• 제목/요약/키워드: Image steganography

검색결과 128건 처리시간 0.02초

자기참조 가상 패리티 비트를 이용한 XOR기반의 고화질 정보은닉 기술 (XOR-based High Quality Information Hiding Technique Utilizing Self-Referencing Virtual Parity Bit)

  • 최용수;김형중;이달호
    • 전자공학회논문지
    • /
    • 제49권12호
    • /
    • pp.156-163
    • /
    • 2012
  • 최근 들어 정보은닉기술에 대한 필요성이 많이 증가되고 있으며 국제치안, 군사 그리고 의료영상 등의 분야에서 그 예를 많이 볼 수 있다. 본 논문에서는 한 픽셀의 다수 MSB(MSBs: Most Significant Bits)의 Parity Bit를 이용하여 gray영상에 대해 정보를 은닉하는 방법을 제안한다. 스테가노그라피(Steganography) 분야에서 많은 연구들이 LSB 대체(Substitution), XOR연산을 채용하여 연구되어왔으며 궁극적인 목적은 낮은 복잡도와 높은 은닉용량, 동시에 화질의 저하를 최소화하는 것이다. 하지만 LSB 대체 방법은 높은 은닉용량을 가짐에도 불구하고 너무나 간단한 작업으로 인해 안전하지 못하다. 또한 XOR연산을 이용한 방법들은 픽셀 수 대비 약 75%의 은닉률을 달성하였다. 제안된 방법에서 각 픽셀의 LSB(Least Significant Bit)는 비밀메시지 1비트와 해당 픽셀의 7 MSBs의 Parity Bit와 XOR 연산된다. 제안한 방법은 대칭키 프로토콜의 개념을 스테가노그라피에 적용한 것이며 대칭키를 자기참조에 의해 생성하도록 하였다. 제시한 방법은 기존의 XOR방법들에 비해 은닉률이 25% 높으며 원본 대비 픽셀의 LSB 반전률이 약 6%정도 개선되는 효과를 보였다.

High capacity multi-bit data hiding based on modified histogram shifting technique

  • Sivasubramanian, Nandhini;Konganathan, Gunaseelan;Rao, Yeragudipati Venkata Ramana
    • ETRI Journal
    • /
    • 제40권5호
    • /
    • pp.677-686
    • /
    • 2018
  • A novel data hiding technique based on modified histogram shifting that incorporates multi-bit secret data hiding is proposed. The proposed technique divides the image pixel values into embeddable and nonembeddable pixel values. Embeddable pixel values are those that are within a specified limit interval surrounding the peak value of an image. The limit interval is calculated from the number of secret bits to be embedded into each embeddable pixel value. The embedded secret bits can be perfectly extracted from the stego image at the receiver side without any overhead bits. From the simulation, it is found that the proposed technique produces a better quality stego image compared to other data hiding techniques, for the same embedding rate. Since the proposed technique only embeds the secret bits in a limited number of pixel values, the change in the visual quality of the stego image is negligible when compared to other data hiding techniques.

An Improved Data Hiding Algorithm for Increasing Hidden Capacity

  • Dae-Jea Cho
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제16권1호
    • /
    • pp.11-16
    • /
    • 2024
  • Illegal manipulation and alteration of digital content are becoming a social issue. To address this problem, there is an increasing demand for the development of technologies to prevent the manipulation and alteration of digital content. This paper proposes a data hiding algorithm capable of embedding a larger amount of confidential data in the original cover image while minimizing the degradation of image quality in stego images. The algorithm presented in this paper analyzes the characteristics of the image to extract corner points and then uses a method to insert watermarks around these extracted corner points. Additionally, through experimentation, it has been proven that this algorithm can insert a greater amount of watermark without degrading the image quality compared to other existing algorithms.

