• Title/Summary/Keyword: Image hiding

Search Result 223, Processing Time 0.019 seconds

Data-Hiding Method using Digital Watermark in the Public Multimedia Network

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of Information Processing Systems
    • /
    • v.2 no.2
    • /
    • pp.82-87
    • /
    • 2006
  • In spite of the rapid development of the public network, the variety of network-based developments currently raises numerous risks factors regarding copyright violation, the prohibition and distribution of digital media utilization, safe communication, and network security. Among these problems, multimedia data tend to increase in the distributed network environment. Hence, most image information has been transmitted in the form of digitalization. Therefore, the need for multimedia contents protection must be addressed. This paper is focused on possible solutions for multimedia contents security in the public network in order to prevent data modification by non-owners and to ensure safe communication in the distributed network environment. Accordingly, the Orthogonal Forward Wavelet Transform-based Scalable Digital Watermarking technique is proposed in this paper.

Robust Algorithm using SVD for Data Hiding in the Color Image against Various Attacks (특이값 분해를 이용한 다양한 이미지 변화에 강인한 정보 은닉 알고리즘)

  • Lee, Donghoon;Heo, Jun
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2011.07a
    • /
    • pp.28-30
    • /
    • 2011
  • 본 논문에서는 특이값 분해(Singular Value Decomposition)을 이용하여 이미지의 주파수 영역 내에 정보를 은닉하는 방법을 제시한다. 이미지를 주파수 영역으로 변환하기 위하여 블록 단위로 이산 코사인 변환(Discrete Cosine Transform)을 수행한다. 이후 인접한 네 블록의 DC 값들로 구성된 행렬의 특이값을 은닉하고자 하는 정보에 따라 변환한다. 원래의 DC 값은 정보에 따라 변환된 DC 값으로 대체되고 역 이산 코사인 변환(Inverse Discrete Cosine Transform)을 수행하여 정보가 은닉된 이미지를 얻는다. 제안하는 알고리즘의 성능을 분석하기 위해 JPEG(Joint Photographic Coding Experts Group), 선명화(Sharpening), 히스토그램 등화(Histogram Equalization)와 같이 다양한 이미지 변화를 거친 후, 은닉된 정보의 신뢰도를 비교한다.

  • PDF

Quantization Index Modulation Data Hiding Algorithm robust against Image Format Variation (이미지 포맷변환에 강인한 양자화 인덱스 변조 기반의 정보은닉 알고리즘)

  • Baik, Jong Hyun;Shin, Jeong Hwan;Heo, Jun
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2011.07a
    • /
    • pp.25-27
    • /
    • 2011
  • 본 논문에서는 이미지 블록의 평균 픽셀 값 특성을 양자화 인덱스 변조 기법에 적용하여 이미지 포맷변환에 강인한 정보은닉 기법을 제안한다. 포맷변환에 강인한 이미지 속성은 정규화된 픽셀 히스토그램에 기반하여 분석되며, 그 중 평균 픽셀 값을 통해 정보은닉 알고리즘이 구성된다. 평균 픽셀 값을 양자화 인덱스 변조기법에 적용하기 위한 방안으로 DCT 계수를 정규화 하는 방법이 선택되며, 추출 성공률을 높이기 위해 오류정정부호가 사용된다. 따라서 본 논문의 알고리즘을 통해 결합 이미지가 압축, 사이즈 변화 등의 과정을 거치게 될 경우 발생하는 문제점을 극복할 수 있다.

  • PDF

Pixel value prediction algorithm using three directional edge characteristics and similarity between neighboring pixels

  • Jung, Soo-Mok
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.1
    • /
    • pp.61-64
    • /
    • 2018
  • In this paper, a pixel value prediction algorithm using edge components in three directions is proposed. There are various directional edges and similarity between adjacent pixels in natural images. After detecting the edge components in the x-axis direction, the y-axis direction, and the diagonal axis direction, the pixel value is predicted by applying the detected edge components and similarity between neighboring pixels. In particular, the predicted pixel value is calculated according to the intensity of the edge component in the diagonal axis direction. Experimental results show that the proposed algorithm can effectively predict pixel values. The proposed algorithm can be used for applications such as reversible data hiding, reversible watermarking to increase the number of embedded data.

Steganography based Multi-modal Biometrics System

  • Go, Hyoun-Joo;Moon, Dae-Sung;Moon, Ki-Young;Chun, Myung-Geun
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.7 no.1
    • /
    • pp.71-76
    • /
    • 2007
  • This paper deals with implementing a steganography based multi-modal biometric system. For this purpose, we construct a multi-biometrics system based on the face and iris recognition. Here, the feature vector of iris pattern is hidden in the face image. The recognition system is designed by the fuzzy-based Linear Discriminant Analysis(LDA), which is an expanded approach of the LDA method combined by the theory of fuzzy sets. Furthermore, we present a watermarking method that can embed iris information into face images. Finally, we show the advantages of the proposed watermarking scheme by computing the ROC curves and make some comparisons recognition rates of watermarked face images with those of original ones. From various experiments, we found that our proposed scheme could be used for establishing efficient and secure multi-modal biometric systems.

