• Title/Summary/Keyword: Images Hiding

Search Result 127, Processing Time 0.023 seconds

Opposition effect on asteroid (25143) Itokawa taken with the Asteroid Multi-band Imaging Camera(AMICA)

  • Lee, Mingyeong;Ishiguro, Masateru
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.41 no.2
    • /
    • pp.51.2-51.2
    • /
    • 2016
  • Hayabusa, the Japanese asteroid sample returning mission, acquired more than 1400 scientific images of its target asteroid (25143) Itokawa using the Asteroid Multi-band Imaging Camera (AMICA). It took images at a wide coverage of the phase angle a (Sun-Itokawa-Hayabusa) from $a{\sim}0^{\circ}$ to ${\sim}35^{\circ}$, providing a unique opportunity for studying the opposition effect (a sharp surge in brightness of asteroidal surface). Here we present a study of the opposition effect on Itokawa using the AMICA multi-band data. We found that (1) the opposition strength near the opposition is independent of the incident/emission angles of the light, also (2) it weakly depends on the wavelength showing the strongest surge around 0.7 um, and (3) the reflectance increases linearly at a>$1.5^{\circ}$ while nonlinearly at a<$1.5^{\circ}$ as approaching the opposition point. In particular, we noticed that the increasing rate has a correlation with the reflectance in the nonlinear domain whereas no detectable correlation with the reflectance in the linear domain. From these results, we conjecture that the coherent backscattering opposition effect is a dominant mechanism for the nonlinear opposition surge at a<$1.5^{\circ}$ while shadow hiding opposition effect is responsible for the linear opposition surge at a>$1.5^{\circ}$.

  • PDF

Adaptive Watermarking Using Wavelet Transform & Spread Spectrum Method (확산스펙트럼 방식과 웨이브렛 변환을 이용한 적응적인 워터마킹)

  • 김현환;김두영
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.2
    • /
    • pp.389-395
    • /
    • 2000
  • Digital Watermarking is a research area which aims at hiding secret information in digital multimedia content such as images, audio, and video. In this paper, we propose a new watermarking method with visually recognizable symbols into the digital images using wavelet transform, spread spectrum method and multilevel threshold value in considering the wavelet coefficients. The information of watermark can be extracted by subtracting wavelet coefficients with the original image and the watermarked image. The results of this experiment show that the proposed algorithm was superior to other similar watermarking algorithms. We showed Watermarking algorithm in JPEG lossy compression, resizing, LSB(Least Significant Bit) masking, and filtering.

  • PDF

Adaptive LSB Steganography for High Capacity in Spatial Color Images (컬러이미지 대상 고용량 적응형 LSB 스테가노그라피)

  • Lee, Haeyoung
    • Journal of the Korea Computer Graphics Society
    • /
    • v.24 no.1
    • /
    • pp.27-33
    • /
    • 2018
  • This paper presents a new adaptive LSB steganography for high capacity in spatial color images. The number of least signi ficant bit (LSB) of each RGB component in a color image pixel, to replace with the data bits to be hidden, was determine d through analysis of the worst case peak signal noise ratio (PSNR). In addition, the combination of the number of bits is determined adaptively according to image content. That is, 70% of the data to be hidden is proposed to be replaced with 3 bit LSB of two components, 2 bit LSB of the rest component, and 30% be replaced with 4 bit LSB of each RGB compon ent. To find edge areas in an image, delta sorting in local area is also suggested. Using the proposed method, the data cap acity is 9.2 bits per pixel (bpp). The average PSNR value of the tested images with concealed data of up to 60Kbyte was 43.9 db and also natural histograms were generated.

