• 제목/요약/키워드: Data embedding technique

검색결과 101건 처리시간 0.025초

웨이블릿 영역에서 히스토그램 수정을 이용한 무손실 정보은닉 (Lossless Data Hiding Using Modification of Histogram in Wavelet Domain)

  • 정철호;엄일규;김유신
    • 대한전자공학회논문지SP
    • /
    • 제43권4호
    • /
    • pp.27-36
    • /
    • 2006
  • 무손실 정보은닉은 정보를 삽입하되 추출과정에서 원본 영상으로의 완벽한 복원이 가능하도록 정보를 삽입하는 기술이다. 본 논문에서는 웨이블릿 영역에서 영상에 대한 무손실 정보은닉 알고리즘을 제안한다. 제안된 알고리즘은 히스토그램 수정을 웨이블릿 계수에 적용한 방법으로 두 단계의 삽입과정으로 이루어진다. 1차 삽입과정에서 히스토그램을 수정함으로써 웨이블릿 계수에 정보를 은닉한다. 2차 삽입과정은 1차 삽입 과정에서 발생한 영상의 왜곡을 줄이는 동시에 정보를 은닉할 수 있는 방법으로 높은 삽입용량을 얻을 수 있게 한다. 제안 알고리즘은 모의실험을 통해 기존의 방법들보다 삽입용량 대 PSNR 측면에 서 향상된 성능을 보여주었다.

디지털 영상물의 저작권 보호를 위한 워터마크 기술에 관한 연구 (A Study on Watermark Technique for Copyright Protection of Digital Images)

  • 홍민석;박강서;정태윤;신중인;박상희
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1998년도 추계학술대회 논문집 학회본부 B
    • /
    • pp.606-608
    • /
    • 1998
  • Digital watermarking is the technique which embeds the invisible signal into multimedia data such as audio, video, images, for copyright protection, including owner identification and copy control information. In this paper, a new watermark detection algorithm by local masking cross covariance between watermarked signal and pseudo noise signal is proposed. The proposed algorithm enhances the detection probability for embedding information. Since reducing detection errors for the weak embedding signals, the algorithm improves the image quality and robusts against illegal attack to delete the embedding information and data compression applications such as JPEG and MPEGs.

  • PDF

A Generalized Image Interpolation-based Reversible Data Hiding Scheme with High Embedding Capacity and Image Quality

  • Tsai, Yuan-Yu;Chen, Jian-Ting;Kuo, Yin-Chi;Chan, Chi-Shiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권9호
    • /
    • pp.3286-3301
    • /
    • 2014
  • Jung and Yoo proposed the first image interpolation-based reversible data hiding algorithm. Although their algorithm achieved superior interpolation results, the embedding capacity was insufficient. Lee and Huang proposed an improved algorithm to enhance the embedding capacity and the interpolation results. However, these algorithms present limitations to magnify the original image to any resolution and pixels in the boundary region of the magnified image are poorly manipulated. Furthermore, the capacity and the image quality can be improved further. This study modifies the pixel mapping scheme and adopts a bilinear interpolation to solve boundary artifacts. The modified reference pixel determination and an optimal pixel adjustment process can effectively enhance the embedding capacity and the image quality. The experimental results show our proposed algorithm achieves a higher embedding capacity under acceptable visual distortions, and can be applied to a magnified image at any resolution. Our proposed technique is feasible in reversible data hiding.

Reversible Data Hiding in Block Truncation Coding Compressed Images Using Quantization Level Swapping and Shifting

  • Hong, Wien;Zheng, Shuozhen;Chen, Tung-Shou;Huang, Chien-Che
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권6호
    • /
    • pp.2817-2834
    • /
    • 2016
  • The existing reversible data hiding methods for block truncation coding (BTC) compressed images often utilize difference expansion or histogram shifting technique for data embedment. Although these methods effectively embed data into the compressed codes, the embedding operations may swap the numerical order of the higher and lower quantization levels. Since the numerical order of these two quantization levels can be exploited to carry additional data without destroying the quality of decoded image, the existing methods cannot take the advantages of this property to embed data more efficiently. In this paper, we embed data by shifting the higher and lower quantization levels in opposite direction. Because the embedment does not change numerical order of quantization levels, we exploit this property to carry additional data without further reducing the image quality. The proposed method performs no-distortion embedding if the payload is small, and performs reversible data embedding for large payload. The experimental results show that the proposed method offers better embedding performance over prior works in terms of payload and image quality.

