• 제목/요약/키워드: Images Hiding

검색결과 127건 처리시간 0.03초

LSB 기법 기반 최적의 이미지 스테가노그래피의 연구 (A Study of Optimal Image Steganography based on LSB Techniques)

  • 지선수
    • 한국산업정보학회논문지
    • /
    • 제20권3호
    • /
    • pp.29-36
    • /
    • 2015
  • 스테가노그래피는 은닉되어 전송되는 비밀 메시지의 존재 자체를 숨기는 기술이다. 일반적으로 은닉 자료의 지각 투명성, 수용 능력, 견고성 등을 기반으로 하는 새롭고 정교한 스테가노그래피 기법을 개발하는 것이 주목적 이다. 이 논문에서는 이미지 스테가노그래피 기법의 장점과 단점을 분석하고, 효과적인 적용방법을 제시한다. 결과적으로 재배열키를 적용하고, 보안성이 좋은 ELSB와 DCT를 기반으로 하는 이미지 스테가노그래피 기법이 효과적이다.

세 방향 자료 은닉이 가능한 이미지 스테가노그래픽기법 연구 (Steganographic Method Based on Three Directional Embedding)

  • 정기현;김인택;김재철
    • 한국군사과학기술학회지
    • /
    • 제13권2호
    • /
    • pp.268-274
    • /
    • 2010
  • A steganographic method using three directional data embedding for gray images is presented in this paper. Cover image is divided into non-overlapping $2\times2$ sub-blocks and the basis pixel is selected to calculate the three different values of each sub-block. Difference values are replaced by embedding the number of secret bits that is referenced by the range table. For the three pixel pairs in the sub-block, the optimal pixel adjustment is preceded to reduce the distortion of visual quality. The experimental results show that the proposed method achieves a good visual quality and high capacity.

Data Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform

  • Kasana, Geeta;Singh, Kulbir;Bhatia, Satvinder Singh
    • Journal of Information Processing Systems
    • /
    • 제13권5호
    • /
    • pp.1331-1344
    • /
    • 2017
  • In this paper, data hiding algorithm using Discrete Wavelet Transform (DWT) and Arnold Transform is proposed. The secret data is scrambled using Arnold Transform to make it secure. Wavelet subbands of a cover image are obtained using DWT. The scrambled secret data is embedded into significant wavelet coefficients of subbands of a cover image. The proposed algorithm is robust to a variety of attacks like JPEG and JPEG2000 compression, image cropping and median filtering. Experimental results show that the PSNR of the composite image is 1.05 dB higher than the PSNR of existing algorithms and capacity is 25% higher than the capacity of existing algorithms.

도로시설물 모니터링을 위한 도로영상 내 위치정보 은닉 (A Position Information Hiding in Road Image for Road Furniture Monitoring)

  • 성택영;이석환;권기룡;문광석
    • 한국멀티미디어학회논문지
    • /
    • 제16권4호
    • /
    • pp.430-443
    • /
    • 2013
  • 운전자에게 차량의 현재 위치 및 도로 주변 상황 인지는 안전하고 쾌적한 운전 환경 조성을 위해 반드시 필요한 정보들이다. 본 논문에서는 도로시설물 및 도로표지 등의 도로정보를 모니터링 하고 시각적으로 알리기 위해 도로주행영상 내 좌표정보 결합 및 시점변환 기법을 이용한 도로주행환경 자동인식 기술을 제안한다. 제안한 방법은 차량 내 탑재된 카메라와 GPS를 이용하여 공간정보가 반영된 도로주행영상을 생성한 후, 생성 영상의 시점 변환 및 정합, 도로정보 검출을 수행하여 사용자에게 도로정보를 시각적으로 제공할 수 있도록 한다. 제안한 방법을 도로 주행 영상에서 실험한 결과, 도로주행영상 내 GPS 좌표정보의 결합 시간은 66.5ms, 교통 표지판 검출율은 95.83%, 프레임당 표지판 검출 처리 시간은 평균 227.45ms 이었다. 따라서 15프레임/초 이하의 입력 동영상에 대하여 효과적으로 도로주행환경을 자동으로 인식하는 것이 가능함을 확인하였다.

Forensics Aided Steganalysis of Heterogeneous Bitmap Images with Different Compression History

  • Hou, Xiaodan;Zhang, Tao;Xiong, Gang;Wan, Baoji
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권8호
    • /
    • pp.1926-1945
    • /
    • 2012
  • In this paper, two practical forensics aided steganalyzers (FA-steganalyzer) for heterogeneous bitmap images are constructed, which can properly handle steganalysis problems for mixed image sources consisting of raw uncompressed images and JPEG decompressed images with different quality factors. The first FA-steganalyzer consists of a JPEG decompressed image identifier followed by two corresponding steganalyzers, one of which is used to deal with uncompressed images and the other is used for mixed JPEG decompressed images with different quality factors. In the second FA-steganalyzer scheme, we further estimate the quality factors for JPEG decompressed images, and then steganalyzers trained on the corresponding quality factors are used. Extensive experimental results show that the proposed two FA-steganalyzers outperform the existing steganalyzer that is trained on a mixed dataset. Additionally, in our proposed FA-steganalyzer scheme, we can select the steganalysis methods specially designed for raw uncompressed images and JPEG decompressed images respectively, which can achieve much more reliable detection accuracy than adopting the identical steganalysis method regardless of the type of cover source.

