• Title/Summary/Keyword: Image technique

Search Result 5,881, Processing Time 0.034 seconds

An Improved Reversible Data Hiding Technique using Histogram Characteristics and Double Encryption Technique

  • Soo-Mok Jung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.132-139
    • /
    • 2024
  • In this paper, we proposed an effective technique that uses location-based encryption technique and spatial encryption technique to improve security vulnerabilities in previous reversible data hiding technique that can hide twice as much confidential data as the NSAS technique. If the proposed technique is applied to hide confidential data in an image, the same amount of confidential data can be hidden compared to the previous technique, but the security of confidential data is greatly enhanced. By hiding confidential data in an image using the proposed technique, high-quality stego-image can be generated, making it impossible to visually distinguish whether confidential data is hidden in the image. Additionally, confidential data can be restored from stego-image without loss, and the original cover image can also be restored without loss. Through experiments, it was confirmed that when confidential data is hidden by applying the proposed technique, the quality of the stego-image is maintained up to 39.73dB, and the security of the stego-image is greatly strengthened.

Data hiding technique using image pixel value and spatial encryption technique

  • Jung, Soo-Mok
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.50-55
    • /
    • 2021
  • In this paper, we proposed a technique for hiding the double-encrypted confidential data in the image using the pixel value of the image and the spatial encryption technique. The proposed technique inserts encrypted confidential data into the LSB of an image pixel in order to maintain high image quality. The stego-image generated by hiding the encrypted confidential data has very good quality and is visually indistinguishable from the original cover image, so that it is impossible to recognize whether the confidential data is hidden in the stego-image. It is possible to extract the original confidential data from the stego-image without loss. By conducting an experiment on the proposed technique, it was confirmed that the proposed technique is an effective technique for the practical application of data hiding. The proposed technique can be used in applications such as military and intellectual property protection that require high security.

Hardware Software Co-Simulation of the Multiple Image Encryption Technique Using the Xilinx System Generator

  • Panduranga, H.T.;Naveen, Kumar S.K.;Sharath, Kumar H.S.
    • Journal of Information Processing Systems
    • /
    • v.9 no.3
    • /
    • pp.499-510
    • /
    • 2013
  • Hardware-Software co-simulation of a multiple image encryption technique shall be described in this paper. Our proposed multiple image encryption technique is based on the Latin Square Image Cipher (LSIC). First, a carrier image that is based on the Latin Square is generated by using 256-bits of length key. The XOR operation is applied between an input image and the Latin Square Image to generate an encrypted image. Then, the XOR operation is applied between the encrypted image and the second input image to encrypt the second image. This process is continues until the nth input image is encrypted. We achieved hardware co-simulation of the proposed multiple image encryption technique by using the Xilinx System Generator (XSG). This encryption technique is modeled using Simulink and XSG Block set and synthesized onto Virtex 2 pro FPGA device. We validated our proposed technique by using the hardware software co-simulation method.

An Improved Reversible Data Hiding Technique using Histogram Characteristics of Image

  • Soo-Mok, Jung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.63-69
    • /
    • 2023
  • In this paper, we propose an effective reversible data hiding technique that increases the confidential data hiding amount of the NSAS technique itself by utilizing the characteristics of image. The proposed technique shifts the histogram using multiple zeros of the histogram and hides 2 bits of confidential data at each peak point. Using the proposed technique, the amount of confidential data that can be hidden is doubled compared to the existing technique, and high-quality stego-image can be created. Confidential data can be restored without loss from the stego- image, and the original cover image can be restored without loss. Through experiments, it was confirmed that the proposed technique can hide twice as much confidential data than the existing technique, and the image quality of the stego-image is very good with a maximum of 39.75dB.

A Study on Confidential Data Hiding Technique with Spatial Encryption for Color Image

  • Jung, Soo-Mok
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.1
    • /
    • pp.85-88
    • /
    • 2019
  • In this paper, we propose a technique for spatially encrypting confidential data into R, G, B planes of color image and extracting spatially encrypted confidential data. The effectiveness of the proposed technique is verified by mathematically analyzing the quality of the stego-image generated using the proposed technique. The proposed technique can hide confidential data securely into cover image by spatially encrypting the confidential data, and can extract confidential data from the stego-image. The quality of the stego-image created by applying the proposed technique is very good. The average value of the quality of the stego-image is 51.14 dB. Therefore, it is not visually recognizable whether the confidential data is hidden in the stego-image. The proposed technique can be widely used for military and intellectual property protection.

