• Title/Summary/Keyword: 부대역 특징 추출

Search Result 12, Processing Time 0.021 seconds

Improvement of Steganalysis Using Multiplication Noise Addition (곱셉 잡음 첨가를 이용한 스테그분석의 성능 개선)

  • Park, Tae-Hee;Eom, Il-Kyu
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.4
    • /
    • pp.23-30
    • /
    • 2012
  • This paper proposes an improved steganalysis method to detect the existence of secret message. Firstly, we magnify the small stego noise by multiplying the speckle noise to a given image and then we estimate the denoised image by using the soft thresholding method. Because the noises are not perfectly eliminated, some noises exist in the estimated cover image. If the given image is the cover image, then the remained noise will be very small, but if it is the stego image, the remained noise will be relatively large. The parent-child relationship in the wavelet domain will be slighty broken in the stego image. From this characteristic, we extract the joint statistical moments from the difference image between the given image and the denoised image. Additionally, four statistical moments are extracted from the denoised image for the proposed steganalysis method. All extracted features are used as the input of MLP(multilayer perceptron) classifier. Experimental results show that the proposed scheme outperforms previous methods in terms of detection rates and accuracy.

A Robust Pattern Watermarking Method by Invisibility and Similarity Improvement (비가시성과 유사도 증가를 통한 강인한 패턴 워터마킹 방법)

  • 이경훈;김용훈;이태홍
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.10
    • /
    • pp.938-943
    • /
    • 2003
  • In this paper, we Propose a method using the Tikhonov-Miller process to improve the robustness of watermarking under various attacks. A visually recognizable pattern watermark is embedded in the LH2, HL2 and HH2 subband of wavelet transformed domain using threshold and besides watermark is embeded by utilizing HVS(Human Visual System) feature. The pattern watermark was interlaced after random Permutation for a security and an extraction rate. To demonstrate the improvement of robustness and similarity of the proposed method, we applied some basic algorithm of image processing such as scaling, filtering, cropping, histogram equalizing and lossy compression(JPEG, gif). As a result of experiment, the proposed method was able to embed robust watermark invisibility and extract with an excellent normalized correlation of watermark under various attacks.