• Title/Summary/Keyword: 자료은닉

Search Result 124, Processing Time 0.022 seconds

Detecting Steganographic Contents Using EWM Statistics (EWM 통계량을 이용한 스테가노그래픽 자료 감지 기법)

  • Ji, Seon-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.3
    • /
    • pp.54-62
    • /
    • 2008
  • For a message hiding technique to be effectual, it needs to have availability, confidentiality and integrity. Steganography is the science of hiding one message within other types of digital contents. In this case, attempt to defeat steganalysis by restoring the statistics of the composite image to resemble that of the cover, these discrepancies expose the fact that hidden communication is happening. In this paper, I present a steganography scheme capable of concealing a piece of secrete information in a host image and base on the technique's OCT, RGB, statistical restoration.

  • PDF

Detecting Hidden Messages Using CUSUM Steganalysis based on SPRT (SPRT를 기반으로 하는 누적합 스테간 분석을 이용한 은닉메시지 감지기법)

  • Ji, Seon-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.3
    • /
    • pp.51-57
    • /
    • 2010
  • Steganography techniques can be used to hide data within digital images with little or no visible change in the perceived appearance of the image. I propose a steganalysis to detecting hidden message in sequential steganography. This paper presents adjusted technique for detecting abrupt jumps in the statistics of the stego signal during steganalysis. The repeated statistical test based on CUSUM-SPRT runs constantly until it reaches decision. In this paper, I deal with a new and improved statistic $g_t$ by computing $S^{t^*}_j$.

Locating and Searching Hidden Messages in Stego-Images (스테고 이미지에서 은닉메시지 감지기법)

  • Ji, Seon-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.3
    • /
    • pp.37-43
    • /
    • 2009
  • Steganography conceals the fact that hidden message is being sent on the internet. Steganalysis can be detected the abrupt changes in the statistics of a stego-data. After message embedding, I have analyzed for the statistical significance of the fact the occurrence of differences among the four-neighboring pixels. In this case, when a embedding messages within a images is small, use EC value and chi-square test to determine whether a distribution in an images matches a distribution that shows distortion from stego-data.

Steganographic Method Based on Three Directional Embedding (세 방향 자료 은닉이 가능한 이미지 스테가노그래픽기법 연구)

  • Jung, Ki-Hyun;Kim, In-Taek;Kim, Jae-Cheol
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.2
    • /
    • pp.268-274
    • /
    • 2010
  • A steganographic method using three directional data embedding for gray images is presented in this paper. Cover image is divided into non-overlapping $2\times2$ sub-blocks and the basis pixel is selected to calculate the three different values of each sub-block. Difference values are replaced by embedding the number of secret bits that is referenced by the range table. For the three pixel pairs in the sub-block, the optimal pixel adjustment is preceded to reduce the distortion of visual quality. The experimental results show that the proposed method achieves a good visual quality and high capacity.

Image Steganographic Method using Variable Length for Data Embedding (가변 길이 자료 은닉이 가능한 이미지 스테가노그래픽 방법 연구)

  • Jung, Ki-Hyun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.3
    • /
    • pp.115-122
    • /
    • 2008
  • Wu and Tsai's pixel-value differencing method and Chang and Tseng's side-match method are based on the theory that the number of bits which can be embedded is determined by the degree of the pixel's smoothness, or its proximity to the edge of the image. If pixels are located in the edge area, they may tolerate larger changes than those in smooth areas. However, both methods are subject to the fall off the boundary problem(FOBP). This study proposes a new scheme that can solve the FOBP. The experimental results demonstrate that the proposed method resolves the problem, and achieves a higher image quality index value than other methods.

A Data Hiding Method of Binary Images Using Pixel-value Weighting (이진 이미지에 대한 픽셀값 가중치를 이용한 자료 은닉 기법 연구)

  • Jung, Ki-Hyun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.4
    • /
    • pp.68-75
    • /
    • 2008
  • This paper proposes a new data hiding method for binary images using the weighting value of pixel-value differencing. The binary cover image is partitioned into non-overlapping sub-blocks and find the most suitable position to embed a secret bit for each sub-block. The proposed method calculates the weighted value for a sub-block to pivot a pixel to be changed. This improves the image quality of the stego-image. The experimental results show that the proposed method achieves a good visual quality and high capacity.

An Approach of Hiding Hangul Secret Message in Image using XNOR-XOR and Fibonacci Technique (XNOR-XOR과 피보나치 기법을 이용하여 이미지에서 한글 비밀 메시 지를 은닉하는 방법)

  • Ji, Seon-su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.2
    • /
    • pp.109-114
    • /
    • 2021
  • As various users increase in a network environment, it is difficult to protect sensitive and confidential information transmitted and received from attackers. Concealing bitwise secret data in an image using the LSB technique can be very vulnerable to attack. To solve this problem, a hybrid method that combines encryption and information hiding is used. Therefore, an effective method for users to securely protect secret messages and implement secret communication is required. A new approach is needed to improve security and imperceptibility to ensure image quality. In this paper, I propose an LSB steganography technique that hides Hangul messages in a cover image based on MSB and LSB. At this time, after separating Hangul into chosung, jungsung and jongsung, the secret message is applied with Exclusive-OR or Exclusive-NOR operation depending on the selected MSB. In addition, the calculated secret data is hidden in the LSB n bits of the cover image converted by Fibonacci technique. PSNR was used to confirm the effectiveness of the applied results. It was confirmed 41.517(dB) which is suitable as an acceptable result.