A Fuzzy Image Contrast Enhancement Technique using the K-means Algorithm (K-means 알고리듬을 이용한 퍼지 영상 대비 강화 기법)

  • 정준희;김용수
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2002.12a
    • /
    • pp.295-299
    • /
    • 2002
  • This paper presents an image contrast enhancement technique for improving low contrast images. We applied fuzzy logic to develop an image contrast enhancement technique in the viewpoint of considering that the low pictorial information of a low contrast image is due to the vaguness or fuzziness of the multivalued levels of brightness rather than randomness. The fuzzy image contrast enhancement technique consists of three main stages, namely, image fuzzification, modification of membership values, and image defuzzification. In the stage of image fuzzification, we need to select a crossover point. To select the crossover point automatically the K-means algorithm is used. The problem of crossover point selection can be considered as the two-category, object and background, classification problem. The proposed method is applied to an experimental image with 256 gray levels and the result of the proposed method is compared with that of the histogram equalization technique. We used the index of fuzziness as a measure of image quality. The result shows that the proposed method is better than the histogram equalization technique.

Watermarking Algorithm using LSB for Color Image with Spatial Encryption

  • Jung, Soo-Mok
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.242-245
    • /
    • 2019
  • In this paper, watermark embedding technique was proposed to securely conceal the watermark in color cover image by applying the spatial encryption technique. The embedded watermak can be extracted from stego-image without loss. The quality of the stego-image is very good. So it is not possible to visually distinguish the difference between the original cover image and the stego-image. The validity of the proposed technique was verified by mathematical analysis. The proposed watermark embedding technique can be used for intellectual property protection, military, and medical applications that require high security.

Multi-encryption Watermarking Technique using Color Image Pixels

  • Jung, Soo-Mok
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.116-121
    • /
    • 2022
  • In this paper, we propose a highly secure watermarking technique in which the watermark is multi-encrypted using the R, G, and B component pixels of color image, and then the multi-encrypted watermark is hidden in the LSB of the color image pixel. According to the technique proposed in this paper, the quality of the stego-image created by hiding the multi-encrypted watermark in the LSB of the color image is so excellent that the difference from the cover image cannot be recognized. Also, it is possible to extract the original watermark from the stego-image without loss. If the watermark is hidden in the image using the proposed technique, the security of the watermark is maintained very well because the watermark hidden in the stego-image is multi-encrypted. The proposed watermarking technique can be used in the applications such as military and intellectual property protection requiring high security.

Product image evaluation technique using fuzzy-weighted checklist (모호가중점검목록을 이용한 제품의 감성파악)

  • 박경수;정광태
    • Journal of the Ergonomics Society of Korea
    • /
    • v.15 no.1
    • /
    • pp.15-26
    • /
    • 1996
  • When a product is designed, it is important to consider its image on consumers. In this study, we developed a technique to measure product image. Because human image of a product is very subjective and fuzzy, it is difficult to measure easily. To deal with this difficulty effectively, we used fuzzy- weighted checklist. The fuzzy-weighted checklist presents a fuzzy version of the weighted checklist technique for evaluating or comparing complex systems or subjects. In this technique, we used a pairwise comparison method to obtain the relative importance weights of image factors. Also, we used linguistic ratings to obtain the scores of image factors for a product. Then, we synthesized the scores of image factors to obtain a fuzzy composite score and its linguistic approximation. The entire procedure of this technique was written in quick Basic. As an example, this techinque is applied to car evaluation. The results show that this technique can be effectively used to the quqntitative evaluation of huamn image.

  • PDF

3-DIMENSIONAL TILING TECHNIQUE TO PROCESS HUGE SIZE HIGH RESOLUTION SATELLITE IMAGE SEAMLESSLY AND RAPIDLY

  • Jung, Chan-Gyu;Kim, Jun-Chul;Hwang, Hyun-Deok
    • Proceedings of the KSRS Conference
    • /
    • 2007.10a
    • /
    • pp.85-89
    • /
    • 2007
  • This paper presents the method to provide a fast service for user in image manipulation such as zooming and panning of huge size high resolution satellite image (e.g. Giga bytes per scene). The proposed technique is based on the hierarchical structure that has 3D-Tiling in horizontal and vertical direction to provide the image service more effectively than 2D-Tiling technique in the past does. The essence of the proposed technique is to create tiles that have optimum level of horizontal as well as vertical direction on the basis of current displaying area which changes as user manipulates huge image. So this technique provides seamless service, and will be very powerful and useful for manipulation of images of huge size without data conversion.

  • PDF