A Study on reversible data hiding using the characteristics of image and solving CZP problem (영상의 특성을 효과적으로 이용하고 CZP 문제를 해결하여 영상에 가역적으로 데이터를 은닉하는 기법에 대한 연구)

  • Jung, Soo-Mok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.1
    • /
    • pp.83-91
    • /
    • 2019
  • In this paper, we have effectively used the surface characteristics and local similarity existing in image, solved the problem that there is no CZP(Closest Zero point) that occurs in a very few images to hide secrete data into cover image by using histogram shift. By applying the proposed technique, it is possible to hide secrete data invisibly into the cover image, extract secrete data from the stego-image with no data loss, and completely restore the original cover image. It is impossible to know whether the secrete data is hidden in the stego-image because the stego-image constructed by applying the proposed technique has a good visual quality that can not distinguish the difference from the cover image. The proposed method is able to hide secrete data at various levels compared to conventional APD(Adjacent Pixel Difference) technique, and hide secrete data up to 25.1% more than APD in cover image.

Non-square colour image scrambling based on two-dimensional Sine-Logistic and Hénon map

  • Zhou, Siqi;Xu, Feng;Ping, Ping;Xie, Zaipeng;Lyu, Xin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.5963-5980
    • /
    • 2017
  • Image scrambling is an important technology in information hiding, where the Arnold transformation is widely used. Several researchers have proposed the application of $H{\acute{e}}non$ map in square image scrambling, and certain improved technologies require scrambling many times to achieve a good effect without resisting chosen-plaintext attack although it can be directly applied to non-square images. This paper presents a non-square image scrambling algorithm, which can resist chosen-plaintext attack based on a chaotic two-dimensional Sine Logistic modulation map and $H{\acute{e}}non$ map (2D-SLHM). Theoretical analysis and experimental results show that the proposed algorithm has advantages in terms of key space, efficiency, scrambling degree, ability of anti-attack and robustness to noise interference.

Pixel value prediction algorithm using three directional edge characteristics and similarity between neighboring pixels

  • Jung, Soo-Mok
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.1
    • /
    • pp.61-64
    • /
    • 2018
  • In this paper, a pixel value prediction algorithm using edge components in three directions is proposed. There are various directional edges and similarity between adjacent pixels in natural images. After detecting the edge components in the x-axis direction, the y-axis direction, and the diagonal axis direction, the pixel value is predicted by applying the detected edge components and similarity between neighboring pixels. In particular, the predicted pixel value is calculated according to the intensity of the edge component in the diagonal axis direction. Experimental results show that the proposed algorithm can effectively predict pixel values. The proposed algorithm can be used for applications such as reversible data hiding, reversible watermarking to increase the number of embedded data.

An improved technique for hiding confidential data in the LSB of image pixels using quadruple encryption techniques (4중 암호화 기법을 사용하여 기밀 데이터를 이미지 픽셀의 LSB에 은닉하는 개선된 기법)

  • Soo-Mok Jung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.17 no.1
    • /
    • pp.17-24
    • /
    • 2024
  • In this paper, we propose a highly secure technique to hide confidential data in image pixels using a quadruple encryption techniques. In the proposed technique, the boundary surface where the image outline exists and the flat surface with little change in pixel values are investigated. At the boundary of the image, in order to preserve the characteristics of the boundary, one bit of confidential data that has been multiply encrypted is spatially encrypted again in the LSB of the pixel located at the boundary to hide the confidential data. At the boundary of an image, in order to preserve the characteristics of the boundary, one bit of confidential data that is multiplely encrypted is hidden in the LSB of the pixel located at the boundary by spatially encrypting it. In pixels that are not on the border of the image but on a flat surface with little change in pixel value, 2-bit confidential data that is multiply encrypted is hidden in the lower 2 bits of the pixel using location-based encryption and spatial encryption techniques. When applying the proposed technique to hide confidential data, the image quality of the stego-image is up to 49.64dB, and the amount of confidential data hidden increases by up to 92.2% compared to the existing LSB method. Without an encryption key, the encrypted confidential data hidden in the stego-image cannot be extracted, and even if extracted, it cannot be decrypted, so the security of the confidential data hidden in the stego-image is maintained very strongly. The proposed technique can be effectively used to hide copyright information in general commercial images such as webtoons that do not require the use of reversible data hiding techniques.

