• Title/Summary/Keyword: 스테가노그래피

Search Result 75, Processing Time 0.021 seconds

An IoT Information Security Model for Securing Bigdata Information for IoT Users (IoT 사용자의 빅데이터 정보를 안전하게 보호하기 위한 IoT 정보 보안 모델)

  • Jeong, Yoon-Su;Yoon, Deok-Byeong;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.11
    • /
    • pp.8-14
    • /
    • 2019
  • Due to the development of computer technology, IoT technology is being used in various fields of industry, economy, medical service and education. However, multimedia information processed through IoT equipment is still one of the major issues in the application sector. In this paper, a big data protection model for users of IoT based IoT is proposed to ensure integrity of users' multimedia information processed through IoT equipment. The proposed model aims to prevent users' illegal exploitation of big data information collected through IoT equipment without users' consent. The proposed model uses signatures and authentication information for IoT users in a hybrid cryptographic method. The proposed model feature ensuring integrity and confidentiality of users' big data collected through IoT equipment. In addition, the user's big data is not abused without the user's consent because the user's signature information is encrypted using a steganography-based cryptography-based encryption technique.

Image Steganography for Securing Hangul Messages based on RS-box Hiding Model (RS-box 은닉 모델에 기반한 한글 메시지 보안을 위한 이미지 스테가노그래피)

  • Seon-su Ji
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.16 no.2
    • /
    • pp.97-103
    • /
    • 2023
  • Since most of the information is transmitted through the network, eavesdropping and interception by a third party may occur. Appropriate measures are required for effective, secure and confidential communication in the network. Steganography is a technology that prevents third parties from detecting that confidential information is hidden in other media. Due to structural vulnerabilities, information protected by encryption and steganography techniques can be easily exposed to illegitimate groups. In order to improve the limitations of LSB where the simplicity and predictability of the hiding method exist, I propose a technique to improve the security of the message to be hidden based on PRNG and recursive function. To enhance security and confusion, XOR operation was performed on the result of selecting a random bit from the upper bits of the selected channel and the information transformed by the RS-box. PSNR and SSIM were used to confirm the performance of the proposed method. Compared to the reference values, the SSIM and PSNR of the proposed method were 0.9999 and 51.366, respectively, confirming that they were appropriate for hiding information.

Steganography on Android Smart Devices (안드로이드 스마트기기에서의 스테가노그래피 연구)

  • Jung, Ki-Hyun;Lee, Joon-Ho;Yoo, Kee-Young
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.4
    • /
    • pp.99-105
    • /
    • 2015
  • As increasing the use of smart phones, the interest of iOS and Android operating system is growing up. In this paper, a novel steganographic method based on Android platform is proposed. Firstly, we analyze the skia based image format that is supporting 2D graphic libraries in Android operating system. Then, we propose a new data hiding method based on the Android bitmap image format. The proposed method hides the secret data on the four true color areas which include Alpha, Red, Green, Blue. In especial, we increase the embedding capacity of the secret data on the Alpha area with a less image distortion. The experimental results show that the proposed method has a higher embedding capacity and less distortion by changing the size of the secret bits on the Alpha area.

Steganographic Method Based on Interpolation and Improved JPEG Prediction (보간법과 개선된 JPEG 예측을 통한 스테가노그래픽 기법 연구)

  • Jeon, Byoung-Hyun;Lee, Gil-Jae;Jung, Ki-Hyun;Yoo, Kee-Young
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.2
    • /
    • pp.185-190
    • /
    • 2013
  • The previous steganographic methods by using the interpolation were difficult to estimate the distortion because the size of cover image is extended by interpolation algorithms. In this paper, to solve the problems of previous methods proposed the improved steganographic method based on the pixel replacement algorithms. In our method, we cannot extend a cover image, but also can estimate exactly the distortion of the stego-images. In the experimental results, the estimated distortion and embedding capacity of stego-image are shown on three pixel replacement methods.

Steganography based Multi-modal Biometrics System (다중생체시스템에 기반한 스테가노그래피)