MEDLINE 검색을 통한 산업안전보건 분야에서의 인간공학 연구동향 : 워드임베딩을 활용한 초록 단어 모델링을 중심으로 (Research Trends of Ergonomics in Occupational Safety and Health through MEDLINE Search: Focus on Abstract Word Modeling using Word Embedding)

  • 김준희;황의재;안선희;곽경태;정성훈
    • 한국안전학회지
    • /
    • 제36권5호
    • /
    • pp.61-70
    • /
    • 2021
  • This study aimed to analyze the research trends of the abstract data of ergonomic studies registered in MEDLINE, a medical bibliographic database, using word embedding. Medical-related ergonomic studies mainly focus on work-related musculoskeletal disorders, and there are no studies on the analysis of words as data using natural language processing techniques, such as word embedding. In this study, the abstract data of ergonomic studies were extracted with a program written with selenium and BeutifulSoup modules using python. The word embedding of the abstract data was performed using the word2vec model, after which the data found in the abstract were vectorized. The vectorized data were visualized in two dimensions using t-Distributed Stochastic Neighbor Embedding (t-SNE). The word "ergonomics" and ten of the most frequently used words in the abstract were selected as keywords. The results revealed that the most frequently used words in the abstract of ergonomics studies include "use", "work", and "task". In addition, the t-SNE technique revealed that words, such as "workplace", "design", and "engineering," exhibited the highest relevance to ergonomics. The keywords observed in the abstract of ergonomic studies using t-SNE were classified into four groups. Ergonomics studies registered with MEDLINE have investigated the risk factors associated with workers performing an operation or task using tools, and in this study, ergonomics studies were identified by the relationship between keywords using word embedding. The results of this study will provide useful and diverse insights on future research direction on ergonomic studies.

Novel Secure Hybrid Image Steganography Technique Based on Pattern Matching

  • Hamza, Ali;Shehzad, Danish;Sarfraz, Muhammad Shahzad;Habib, Usman;Shafi, Numan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권3호
    • /
    • pp.1051-1077
    • /
    • 2021
  • The secure communication of information is a major concern over the internet. The information must be protected before transmitting over a communication channel to avoid security violations. In this paper, a new hybrid method called compressed encrypted data embedding (CEDE) is proposed. In CEDE, the secret information is first compressed with Lempel Ziv Welch (LZW) compression algorithm. Then, the compressed secret information is encrypted using the Advanced Encryption Standard (AES) symmetric block cipher. In the last step, the encrypted information is embedded into an image of size 512 × 512 pixels by using image steganography. In the steganographic technique, the compressed and encrypted secret data bits are divided into pairs of two bits and pixels of the cover image are also arranged in four pairs. The four pairs of secret data are compared with the respective four pairs of each cover pixel which leads to sixteen possibilities of matching in between secret data pairs and pairs of cover pixels. The least significant bits (LSBs) of current and imminent pixels are modified according to the matching case number. The proposed technique provides double-folded security and the results show that stego image carries a high capacity of secret data with adequate peak signal to noise ratio (PSNR) and lower mean square error (MSE) when compared with existing methods in the literature.