An Adaptive Information Hiding Technique of JPEG2000-based Image using Chaotic System (카오스 시스템을 이용한 JPEG2000-기반 영상의 적응적 정보 은닉 기술)

  • 김수민;서영호;김동욱
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.4
    • /
    • pp.9-21
    • /
    • 2004
  • In this paper, we proposed the image hiding method which decreases calculation amount by encrypt partial data using discrete wavelet transform and linear scale quantization which were adopted as the main technique for frequency transform in JPEG2000 standard. Also we used the chaotic system which has smaller calculation amount than other encryption algorithms and then dramatically decreased calculation amount. This method operates encryption process between quantization and entropy coding for preserving compression ratio of images and uses the subband selection method and the random changing method using the chaotic system. For ciphering the quantization index we use a novel image encryption algerian of cyclically shifted in the right or left direction and encrypts two quantization assignment method (Top-down/Reflection code), made change of data less. Also, suggested encryption method to JPEG2000 progressive transmission. The experiments have been performed with the proposed methods implemented in software for about 500 images. consequently, we are sure that the proposed are efficient image encryption methods to acquire the high encryption effect with small amount of encryption. It has been shown that there exits a relation of trade-off between the execution time and the effect of the encryption. It means that the proposed methods can be selectively used according to the application areas. Also, because the proposed methods are performed in the application layer, they are expected to be a good solution for the end-to-end security problem, which is appearing as one of the important problems in the networks with both wired and wireless sections.

A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption

  • Muhammad, Khan;Ahmad, Jamil;Farman, Haleem;Jan, Zahoor;Sajjad, Muhammad;Baik, Sung Wook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1938-1962
    • /
    • 2015
  • Security of information during transmission is a major issue in this modern era. All of the communicating bodies want confidentiality, integrity, and authenticity of their secret information. Researchers have presented various schemes to cope with these Internet security issues. In this context, both steganography and cryptography can be used effectively. However, major limitation in the existing steganographic methods is the low-quality output stego images, which consequently results in the lack of security. To cope with these issues, we present an efficient method for RGB images based on gray level modification (GLM) and multi-level encryption (MLE). The secret key and secret data is encrypted using MLE algorithm before mapping it to the grey-levels of the cover image. Then, a transposition function is applied on cover image prior to data hiding. The usage of transpose, secret key, MLE, and GLM adds four different levels of security to the proposed algorithm, making it very difficult for a malicious user to extract the original secret information. The proposed method is evaluated both quantitatively and qualitatively. The experimental results, compared with several state-of-the-art algorithms, show that the proposed algorithm not only enhances the quality of stego images but also provides multiple levels of security, which can significantly misguide image steganalysis and makes the attack on this algorithm more challenging.

Processing Techniques of Layer Channel Image for 3D Image Effects (3D 영상 효과를 위한 레이어 채널 이미지의 처리 기법)

  • Choi, Hak-Hyun;Kim, Jung-Hee;Lee, Myung-Hak
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.1
    • /
    • pp.272-281
    • /
    • 2008
  • A layer channel, which can express effects on 3D image, is inserted to use it on application rendering effectively. The current method of effect rendering requires individual sources in storage and image processing, because it uses individual and mixed management of images and effects. However, we can save costs and improve results in images processing by processing both image and layer channels together. By changing image format to insert a layer channel in image and adding a hide function to conceal the layer channel and control to make it possible to approach image and layer channels simultaneously during loading image and techniques hiding the layer channel by changing image format with simple techniques, like alpha blending, etc., it is developed to improve reusability and be able to be used in all programs by combining the layer channel and image together, so that images in changed format can be viewed in general image viewers. With the configuration, we can improve processing speed by introducing image and layer channels simultaneously during loading images, and reduce the size of source storage space for layer channel images by inserting a layer channel in 3D images. Also, it allows managing images in 3D image and layer channels simultaneously, enabling effective expressions, and we can expect to use it effectively in multimedia image used in practical applications.