engineers, Vol. 51, No. 4, pp. 69-75, 2014.
3 B.H. Jeon, G.J. Lee, K.H. Jung, and K.Y. Yoo, “Steganographic Method Based on Interpolation and Improved JPEG Prediction,” Journal of the Korea Institute of Military Science and Technology, Vol. 16, No. 4, pp. 185-190, 2013.   DOI
4 D.S. Kim and K.Y. Yoo, “A Novel Reversible Data Hiding Scheme Based on Modulo Operation and Histogram Shifting,” Journal of Korea Multimedia Society, Vol. 15, No. 5, pp. 639-650, 2012.   DOI
5 W.L. Tai, C.M. Yeh, and C.C. Chang, “Reversible Data Hiding Based on Histogram Modification of Pixel Differences,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 19, No. 6, pp. 906-910, 2009.   DOI
6 Z. Ni, Y.Q. Shi, N. Ansari, and W. Su, “Reversible Data Hiding,” Proceeding of International Symposium on Circuits and Systems, Vol. 2, pp. 912-915, 2003.
7 C.K. Chan and L.M. Cheng, “Hiding Data in Images by Simple LSB Substitution,” Journal of Pattern Recognition, Vol. 37, No. 3, pp. 469-474, 2007.   DOI
8 K.H. Jung and K.Y. Yoo, “Data Hiding Using Image Interpolation,” Computer Standards & Interfaces, Vol. 31, No. 2, pp. 465-470, 2009.   DOI
9 K.H. Jung and K.Y. Yoo, “Data Hiding Based on Two-Stage Referencing for Two-Colour Images,” The Imaging Science Journal, Vol. 61, No. 6, pp. 475-483, 2013.   DOI
10 K.H. Jung and K.Y. Yoo, “Data Hiding Using Edge Detector for Scalable Images,” Multimedia Tools and Applications, Vol. 71, No. 3, pp. 1455-1468, 2014.   DOI
11 K.H. Jung, “High-Capacity Steganographic Method Based on Pixel-Value Differencing and LSB Replacement Method,” The Imaging Science Journal, Vol. 58, No. 4, pp. 213-221, 2010.   DOI
12 K.H. Jung, “Data Hiding of Digital Images Based on Bit Position and Parity Bit,” The Imaging Science Journal , Vol. 60, No. 6, pp. 329- 337, 2012.   DOI
13 K.H. Jung and K.Y. Yoo, “Data Hiding Method in Binary Images Based on Block Masking for Key Authentication,” Information Sciences, Vol. 277, No. 1, pp. 188-196, 2014.   DOI
14 K.H. Jung, “A Data Hiding Method of Binary Images Using Pixel-Value Weighting,” Journal of the Korea Institute of Military Science and Technology, Vol. 11, No. 4, pp. 53-60, 2008.
15 K.H. Jung, “Image Steganographic Method using Variable Length for Data Embedding,” Journal of the Korea Institute of Military Science and Technology, Vol. 11, No. 3, pp. 115-122, 2008.
16 K.H. Jung, I.T. Kim, and J.C. Kim, “Three-Directional Data Hiding Method for Digital Images,” Journal of the Korea Institute of Military Science and Technology, Vol. 13, No. 2, pp. 268-274, 2010.
17 K.H. Jung and K.Y. Yoo, “Three-Directional Data Hiding Method for Digital Images,” Cryptologia, Vol. 38, No. 2, pp. 178-191, 2014.   DOI
18 Industry Academic Cooperation Foundation of Pusan National University, Study on the Effective Usage of Periscope Information for Submarine Combat System, Technical Status Analysis Report, 2012.
19 B.H. Jeon, G.J. Lee, K.H. Jung, and K.Y. Yoo, “Reversible Secret Image Sharing Scheme Using Histogram Shifting and Difference Expansion,” Journal of Korea Multimedia Society, Vol. 17, No. 7, pp. 849-857, 2014.   DOI
20 R.C. Gonzales and R.E. Woods, Digital Image Processing, Distance Measures, Prentice Hall, Upper Saddle River, New Jersey, 2001.
21 J.Y. Byun, P.H. Kim, J.H. Lee, K.H. Jung, and K.Y. Yoo, “Data Hiding Using Pixel-Value Modular Operation,” Journal of Korea Multimedia Society, Vol. 18, No. 4, pp. 483-491, 2015.   DOI
22 H.J. Kwon, H.M. Kim, and S.J. Kim, “A Data Hiding Scheme for Grayscale Images Using a Square Function,” Journal of Korea Multimedia Society, Vol. 17, No. 4, pp. 466-477, 2014.   DOI