• Title/Summary/Keyword: Image hiding

Search Result 223, Processing Time 0.025 seconds

A Data Hiding Scheme for Binary Image Authentication with Small Image Distortion (이미지 왜곡을 줄인 이진 이미지 인증을 위한 정보 은닉 기법)

  • Lee, Youn-Ho;Kim, Byoung-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.2
    • /
    • pp.73-86
    • /
    • 2009
  • This paper proposes a new data hiding scheme for binary image authentication with minimizing the distortion of host image. Based on the Hamming-Code-Based data embedding algorithm, the proposed scheme makes it possible to embed authentication information into host image with only flipping small number of pixels. To minimize visual distortion, the proposed scheme only modifies the values of the flippable pixels that are selected based on Yang et al's flippablity criteria. In addition to this, by randomly shuffling the bit-order of the authentication information to be embedded, only the designated receiver, who has the secret key that was used for data embedding, can extract the embedded data. To show the superiority of the proposed scheme, the two measurement metrics, the miss detection rate and the number of flipped pixels by data embedding, are used for the comparison analysis between the proposed scheme and the previous schemes. As a result of analysis, it has been shown that the proposed scheme flips smaller number of pixels than the previous schemes to embed the authentication information of the same bit-length. Moreover, it has been shown that the proposed scheme causes smaller visual distortion and more resilient against recent steg-analysis attacks than the previous schemes by the experimental results.

A New Reference Pixel Prediction for Reversible Data Hiding with Reduced Location Map

  • Chen, Jeanne;Chen, Tung-Shou;Hong, Wien;Horng, Gwoboa;Wu, Han-Yan;Shiu, Chih-Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.3
    • /
    • pp.1105-1118
    • /
    • 2014
  • In this paper, a new reversible data hiding method based on a dual binary tree of embedding levels is proposed. Four neighborhood pixels in the upper, below, left and right of each pixel are used as reference pixels to estimate local complexity for deciding embeddable and non-embeddable pixels. The proposed method does not need to record pixels that might cause underflow, overflow or unsuitable for embedment. This can reduce the size of location map and release more space for payload. Experimental results show that the proposed method is more effective in increasing payload and improving image quality than some recently proposed methods.

Secret Image Sharing Scheme using Matrix Decomposition and Adversary Structure (행렬 분해와 공격자 구조를 이용한 비밀이미지 공유 기법)

  • Hyun, Suhng-Ill;Shin, Sang-Ho;Yoo, Kee-Young
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.8
    • /
    • pp.953-960
    • /
    • 2014
  • In Shamir's (t,n)-threshold based secret image sharing schemes, there exists a problem that the secret image can be reconstructed when an arbitrary attacker becomes aware of t secret image pieces, or t participants are malicious collusion. It is because that utilizes linear combination polynomial arithmetic operation. In order to overcome the problem, we propose a secret image sharing scheme using matrix decomposition and adversary structure. In the proposed scheme, there is no reconstruction of the secret image even when an arbitrary attacker become aware of t secret image pieces. Also, we utilize a simple matrix decomposition operation in order to improve the security of the secret image. In experiments, we show that performances of embedding capacity and image distortion ratio of the proposed scheme are superior to previous schemes.

The Influence of Quantization Table in view of Information Hiding Techniques Modifying Coefficients in Frequency Domain (주파수 영역 계수 변경을 이용한 정보은닉기술에서의 양자화 테이블의 영향력)

  • Choi, Yong-Soo;Kim, Hyoung-Joong;Park, Chun-Myoung
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.1
    • /
    • pp.56-63
    • /
    • 2009
  • Nowdays, Most of Internet Contents delivered as a compressed file. It gives many advantages like deduction of communication bandwidth and transmission time etc. In case of JPEG Compression, Quantization is the most important procedure which accomplish the compression. In general signal processing, Quantization is the process which converts continuous analog signal to discrete digital signal. As you known already, Quantization over JPEG compression is to reduce magnitude of pixel value in spatial domain or coefficient in frequency domain. A lot of Data Hiding algorithms also developed to applicable for those compressed files. In this paper, we are going to unveil the influence of quantization table which used in the process of JPEG compression. Even thought most of algorithm modify frequency coefficients with considering image quality, they are ignoring the influence of quantization factor corresponding with the modified frequency coefficient. If existing algorithm adapt this result, they can easily evaluate their performances.

