• 제목/요약/키워드: Hiding Scheme

검색결과 132건 처리시간 0.03초

A High-Quality Image Authentication Scheme for AMBTC-compressed Images

  • Lin, Chia-Chen;Huang, Yuehong;Tai, Wei-Liang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권12호
    • /
    • pp.4588-4603
    • /
    • 2014
  • In this paper, we present a high-quality image authentication scheme based on absolute moment block truncation coding. In the proposed scheme, we use the parity of the bitmap (BM) to generate the authentication code for each compressed image block. Data hiding is used to authenticate whether the content has been altered or not. For image authentication, we embed the authentication code to quantization levels of each image block compressed by absolute moment block truncation coding (AMBTC) which will be altered when the host image is manipulated. The embedding position is generated by a pseudo-random number generator for security concerned. Besides, to improve the detection ability we use a hierarchical structure to ensure the accuracy of tamper localization. A watermarked image can be precisely inspected whether it has been tampered intentionally or incautiously by checking the extracted watermark. Experimental results demonstrated that the proposed scheme achieved high-quality embedded images and good detection accuracy, with stable performance and high expansibility. Performance comparisons with other block-based data hiding schemes are provided to demonstrate the superiority of the proposed scheme.

다중 무선 공유기에서 SSID Hiding 공유 기법을 이용한 대역폭 이용률 극대화 (Maximizing Bandwidth Utilization by Sharing Method of SSID Hiding in Multiple Wireless Routers)

  • 윤영효;김명원;곽후근;정규식
    • 정보처리학회논문지C
    • /
    • 제15C권2호
    • /
    • pp.111-118
    • /
    • 2008
  • 선 공유기란 NAT(Network Address Translation) 기능을 사용하여 여러 무선 사용자가 인터넷회선 하나를 공유할 수 있게 해주는 장치이다. 여러 개의 무선 공유기를 여러 사용자가 공유하여 사용하는 학교 또는 소규모 사무실 환경에서 사용자들은 무선 공유기들을 임의대로 선택하여 사용할 수 있어서 특정 무선 공유기에 사용자들이 몰리는 현상이 발생할 수 있다. 이러한 경우 무선공유기와 사용자들사이에 부하 불균형의 문제가 발생한다. 그로 인하여 생기는 문제점중 하나는 사용자가 몰리는 무선 공유기에 속하는 사용자들의 경우 서비스가 원활하지 않다는 점이다. 또 다른 문제점은 무선 공유기 전체 자원 이용률이 낮다는 점이다. 이 문제들을 해결하는 방법으로 본 논문은 SSID(Service Set IDentifier) Hiding을 이용하여 무선 공유기의 대역폭 이용률을 극대화하는 부하 공유 기법을 제안한다. 제안된 기법에서는 주기적으로 각 무선 공유기들의 사용가능한 대역폭을 확인하여 가장 높은 무선 공유기를 선택한다. 새로운 사용자가 들어오게 되면 그 높은 무선 공유기만 그 사용자에게 보이게 하고 나머지 무선 공유기들은 보이지 않게 한다. 이 동작은 SSID hiding을 이용하여 구현되었다. 제안한 방법을 ASUS WL 500G 무선 공유기를 이용하여 구현하였으며 실험을 수행하였다. 실험을 통해 제안된 방법이 기존 방법에 비해 대역폭 이용률이 향상되었음을 확인하였다.

A Reversible Audio Watermarking Scheme

  • Kim, Hyoung-Joong;Sachnev, Vasiliy;Kim, Ki-Seob
    • 정보통신설비학회논문지
    • /
    • 제5권1호
    • /
    • pp.37-42
    • /
    • 2006
  • A reversible audio watermarking algorithm is presented in this paper. This algorithm transforms the audio signal with the integer wavelet transform first in order to enhance the correlation between neighbor audio samples. Audio signal has low correlation between neighbor samples, which makes it difficult to apply difference expansion scheme. Second, a novel difference expansion scheme is used to embed more data by reducing the size of location map. Therefore, the difference expansion scheme used in this paper theoretically secures high embedding capacity under low perceptual distortion. Experiments show that this scheme can hide large number of information bits and keeps high perceptual quality.

  • PDF

Reversible Watermarking Method Using Optimal Histogram Pair Shifting Based on Prediction and Sorting

  • Hwang, Hee-Joon;Kim, Hyoung-Joong;Sachnev, Vasiliy;Joo, Sang-Hyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제4권4호
    • /
    • pp.655-670
    • /
    • 2010
  • To be reversible as a data hiding method, the original content and hidden message should be completely recovered. One important objective of this approach is to achieve high embedding capacity and low distortion. Using predicted errors is very effective for increasing the embedding capacity. Sorting the predicted errors has a good influence on decreasing distortion. In this paper, we present an improved reversible data hiding scheme using upgraded histogram shifting based on sorting the predicted errors. This new scheme is characterized by the algorithm which is able to find the optimum threshold values and manage the location map effectively. Experimental results compared with other methods are presented to demonstrate the superiority of the proposed method.

Data Hiding in Halftone Images by XOR Block-Wise Operation with Difference Minimization

  • Yang, Ching-Nung;Ye, Guo-Cin;Kim, Cheon-Shik
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권2호
    • /
    • pp.457-476
    • /
    • 2011
  • This paper presents an improved XOR-based Data Hiding Scheme (XDHS) to hide a halftone image in more than two halftone stego images. The hamming weight and hamming distance is a very important parameter affecting the quality of a halftone image. For this reason, we proposed a method that involves minimizing the hamming weights and hamming distances between the stego image and cover image in $2{\times}2$-pixel grids. Moreover, our XDHS adopts a block-wise operation to improve the quality of a halftone image and stego images. Furthermore, our scheme improves security by using a block-wise operation with A-patterns and B-patterns. Our XDHS method achieves a high quality with good security compared to the prior arts. An experiment verified the superiority of our XDHS compared with previous methods.

