• Title/Summary/Keyword: Image hiding

Search Result 223, Processing Time 0.032 seconds

Research Trends in Steganography Based on Artificial Intelligence (인공지능 기반 스테가노그래피 생성 기술 최신 연구 동향)

  • Hyun Ji Kim;Se Jin Lim;Duk Young Kim;Se Young Yoon;Hwa Jeong Seo
    • Smart Media Journal
    • /
    • v.12 no.4
    • /
    • pp.9-18
    • /
    • 2023
  • Steganography is a technology capable of protecting data by hiding the existence of data. Recently, with the development of deep learning technology, deep learning-based steganography are being developed. Deep learning can learn by analyzing high-dimensional features of data, so it can improve the performance and quality of steganography. In this paper, we investigated the research trend of image steganography based on deep learning.

Processing Techniques of Layer Channel Image for 3D Image Effects (3D 영상 효과를 위한 레이어 채널 이미지의 처리 기법)

  • Choi, Hak-Hyun;Kim, Jung-Hee;Lee, Myung-Hak
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.1
    • /
    • pp.272-281
    • /
    • 2008
  • A layer channel, which can express effects on 3D image, is inserted to use it on application rendering effectively. The current method of effect rendering requires individual sources in storage and image processing, because it uses individual and mixed management of images and effects. However, we can save costs and improve results in images processing by processing both image and layer channels together. By changing image format to insert a layer channel in image and adding a hide function to conceal the layer channel and control to make it possible to approach image and layer channels simultaneously during loading image and techniques hiding the layer channel by changing image format with simple techniques, like alpha blending, etc., it is developed to improve reusability and be able to be used in all programs by combining the layer channel and image together, so that images in changed format can be viewed in general image viewers. With the configuration, we can improve processing speed by introducing image and layer channels simultaneously during loading images, and reduce the size of source storage space for layer channel images by inserting a layer channel in 3D images. Also, it allows managing images in 3D image and layer channels simultaneously, enabling effective expressions, and we can expect to use it effectively in multimedia image used in practical applications.

The Large Capacity Steganography Using Adaptive Threshold on Bit Planes (비트 플레인별 적응적 임계값을 이용한 대용량 스테가노그라피)

  • Lee, Sin-Joo;Jung, Sung-Hwan
    • The KIPS Transactions:PartB
    • /
    • v.11B no.4
    • /
    • pp.395-402
    • /
    • 2004
  • In this paper, we proposed a new method of the large capacity steganography using adaptive threshold on bit planes. Applying fixing threshold, if we insert information into all bit planes, all bit planes showed different image quality. Therefore, we first defined the bit plane weight to solve the fixing threshold problem. We then proposed a new adaptive threshold method using the bit plane weight and the average complexity to increase insertion capacity adaptively. In the experiment, we inserted information into the standard images with the same image quality and same insertion capacity, and we analyzed the insertion capacity and image duality. As a result, the proposed method increased the insertion capacity of about 6% and improved the image quality of about 24dB than fixed threshold method.

Image Watermarking for Identification Forgery Prevention (신분증 위변조 방지를 위한 이미지 워터마킹)

  • Nah, Ji-Hah;Kim, Jong-Weon;Kim, Jae-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.12
    • /
    • pp.552-559
    • /
    • 2011
  • In this paper, a new image watermarking algorithm is proposed which can hide specific information of an ID card's owner in photo image for preventing ID's photo forgery. Proposed algorithm uses the image segmentation and the correlation peak position modulation of spread spectrum. The watermark embedded in photo ensures not only robustness against printing and scanning but also sufficient information capacity hiding unique number such as social security numbers in small-sized photo. Another advantage of proposed method is extracting accurate information with error tolerance within some rotation range by using $2^h{\times}2^w$ unit sample space not instead $1{\times}1$ pixels for insertion and extraction of information. 40 bits information can be embedded and extracted at $256{\times}256$ sized ID photo with BER value of 0 % when the test condition is 300dpi scanner and photo printer with 22 photos. In conclusion, proposed algorithm shows the robustness for noise and rotational errors occured during printing and scanning.

Hardware Implementation of Chaotic System for Security of JPEG2000 (JPEG2000의 보안을 위한 카오스 시스템의 하드웨어 구현)

  • Seo Young-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.12C
    • /
    • pp.1193-1200
    • /
    • 2005
  • In this paper, we proposed an image hiding method which decreases the amount of calculation encrypting partial data rather than the whole image data using a discrete wavelet transform and a linear scalar quantization which have been adopted as the main technique in JPEG2000 standard and then implemented the proposed algorithm to hardware. A chaotic system was used instead of encryption algorithms to reduce further amount of calculation. It uses a method of random changing method using the chaotic system of the data in a selected subband. For ciphering the quantization index it uses a novel image encryption algorithm of cyclical shifting to the right or left direction and encrypts two quantization assignment method (Top-down coding and Reflection coding), made change of data less. The experiments have been performed with the proposed methods implemented in software for about 500 images. The hardware encryption system was synthesized to find the gate-level circuit with the Samsung $0.35{\mu}m$ Phantom-cell library and timing simulation was performed, which resulted in the stable operation in the frequency above 100MHz.