High-Capacity Robust Image Steganography via Adversarial Network

  • Chen, Beijing;Wang, Jiaxin;Chen, Yingyue;Jin, Zilong;Shim, Hiuk Jae;Shi, Yun-Qing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.366-381
    • /
    • 2020
  • Steganography has been successfully employed in various applications, e.g., copyright control of materials, smart identity cards, video error correction during transmission, etc. Deep learning-based steganography models can hide information adaptively through network learning, and they draw much more attention. However, the capacity, security, and robustness of the existing deep learning-based steganography models are still not fully satisfactory. In this paper, three models for different cases, i.e., a basic model, a secure model, a secure and robust model, have been proposed for different cases. In the basic model, the functions of high-capacity secret information hiding and extraction have been realized through an encoding network and a decoding network respectively. The high-capacity steganography is implemented by hiding a secret image into a carrier image having the same resolution with the help of concat operations, InceptionBlock and convolutional layers. Moreover, the secret image is hidden into the channel B of carrier image only to resolve the problem of color distortion. In the secure model, to enhance the security of the basic model, a steganalysis network has been added into the basic model to form an adversarial network. In the secure and robust model, an attack network has been inserted into the secure model to improve its robustness further. The experimental results have demonstrated that the proposed secure model and the secure and robust model have an overall better performance than some existing high-capacity deep learning-based steganography models. The secure model performs best in invisibility and security. The secure and robust model is the most robust against some attacks.

The Evaluation Method for Viewing Angle Image Control (VIC) Technology

  • Kwon, Jung-Bum;Park, Seung-Chul;Le, Don-Gyou;Lee, Lim-Soo;Ahn, Byung-Chul
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2008.10a
    • /
    • pp.700-702
    • /
    • 2008
  • A new evaluation method which named 'Security Viewing Angle Factor (SVAF)' was suggested for VIC (Viewing-angle Image Control) technology to quantify a visual hiding performance of LCD. Currently, Contrast Ration (CR) is the general method to evaluate VIC technology. However, CR shows a significant difference when compared with the result of human visual system. Furthermore, a perceptional evaluation method and its conditions were established.

  • PDF

Information Hiding Using Multi-Level Dithering Image (다치 디더링 화상을 이용한 정보 은닉 기법)

  • 박영란;이혜란;박지환
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2000.11a
    • /
    • pp.530-533
    • /
    • 2000
  • 암호 통신의 한 방법인 화상 심층암호(image steganography)는 화상 내에 기밀정보를 몰래 숨겨서 전송하는 것으로 표면상은 의미 있는 형태를 유지하지만, 실제로는 그 속에 기밀 정보를 몰래 은닉하는 형태로서 제3자는 기밀 정보의 존재 여부를 확인할 수 없기 때문에 공격의 위협을 감소시킬 수 있다. 특히 디지털 화상을 이용하는 화상 심층암호는 저작권 보호 수단으로 활용되고 있다. 본 논문은 256레벨의 그레이 화상에 다치 오차확산법을 이용하여 디더링을 수행하는 단계에서 기밀 정보를 은닉하는 새로운 방법을 제안한다

  • PDF

Biometric Features and Responsible Person Information Hiding by Watermarking Technique (워터마킹 기법을 이용한 생체정보와 취급자 정보의 은닉)

  • Lee, Wook-Jae;Lee, Dae-Jong;Park, Jin-Il;Cho, Jae-Hoon;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.1
    • /
    • pp.75-82
    • /
    • 2009
  • This paper propose a method to hide not only biometric features in the biometric image such as face and fingerprint for protecting them from unauthorized entity but also information of responsible person expressed as binary image which can be used to identify the responsibility of divulgence. For this, we investigate the recognition rates and bit error rates of extracted responsible person information watermark for the cases of using face and fingerprint images as cover images for fingerprint and face recognition which are the most popular biometric techniques. From these experiments, we confirm that the proposed method can be used for various application requiring to protect personal biometric information

Research on Steganography in Emulab Testbed (Emulab 테스트베드 환경에서의 분산 스테가노그래피 연구)

  • Jung, Ki-Hyun;Seok, Woo-Jin
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.11
    • /
    • pp.79-84
    • /
    • 2015
  • Steganography is to conceal the existence of secrete data itself. The Emulab is a framework to provide real systems and network topology that can set up at anytime by researchers. In this paper, we show that steganography techniques can be applied in the Emulab environment. Steganography methods are evaluated on a standalone and sharing environments using the color bitmap images. The cover image is divided into RGB channels and then embedded the secret data at each client. The experimental results demonstrate that execution time is better in client/server environment as cover image size is increasing.

A Position Information Hiding in Road Image for Road Furniture Monitoring (도로시설물 모니터링을 위한 도로영상 내 위치정보 은닉)

  • Seung, Teak-Young;Lee, Suk-Hwan;Kwon, Ki-Ryong;Moon, Kwang-Seok
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.4
    • /
    • pp.430-443
    • /
    • 2013
  • The recognition of current position and road surrounding of car is very important to driver for safe driving. This paper presents the recognition technique of the road traveling environment using position information hiding and viewpoint transform that monitors the information of road furniture and signature and notifies them to driver. The proposed scheme generates the road images into which the position information are hided, from car camera and GPS module and provides the road information to driver through the viewpoint transformation and the road signature detection. The driving tests with camera and GPS module verified that the position information hiding takes about 66.5ms per frame, the detection rate of road signature is about 95.83%, and the road signature detection takes about 227.45ms per frame. Therefore, we know that the proposed scheme can recognize the road traveling environment on the road video with 15 frame rate.