A Generalized Image Interpolation-based Reversible Data Hiding Scheme with High Embedding Capacity and Image Quality

  • Tsai, Yuan-Yu;Chen, Jian-Ting;Kuo, Yin-Chi;Chan, Chi-Shiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권9호
    • /
    • pp.3286-3301
    • /
    • 2014
  • Jung and Yoo proposed the first image interpolation-based reversible data hiding algorithm. Although their algorithm achieved superior interpolation results, the embedding capacity was insufficient. Lee and Huang proposed an improved algorithm to enhance the embedding capacity and the interpolation results. However, these algorithms present limitations to magnify the original image to any resolution and pixels in the boundary region of the magnified image are poorly manipulated. Furthermore, the capacity and the image quality can be improved further. This study modifies the pixel mapping scheme and adopts a bilinear interpolation to solve boundary artifacts. The modified reference pixel determination and an optimal pixel adjustment process can effectively enhance the embedding capacity and the image quality. The experimental results show our proposed algorithm achieves a higher embedding capacity under acceptable visual distortions, and can be applied to a magnified image at any resolution. Our proposed technique is feasible in reversible data hiding.

Sharing a Large Secret Image Using Meaningful Shadows Based on VQ and Inpainting

  • Wang, Zhi-Hui;Chen, Kuo-Nan;Chang, Chin-Chen;Qin, Chuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권12호
    • /
    • pp.5170-5188
    • /
    • 2015
  • This paper proposes a novel progressive secret image-hiding scheme based on the inpainting technique, the vector quantization technique (VQ) and the exploiting modification direction (EMD) technique. The proposed scheme first divides the secret image into non-overlapping blocks and categorizes the blocks into two groups: complex and smooth. The blocks in the complex group are compressed by VQ with PCA sorted codebook to obtain the VQ index table. Instead of embedding the original secret image, the proposed method progressively embeds the VQ index table into the cover images by using the EMD technique. After the receiver recovers the complex parts of the secret image by decoding the VQ index table from the shadow images, the smooth parts can be reconstructed by using the inpainting technique based on the content of the complex parts. The experimental results demonstrate that the proposed scheme not only has the advantage of progressive data hiding, which involves more shadow images joining to recover the secret image so as to produce a higher quality steganography image, but also can achieve high hiding capacity with acceptable recovered image quality.

New reversible data hiding algorithm based on difference expansion method

  • Kim, Hyoung-Joong;Sachnev, Vasiliy;Kim, Dong-Hoi
    • 방송공학회논문지
    • /
    • 제12권2호
    • /
    • pp.112-119
    • /
    • 2007
  • Reversible data embedding theory has marked a new epoch for data hiding and information security. Being reversible, the original data and the embedded data as well should be completely restored. Difference expansion transform is a remarkable breakthrough in reversible data hiding scheme. The difference expansion method achieves high embedding capacity and keeps the distortion low. This paper shows that the difference expansion method with simplified location map, and new expandability and changeability can achieve more embedding capacity while keeping the distortion almost the same as the original expansion method.

LSB 기법을 이용하는 개선된 오디오 스테가노그래피 (The Improved-Scheme of Audio Steganography using LSB Techniques)

  • 지선수
    • 한국산업정보학회논문지
    • /
    • 제17권5호
    • /
    • pp.37-42
    • /
    • 2012
  • 오디오 스테가노그래피는 오디오 매체(신호)에 암호화된 비밀 메시지를 은닉하여 전송하는 일반적이고, 폭넓게 이용되는 통신기법이다. 인간은 청각시스템의 지각능력의 한계 때문에 커버 오디오 파일과 스테고 오디오 파일의 지각품질(perceptual quality) 차이는 없다. 또한 공격자로부터의 안전성과 견고성 측면에서 LSB 기법은 디지털화된 오디오 신호에 메시지를 삽입하는 효율적이고, 경제적인 방법으로 널리 이용되고 있다. 이 논문에서는 LSB 기법을 기반으로 하고, 디지털화된 비밀 메시지의 비트별 위치를 변경하고, 암호화한 후 커버 오디오 매체에 은닉하는 개선된 방법을 제시한다.

Prediction-based Reversible Data Hiding Using Empirical Histograms in Images

  • Weng, Chi-Yao;Wang, Shiuh-Jeng;Liu, Jonathan;Goyal, Dushyant
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권4호
    • /
    • pp.1248-1266
    • /
    • 2012
  • This paper presents a multilevel reversible data hiding method based on histogram shifting which can recover the original image losslessly after the hidden data has been extracted from the stego-image. The method of prediction is adopted in our proposed scheme and prediction errors are produced to explore the similarity of neighboring pixels. In this article, we propose two different predictors to generate the prediction errors, where the prediction is carried out using the center prediction method and the JPEG-LS median edge predictor (MED) to exploit the correlation among the neighboring pixels. Instead of the original image, these prediction errors are used to hide the secret information. Moreover, we also present an improved method to search for peak and zero pairs and also talk about the analogy of the same to improve the histogram shifting method for huge embedding capacity and high peak signal-to-noise ratio (PSNR). In the one-level hiding, our method keeps image qualities larger than 53 dB and the ratio of embedding capacity has 0.43 bpp (bit per pixel). Besides, the concept with multiple layer embedding procedure is applied for obtaining high capacity, and the performance is demonstrated in the experimental results. From our experimental results and analytical reasoning, it shows that the proposed scheme has higher PSNR and high data embedding capacity than that of other reversible data hiding methods presented in the literature.