3D Medical Image Data Watermarking Applied to Healthcare Information Management System (헬스케어 정보 관리 시스템의 3D 의료영상 데이터 다중 워터마킹 기법)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.11A
    • /
    • pp.870-881
    • /
    • 2009
  • The rapid development of healthcare information management for 3D medical digital library, 3D PACS and 3D medical diagnosis has addressed security issues with medical IT technology. This paper presents multiple 3D medical image data for protection, authentication, indexing and diagnosis information hiding applied to healthcare information management. The proposed scheme based on POCS watermarking embeds the robust watermark for doctor's digital signature and information retrieval indexing key to the distribution of vertex curvedness and embeds the fragile watermark for diagnosis information and authentication reference message to the distance difference of vertex. The multiple embedding process designs three convex sets for robustness, fragileness and invisibility and projects 3D medical image data onto three convex sets alternatively and iteratively. Experimental results confirmed that the proposed scheme has the robustness and fragileness to various 3D geometric and mesh modifiers at once.

A Proactive Secret Image Sharing Scheme over GF(28) (유한 체상에서의 사전 비밀이미지 공유 기법)

  • Hyun, Suhng-Ill;Shin, Sang-Ho;Yoo, Kee-Young
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.5
    • /
    • pp.577-590
    • /
    • 2013
  • Shamir's (k,n)-threshold secret sharing scheme is not secure against cheating by attacker because the signature of participants is omitted. To prevent cheating, many schemes have been proposed, and a proactive secret sharing is one of those. The proactive secret sharing is a method to update shares in the secret sharing scheme at irregular intervals. In this paper, a proactive image secret sharing scheme over $GF(2^8)$ is proposed for the first time. For the past 30 years, Galois field operation is widely used in order to perform the efficient and secure bit operation in cryptography, and the proposed scheme with update phase of shadow image over $GF(2^8)$) at irregular intervals provides the lossless and non-compromising of secret image. To evaluate security and efficiency of images (i.e. cover and shadow images) distortion between the proposed scheme and the previous schemes, embedding capacity and PSNR are compared in experiments. The experimental results show that the performances of the embedding capacity and image distortion ratio of the proposed scheme are superior to the previous schemes.

A Statistical Approach for Improving the Embedding Capacity of Block Matching based Image Steganography (블록 매칭 기반 영상 스테가노그래피의 삽입 용량 개선을 위한 통계적 접근 방법)

  • Kim, Jaeyoung;Park, Hanhoon;Park, Jong-Il
    • Journal of Broadcast Engineering
    • /
    • v.22 no.5
    • /
    • pp.643-651
    • /
    • 2017
  • Steganography is one of information hiding technologies and discriminated from cryptography in that it focuses on avoiding the existence the hidden information from being detected by third parties, rather than protecting it from being decoded. In this paper, as an image steganography method which uses images as media, we propose a new block matching method that embeds information into the discrete wavelet transform (DWT) domain. The proposed method, based on a statistical analysis, reduces loss of embedding capacity due to inequable use of candidate blocks. It works in such a way that computes the variance of each candidate block, preserves candidate blocks with high frequency components while reducing candidate blocks with low frequency components by compressing them exploiting the k-means clustering algorithm. Compared with the previous block matching method, the proposed method can reconstruct secret images with similar PSNRs while embedding higher-capacity information.

An Efficient Pixel Value Prediction Algorithm using the Similarity and Edge Characteristics Existing in Neighboring Pixels Scanned in Inverse s-order (역 s-순으로 스캔된 주변 픽셀들에 존재하는 유사성과 에지 특성을 이용한 효율적인 픽셀 값 예측 기법)

  • Jung, Soo-Mok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.1
    • /
    • pp.95-99
    • /
    • 2018
  • In this paper, we propose an efficient pixel value prediction algorithm that can accurately predict pixel value using neighboring pixel values scanned in reverse s-order in the image. Generally, image has similarity with similar values between adjacent pixel values, and may have directional edge characteristics. In this paper, we proposed a method to improve pixel value prediction accuracy by improving GAP(Gradient Adjacent Pixel) algorithm for predicting pixel value by using similarity between adjacent pixels and edge characteristics. The proposed method increases the accuracy of the predicted pixel value by precisely predicting the pixel value using the positional weights of the neighboring pixels. Experiments on real images confirmed the superiority of the proposed algorithm. The proposed algorithm is useful for applications such as reversible data hiding, reversible watermarking, and data compression applications.

Projection-Based Diminished Reality System (프로젝션 기반의 감소현실 시스템)

  • Lee, Seung-Hoon;Park, Han-Hoon;Seo, Byung-Kuk;Park, Jong-Il
    • Journal of the Korea Computer Graphics Society
    • /
    • v.13 no.2
    • /
    • pp.55-60
    • /
    • 2007
  • Diminished reality (DR) is a technique that provide a visual convenience by virtually hiding an object. Most of existing DR systems have been implemented based on HMDs or desktop displays. However, Here has been no report on the development of DR system based on projection displays due to technical difficulty in spite of its superiority in the aspect of human factor to conventional displays. Rapid advances of projection displays and projection-based vision technologies motivated us to develop a projection-based DR system. As the first attempt, this paper proposes a projection-based diminished reality system using an image completion technique. Its usefulness is demonstrated through experiments and its potential applications are discussed.

  • PDF