A Data Hiding Scheme for Grayscale Images Using a Square Function

  • Kwon, Hyejin;Kim, Haemun;Kim, Soonja
    • 한국멀티미디어학회논문지
    • /
    • 제17권4호
    • /
    • pp.466-477
    • /
    • 2014
  • Many image hiding schemes based on least significant bit (LSB) transformation have been proposed. One of the LSB-based image hiding schemes that employs diamond encoding was proposed in 2008. In this scheme, the binary secret data is converted into base n representation, and the converted secret data is concealed in the cover image. Here, we show that this scheme has two vulnerabilities: noticeable spots in the stego-image, i.e., a non-smooth embedding result, and inefficiency caused by rough re-adjustment of falling-off-boundary value and impractical base translation. Moreover, we propose a new scheme that is efficient and produces a smooth and high quality embedding result by restricting n to power of 2 and using a sophisticated re-adjustment procedure. Our experimental results show that our scheme yields high quality stego-images and is secure against RS detection attack.

Hiding Secret Data in an Image Using Codeword Imitation

  • Wang, Zhi-Hui;Chang, Chin-Chen;Tsai, Pei-Yu
    • Journal of Information Processing Systems
    • /
    • 제6권4호
    • /
    • pp.435-452
    • /
    • 2010
  • This paper proposes a novel reversible data hiding scheme based on a Vector Quantization (VQ) codebook. The proposed scheme uses the principle component analysis (PCA) algorithm to sort the codebook and to find two similar codewords of an image block. According to the secret to be embedded and the difference between those two similar codewords, the original image block is transformed into a difference number table. Finally, this table is compressed by entropy coding and sent to the receiver. The experimental results demonstrate that the proposed scheme can achieve greater hiding capacity, about five bits per index, with an acceptable bit rate. At the receiver end, after the compressed code has been decoded, the image can be recovered to a VQ compressed image.

계층적 CNN 구조를 이용한 스테가노그래피 식별 (Identification of Steganographic Methods Using a Hierarchical CNN Structure)

  • 강상훈;박한훈;박종일;김산해
    • 융합신호처리학회논문지
    • /
    • 제20권4호
    • /
    • pp.205-211
    • /
    • 2019
  • 스테그아날리시스(steganalysis)는 스테가노그래피(steganography)에 의해 숨겨진 데이터를 감지하고 복구하기 위한 기법이다. 스테그아날리시스 방법은 데이터 삽입 시 발생하는 시각적, 통계적 변화를 분석하여 숨겨진 데이터를 찾는다. 숨겨진 데이터를 복원하기 위해서는 어떤 스테가노그래피 방법에 의해 데이터가 숨겨졌는지를 알아야 한다. 그러므로 본 논문은 다층 분류를 통해 입력 영상에 적용된 스테가노그래피 방법을 식별하는 계층적 CNN 구조를 제안한다. 이를 위해 4개의 기본 CNN을 각각 입력 영상에 스테가노그래피 방법이 적용되었는지 여부나 서로 다른 두 스테가노그래피 방법 중에 어떤 방법이 적용되었는지를 이진 판별하도록 학습시켰으며, 학습된 CNN을 계층적으로 연결하였다. 실험 결과를 통해 제안된 계층적 CNN 구조는 4개의 서로 다른 스테가노그래피 방법인 LSB(Least Significant Bit Substitution), PVD(Pixel Value Difference), WOW(Wavelet Obtained Weights), UNIWARD(Universal Wavelet Relative Distortion)을 79%의 정확도로 식별할 수 있음을 확인하였다.