Mixed distributions and Laten Process over Nonstationary Rainfall/Flood Frequency Estimates over South Korea: The Role of Large Scale Climate Pattern (혼합 분포와 은닉 과정 모의를 통한 비정상성 강우/빈도 빈도해석: 전지구 기상학적 변동성의 역할)

  • Kwon, Hyun-Han
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2018.05a
    • /
    • pp.8-8
    • /
    • 2018
  • 전통적인 빈도해석은 정상성 가정을 기초로 단일 확률분포를 강우 및 홍수량 자료에 적용하는 과정을 통해 확률수문량을 추정하는 것을 목적으로 하고 있다. 그러나 전지구적인 기상학적 변동성 및 기후변화로 기인하는 극치수문량의 발생 빈도 및 양적 크기의 변화는 확률통계학적 관점에서 서로 다른 분포특성을 가지게 된다. 대표적인 기상변동성인 엘니뇨가 발생하는 경우 지역에 따라 홍수 및 가뭄이 발생 발생하게 되며, 이러한 극치수문량은 일반적으로 나타나는 홍수 및 가뭄의 분포특성과는 상이한 경우가 많다. 즉, 2개 이상의 확률분포 특성이 혼재된 혼합분포의 특성을 가지는 경우가 나타내게 되며 이를 고려한 빈도해석 기법의 개발 및 적용이 필요하다. 혼합분포를 활용한 빈도해석에서 가장 중요한 사항 중에 하나는 개별 분포에 적용되는 가중치를 추정하는 것으로서 통계학적 관점에서 자료의 특성에 근거하여 내재되어 있는 은닉상태(latent process)를 추정하는 과정과 유사하다. 이와 더불어 앞서 언급된 기상학적 변동성을 빈도해석에 반영하기 위한 비정상성 해석기법의 개발 및 적용도 필요하다. 본 연구에서는 혼합분포를 활용한 비정상성빈도해석모형을 개발하는데 목적이 있으며 개별매개변수의 동적거동 뿐만 아니라 가중치에 대한 시간적인 종속성도 고려할 수 있는 모형으로 동적모형으로 다양한 실험적 해석이 가능하다. 본 연구에서는 개발된 모형을 기반으로 엘니뇨와 같은 기상변동성에 따른 강우 및 홍수빈도해석 측면에서 은닉상태에 변화, 이로 인한 확률분포의 특성 및 설계수문량의 동적변동성을 평가하고자 한다.

  • PDF

A Study of Economic Indicator Prediction Model using Dimensions Decrease Techniques and HMM (차원감소기법과 은닉마아코프모델을 이용한 경기지표 예측 모델 연구)

  • Jeon, Jin-Ho;Kim, Min-Soo
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.305-311
    • /
    • 2013
  • The size of the market as the economy continues to evolve, in order to make the right decisions to accurately predict the economic problems the market has emerged as an important issues. To express the modern economic system, the largest of the various economic indicators, pillars stock indicators analysis and decision-making with a proper understanding of the problem for the application of the model is suitable for time-series data concealment HMM. Based on this time series model and the calculation of the time and cost savings dimension decrease techniques for the estimation and prediction of the model was applied to the problem was to verify the validity. As a result, the model predictions in both the short term rather than long-term predictions of the model estimates the optimal predictive value similar pattern very similar to both the actual data and was able to confirm that.

은닉형 악성코드를 활용한 공격 사례 분석과 대응방안에 대한 고찰

  • Ji, Seon-Hak;Park, Ji-Yun;Lee, Jae-Woo
    • Review of KIISC
    • /
    • v.26 no.1
    • /
    • pp.92-98
    • /
    • 2016
  • IT기술이 발달함에 따라서 데이터는 대량화, 다양화 되었다. 그에 따라서 이를 침해하려는 다양한 공격기술들이 등장하고 있다. 특히, 지능형 타깃 지속 공격이라는 APT(Advanced Persistent Threat) 공격은 날로 발전하고 있다. APT공격 중에서도 특히 은닉형 악성코드를 이용한 공격들이 많이 등장하고 있다. 은닉형 악성코드는 사용자가 인식하지 못하도록 보안시스템을 우회하고, 중요 데이터의 수집 및 유출을 위하여 교묘하게 시스템에 숨어들어 악의적인 행위를 하는 형태의 악성코드를 말한다. 이러한 고도화된 악의적인 행위를 하는 악성코드를 탐지하고, 대응하기 위한 기술들은 아직까지 부족한 것이 현실이다. 본 논문에서 대표적인 은닉형 악성코드와 공격사례를 분석하여 이를 대응할 수 있는 방안을 고찰해본다. 또한 이를 통하여 고도화된 공격기술들에 대해 예방하고 대응하는 자료로 활용 가능하다.