A New Approach for Information Security using an Improved Steganography Technique

  • Juneja, Mamta;Sandhu, Parvinder Singh
    • Journal of Information Processing Systems
    • /
    • 제9권3호
    • /
    • pp.405-424
    • /
    • 2013
  • This research paper proposes a secured, robust approach of information security using steganography. It presents two component based LSB (Least Significant Bit) steganography methods for embedding secret data in the least significant bits of blue components and partial green components of random pixel locations in the edges of images. An adaptive LSB based steganography is proposed for embedding data based on the data available in MSB's (Most Significant Bits) of red, green, and blue components of randomly selected pixels across smooth areas. A hybrid feature detection filter is also proposed that performs better to predict edge areas even in noisy conditions. AES (Advanced Encryption Standard) and random pixel embedding is incorporated to provide two-tier security. The experimental results of the proposed approach are better in terms of PSNR and capacity. The comparison analysis of output results with other existing techniques is giving the proposed approach an edge over others. It has been thoroughly tested for various steganalysis attacks like visual analysis, histogram analysis, chi-square, and RS analysis and could sustain all these attacks very well.

회전 변환에 강인한 주파수 영역 로고 삽입 워터마크 방법 (A Rotation Resistant Logo Embedding Watermark on Frequency Domain)

  • 이인정;이형;유혜림;민준영
    • Journal of Information Technology Applications and Management
    • /
    • 제14권1호
    • /
    • pp.137-144
    • /
    • 2007
  • In this paper, we propose a rotation resistant robust logo embedding watermarking technique. Geometric manipulations make the detection process very complex and difficult. Watermark embedding in the normalized image directly suffers from smoothing effect due to the interpolation during the image normalization. This can be avoided by estimating the transform parameters using image normalization angle and moments, instead of embedding in the normalized image. Conventional rotation resistant schemes that use full frame transform. In this paper we adopt DCT and calculate masking using a spatio-frequency localization of the $8{\times}8$ block DCT coefficients. Experimental results show that the proposed algorithm is robust against rotation process.

  • PDF

UN-Substituted Video Steganography

  • Maria, Khulood Abu;Alia, Mohammad A.;Alsarayreh, Maher A.;Maria, Eman Abu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권1호
    • /
    • pp.382-403
    • /
    • 2020
  • Steganography is the art of concealing the existence of a secret data in a non-secret digital carrier called cover media. While the image of steganography methods is extensively researched, studies on other cover files remain limited. Videos are promising research items for steganography primitives. This study presents an improved approach to video steganography. The improvement is achieved by allowing senders and receivers exchanging secret data without embedding the hidden data in the cover file as in traditional steganography methods. The method is based mainly on searching for exact matches between the secret text and the video frames RGB channel pixel values. Accordingly, a random key-dependent data is generated, and Elliptic Curve Public Key Cryptography is used. The proposed method has an unlimited embedding capacity. The results show that the improved method is secure against traditional steganography attacks since the cover file has no embedded data. Compared to other existing Steganography video systems, the proposed system shows that the method proposed is unlimited in its embedding capacity, system invisibility, and robustness. The system achieves high precision for data recovery in the receiver. The performance of the proposed method is found to be acceptable across different sizes of video files.

지역적 유사성을 이용한 픽셀 값 예측 기법에 기초한 가역 데이터 은닉 알고리즘 (Reversible Data Embedding Algorithm based on Pixel Value Prediction Scheme using Local Similarity in Image)

  • 정수목
    • 한국정보전자통신기술학회논문지
    • /
    • 제10권6호
    • /
    • pp.617-625
    • /
    • 2017
  • 본 논문에서는 기밀 데이터를 커버 이미지에 은닉하는 효과적인 가역 데이터 은닉 기법을 제안하였다. 제안된 기법에서는 이미지에 존재하는 지역적 유사성을 이용하여 픽셀 값을 정확하게 예측하여 예측 이미지를 생성하였고, 생성된 예측 이미지와 원본 커버 이미지를 사용하여 차분 시퀀스를 생성한 후, 히스토그램 쉬프트 기법을 적용하여 기밀데이터가 은닉된 스테고 이미지(stego-image)를 생성하였다. 스테고 이미지로부터 기밀 데이터를 추출하고 원본 커버 이미지를 손실 없이 복원할 수 있다. 제안된 기법을 적용하면 기존의 APD 기법에 비하여 더 많은 기밀 데이터를 은닉할 수 있음을 실험으로 확인하였다.