안드로이드 스마트기기에서의 스테가노그래피 연구 (Steganography on Android Smart Devices)

  • 정기현;이준호;유기영
    • 전자공학회논문지
    • /
    • 제52권4호
    • /
    • pp.99-105
    • /
    • 2015
  • 스마트폰 사용의 확대로 iOS와 Android 운영체제에 대한 관심이 높아지고 있다. 본 논문에서는 안드로이드 플랫폼을 기반으로 한 스테가노그래픽 기법으로 안드로이드에서 기본적으로 제공하는 그래픽 라이브러리인 스키아를 기반으로 한 영상 포맷을 분석하고, 분석된 포맷에 기반한 알고리즘을 제안한다. 제안하는 알고리즘은 Alpha, Red, Green, Blue 각각 8비트씩 총 32비트를 사용하는 트루 칼라를 기반으로 네 개의 각 8비트 영역을 활용하여 비밀자료를 숨긴다. 또한 이미지 왜곡이 덜 민감한 Alpha 영역을 활용하여 최대한 비밀자료를 숨길 수 있도록 알고리즘을 제안함으로써, 안드로이드를 기반으로 하는 스마트기기에 모두 사용이 가능할 것으로 보인다. 실험결과에서는 Alpha값의 변화에 따른 비밀자료 삽입용량과 이미지 왜곡 정도를 보임으로써 제안하는 알고리즘의 우수성을 증명하고 있다.

이진 이미지에 대한 픽셀값 가중치를 이용한 자료 은닉 기법 연구 (A Data Hiding Method of Binary Images Using Pixel-value Weighting)

  • 정기현
    • 한국군사과학기술학회지
    • /
    • 제11권4호
    • /
    • pp.68-75
    • /
    • 2008
  • This paper proposes a new data hiding method for binary images using the weighting value of pixel-value differencing. The binary cover image is partitioned into non-overlapping sub-blocks and find the most suitable position to embed a secret bit for each sub-block. The proposed method calculates the weighted value for a sub-block to pivot a pixel to be changed. This improves the image quality of the stego-image. The experimental results show that the proposed method achieves a good visual quality and high capacity.

Sharing a Large Secret Image Using Meaningful Shadows Based on VQ and Inpainting

  • Wang, Zhi-Hui;Chen, Kuo-Nan;Chang, Chin-Chen;Qin, Chuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권12호
    • /
    • pp.5170-5188
    • /
    • 2015
  • This paper proposes a novel progressive secret image-hiding scheme based on the inpainting technique, the vector quantization technique (VQ) and the exploiting modification direction (EMD) technique. The proposed scheme first divides the secret image into non-overlapping blocks and categorizes the blocks into two groups: complex and smooth. The blocks in the complex group are compressed by VQ with PCA sorted codebook to obtain the VQ index table. Instead of embedding the original secret image, the proposed method progressively embeds the VQ index table into the cover images by using the EMD technique. After the receiver recovers the complex parts of the secret image by decoding the VQ index table from the shadow images, the smooth parts can be reconstructed by using the inpainting technique based on the content of the complex parts. The experimental results demonstrate that the proposed scheme not only has the advantage of progressive data hiding, which involves more shadow images joining to recover the secret image so as to produce a higher quality steganography image, but also can achieve high hiding capacity with acceptable recovered image quality.

NDFT-based Image Steganographic Scheme with Discrimination of Tampers

  • Wang, Hongxia;Fan, Mingquan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권12호
    • /
    • pp.2340-2354
    • /
    • 2011
  • A new and secure image steganographic scheme based on nonuniform discrete Fourier transform (NDFT) is proposed in this paper. First, the chaotic system is introduced to select embedding points randomly in NDFT domain suitable range, and NDFT is implemented on every non-overlapping block of eight consecutive pixels. Second, the secret messages are scrambled by chaotic systems, and embedded into frequency coefficients by quantization method. The stego-image is obtained by inverse NDFT (INDFT). Besides, in order to discriminate tampers, the low frequency wavelet coefficients of 7 most significant bits (MSBs) of the stego-image are converted into the binary sequence after nonuniform scalar quantization. Then the obtained binary sequence is scrambled by the chaotic systems, and embedded into the least significant bit (LSB) of the stego-image. Finally, the watermarked stego-image can be obtained by a new improved LSB steganographic method. The embedded secret messages can be extracted from the watermarked stego-image without the original cover image. Experimental results show the validity of the proposed scheme, and dual statistics attacks are also conducted to indicate the security.