An Adaptive JPEG Steganographic Method Based on Weight Distribution for Embedding Costs

  • Sun, Yi;Tang, Guangming;Bian, Yuan;Xu, Xiaoyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2723-2740
    • /
    • 2017
  • Steganographic schemes which are based on minimizing an additive distortion function defined the overall impacts after embedding as the sum of embedding costs for individual image element. However, mutual impacts during embedding are often ignored. In this paper, an adaptive JPEG steganographic method based on weight distribution for embedding costs is proposed. The method takes mutual impacts during embedding in consideration. Firstly, an analysis is made about the factors that affect embedding fluctuations among JPEG coefficients. Then the Distortion Update Strategy (DUS) of updating the distortion costs is proposed, enabling to dynamically update the embedding costs group by group. At last, a kind of adaptive JPEG steganographic algorithm is designed combining with the update strategy and well-known additive distortion function. The experimental result illustrates that the proposed algorithm gains a superior performance in the fight against the current state-of-the-art steganalyzers with high-dimensional features.

A Study on a Digital Watermarking Method for Still Images

  • Onuki, Tomokazu;Adachi, Takeharu;Hasegawa, Madoka;Kato, Shigeo
    • Proceedings of the IEEK Conference
    • /
    • 2000.07a
    • /
    • pp.19-22
    • /
    • 2000
  • In this paper, we propose a watermarking method for still images using Discrete Cosine Transform (DCT). Watermarking is a copyright protection technique for digital contents by hiding secret information into the contents. The proposed method embeds the watermark information into DCT coefficients. To obtain a watermarked image that is not only high quality but also has robustness for compression, we considered a method to change the degree of embedding by utilizing the activity of each DCT block. The simulation results show that the proposed scheme can obtain huh quality watermarked images and we can extract most of the embedded data even if they are compressed by JPEG scheme.

  • PDF

The Study of Stable Child English Education Content Using Augmented Reality Solving the Hide of Marker (마커의 가려짐을 해결하여 증강현실을 이용한 안정적 영어 학습 컨텐츠에 대한 연구)

  • Jeon, Soo-Jin;Kim, Young-Seop
    • Journal of the Semiconductor & Display Technology
    • /
    • v.9 no.4
    • /
    • pp.99-102
    • /
    • 2010
  • In this study, the 3- dimensional (3-D) learning contents are suggested using 'Augmented Reality' instead of existing 2-dimensional (2-D) learning methods. At the present, there are some 2-D learning methods using texts, image, pictures, and videos called e-learning. However, these one-way 2-D methods have some disadvantages such as declining learner's immersion and concentration. Thus, the 3-D learning contents using 'Augmented Reality' are suggested to compensate the disadvantages. According to the development of information technology (IT), the augmented reality has many applications to the era of ubiquitous. However, there are some disadvantages when learners use these contents as following; non-augmenting by partially hiding from makers and declining concentration by patterns of the makers. In this study, the beneficial marker which can solve this non-augmenting phenomenon is suggested.

A Method of Combining Scrambling Technology with Error Control Coding to Realize Both Confidentiality and Reliability in Wireless M2M Communication

  • Zhang, Meng;Wang, Zhe;Guo, Menghan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.162-177
    • /
    • 2012
  • In this paper we present a novel method of applying image scrambling technology which belongs to the information hiding field in the error control coding to introduce confidentiality in wireless machine to machine communication. The interleaver in serial concatenated convolutional codes, which is the key module in overcoming burst errors, is deliberately designed with the scrambling function to provide a low error rate for those authorized transceivers. By contrast, the unauthorized transceivers without keys would get so high an error rate that decoding bits could bring little value, thus realizing both the confidentiality and reliability in wireless machine to machine communication.

Data Hiding Scheme for Few-Color Image Using Weight Matrix (가중치 행렬을 이용한 다치 컬러 영상의 데이터 은닉 기법)

  • Ha, Soon-Hye;Park, Young-Ran;Park, Ji-Hwan
    • Annual Conference of KIPS
    • /
    • 2004.05a
    • /
    • pp.1035-1038
    • /
    • 2004
  • 스테가노그라피는 비밀 정보를 이미지나 오디오, 비디오 또는 텍스트 등 커버(cover) 라고 불리는 다른 미디어에 숨겨서 전송하는 방법으로 제 3자는 정보가 숨겨져 있다는 사실 자체를 알지 못하도록 하는 것이다. 대부분 영상 데이터를 이용하고 있으나, 제한된 색으로만 구성된 이진 영상 및 다치 영상의 경우 비시각적으로 비밀 정보를 숨기는 것이 일반 컬러 또는 그레이 영상에 비해 어려움이 있다. 본 논문에서는 가중치 테이블을 사용하여 영상의 한 블록에 최대 2비트만을 변경시키면서 많은 양의 정보를 숨기는 방법을 제안한다.

  • PDF