  • Yu Byeong-Jin;Go Hyeon-Ju;Lee Dae-Jong;Jeon Myeong-Geun
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2006.05a
    • /
    • pp.148-151
    • /
    • 2006
  • 본 논문에서 얼굴과 홍채 데이터를 사용하여 다중생체시스템에 기반한 스테가노그라피 구현을 제안한다. 이를 위해, 얼굴과 홍채 인식 기반의 다중생체인식을 구성하였다. 여기서, 홍채의 특징벡터는 디지털 워터마킹 기법을 이용하여 얼굴 이미지 안에 숨기게 된다. 얼굴과 홍채의 인식시스템은 퍼지집합 이론과 LDA 기법이 결합하여 확장한 Fuzzy-LDA(Fuzzy-Based Linear Discriminant Analysis)기법을 제안한다. 최종적으로 디지털 워터마킹 기법을 적용하여 얼굴이미지 안에 홍채 정보를 삽입하고 얼굴 데이터와 홍채 데이터를 통한 다중생체인식을 구성하였으며, 최종적으로 생체데이터 인식율의 ROC 곡선을 통해 제안된 워터마킹 기법의 좋은 성능을 확인하였고, 얼굴 인식율을 통해 워터마킹된 얼굴 영상과 원본 얼굴 영상을 비교하였다. 다양한 실험을 통해 제안된 기법이 다중생체시스템을 보호하고 효과적으로 사용 될 수 있음을 확인 할 수 있다.

  • PDF

Steganographic Method Based on Three Directional Embedding (세 방향 자료 은닉이 가능한 이미지 스테가노그래픽기법 연구)

  • Jung, Ki-Hyun;Kim, In-Taek;Kim, Jae-Cheol
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.2
    • /
    • pp.268-274
    • /
    • 2010
  • A steganographic method using three directional data embedding for gray images is presented in this paper. Cover image is divided into non-overlapping $2\times2$ sub-blocks and the basis pixel is selected to calculate the three different values of each sub-block. Difference values are replaced by embedding the number of secret bits that is referenced by the range table. For the three pixel pairs in the sub-block, the optimal pixel adjustment is preceded to reduce the distortion of visual quality. The experimental results show that the proposed method achieves a good visual quality and high capacity.

Image Steganographic Method using Variable Length for Data Embedding (가변 길이 자료 은닉이 가능한 이미지 스테가노그래픽 방법 연구)

  • Jung, Ki-Hyun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.3
    • /
    • pp.115-122
    • /
    • 2008
  • Wu and Tsai's pixel-value differencing method and Chang and Tseng's side-match method are based on the theory that the number of bits which can be embedded is determined by the degree of the pixel's smoothness, or its proximity to the edge of the image. If pixels are located in the edge area, they may tolerate larger changes than those in smooth areas. However, both methods are subject to the fall off the boundary problem(FOBP). This study proposes a new scheme that can solve the FOBP. The experimental results demonstrate that the proposed method resolves the problem, and achieves a higher image quality index value than other methods.

Adaptive Hangul Steganography Based on Chaotic Encryption Technique (혼돈 암호화 기법에 기반한 적응된 한글 스테가노그래피)

  • Ji, Seon-Su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.3
    • /
    • pp.177-183
    • /
    • 2020
  • Steganography uses digital images as a medium for sending secret messages over insecure networks. There is also a least significant bit(LSB) that is a popular method of embedding secret messages in digital images. The goal of steganography is to securely and flawlessly transmit secret messages using stego media over a communication channel. There is a need for a method to improve resistance to reduce the risk of exposure to third parties. To safely hide secret messages, I propose new algorithms that go through crossing, encryption, chaos and concealment steps. After separating Hangul syllables into choseong, jungseong and jongseong, the bitwised message information is encrypted. After applying the logistic map, bitwised information is reconstructed using the position of the chaotic sequence. The secret message is inserted into the randomly selected RGB channel. PSNR and SSIM were used to confirm the effectiveness of the applied results. It was confirmed as 44.392(dB) and 0.9884, respectively.

Non-natural Image Steganography Based on Noise Visibility Function(NVF) (Noise Visibility Function(NVF)를 이용한 비자연 영상에서의 스테가노그래피)

  • 홍지희;권오진
    • Proceedings of the IEEK Conference
    • /
    • 2003.07e
    • /
    • pp.1807-1810
    • /
    • 2003
  • Steganography based on Just Noticeable Difference(JND) has been used for natural images. However, it has been recognized to have defects for the non-natural images such as scanned text images, cartoons, etc. In this paper, an alternative method is proposed to improve this problem. A new scheme is designed specially for the non-natural images. Instead of JND, Noise Visibility Function(NVF) is used. NVF value and edge strength value of each pixel ate combined to decide the embedding data capacity and the visibility of data embedded images have been improved specially for the non-natural images.

  • PDF

A Study on Steganographic Methods and Its Applications (스테가노그래피 방법과 응용에 관한 연구)

  • Md, Amiruzzaman;Kim, Hyoung-Joong
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.193-196
    • /
    • 2008
  • In this paper a detail study of existing steganographic methods are presented. An example is given of LSB substitution with uncompressed domain i.e., BMP image. In case of compressed domain JPEG image steganography is presented. Almost all popular steganographic algorithms, such as JPEG JSteg, F3, F4 and Selective Block Steganography (SBS) are described. The applications of steganographic methods are also presented briefly.

  • PDF