A Semi-fragile Image Watermarking Scheme Exploiting BTC Quantization Data

  • Zhao, Dongning;Xie, Weixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권4호
    • /
    • pp.1499-1513
    • /
    • 2014
  • This paper proposes a novel blind image watermarking scheme exploiting Block Truncation Coding (BTC). Most of existing BTC-based watermarking or data hiding methods embed information in BTC compressed images by modifying the BTC encoding stage or BTC-compressed data, resulting in watermarked images with bad quality. Other than existing BTC-based watermarking schemes, our scheme does not really perform the BTC compression on images during the embedding process but uses the parity of BTC quantization data to guide the watermark embedding and extraction processes. In our scheme, we use a binary image as the original watermark. During the embedding process, the original cover image is first partitioned into non-overlapping $4{\times}4$ blocks. Then, BTC is performed on each block to obtain its BTC quantized high mean and low mean. According to the parity of high mean and the parity of low mean, two watermark bits are embedded in each block by modifying the pixel values in the block to make sure that the parity of high mean and the parity of low mean in the modified block are equal to the two watermark bits. During the extraction process, BTC is first performed on each block to obtain its high mean and low mean. By checking the parity of high mean and the parity of low mean, we can extract the two watermark bits in each block. The experimental results show that the proposed watermarking method is fragile to most image processing operations and various kinds of attacks while preserving the invisibility very well, thus the proposed scheme can be used for image authentication.

Reversible Sub-Feature Retrieval: Toward Robust Coverless Image Steganography for Geometric Attacks Resistance

  • Liu, Qiang;Xiang, Xuyu;Qin, Jiaohua;Tan, Yun;Zhang, Qin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권3호
    • /
    • pp.1078-1099
    • /
    • 2021
  • Traditional image steganography hides secret information by embedding, which inevitably leaves modification traces and is easy to be detected by steganography analysis tools. Since coverless steganography can effectively resist steganalysis, it has become a hotspot in information hiding research recently. Most coverless image steganography (CIS) methods are based on mapping rules, which not only exposes the vulnerability to geometric attacks, but also are less secure due to the revelation of mapping rules. To address the above issues, we introduced camouflage images for steganography instead of directly sending stego-image, which further improves the security performance and information hiding ability of steganography scheme. In particular, based on the different sub-features of stego-image and potential camouflage images, we try to find a larger similarity between them so as to achieve the reversible steganography. Specifically, based on the existing CIS mapping algorithm, we first can establish the correlation between stego-image and secret information and then transmit the camouflage images, which are obtained by reversible sub-feature retrieval algorithm. The received camouflage image can be used to reverse retrieve the stego-image in a public image database. Finally, we can use the same mapping rules to restore secret information. Extensive experimental results demonstrate the better robustness and security of the proposed approach in comparison to state-of-art CIS methods, especially in the robustness of geometric attacks.

Authentication Technologies of X-ray Inspection Image for Container Terminal Automation

  • Kim, Jong-Nam;Hwang, Jin-Ho;Ryu, Tae-Kyung;Moon, Kwang-Seok;Jung, Gwang-S.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2005년도 ICCAS
    • /
    • pp.1684-1688
    • /
    • 2005
  • In this paper, authentication technologies for X-ray inspection images in container merchandises are introduced and a method of authentication for X-ray inspection images is proposed. Until now, X-ray images of container merchandises have been managed without any authentication of inspection results and environments, it means that there was no any action for protection of illegal copy and counterfeiting of X-ray images from inspection results. Here, authentication identifies that who did inspect container X-ray images and, whether the container X-ray images were counterfeited or not. Our proposed algorithm indicates to put important information about X-ray inspection results on an X-ray image without affecting quality of the original image. Therefore, this paper will be useful in determining an appropriate technology and system specification for authentication of X-ray inspection images. As a result of experiment, we find that the information can be embedded to X-ray image without large degradation of image quality. Our proposed algorithm has high detection ratio by Quality 20 of JPEG attack.

  • PDF

A Tamper-Detection Scheme for BTC-Compressed Images with High-Quality Images

  • Nguyen, Thai-Son;Chang, Chin-Chen;Chung, Ting-Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권6호
    • /
    • pp.2005-2021
    • /
    • 2014
  • This paper proposes a novel image authentication scheme, aiming at tampering detection for block truncation coding (BTC) compressed image. The authentication code is generated by using the random number generator with a seed, and the size of the authentication code is based on the user's requirement, with each BTC-compressed image block being used to carry the authentication code using the data hiding method. In the proposed scheme, to obtain a high-quality embedded image, a reference table is used when the authentication code is embedded. The experimental results demonstrate that the proposed scheme achieves high-quality embedded images and guarantees the capability of tamper detection.

A Study on a Digital Watermarking Method for Still Images

  • Onuki, Tomokazu;Adachi, Takeharu;Hasegawa, Madoka;Kato, Shigeo
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2000년도 ITC-CSCC -1
    • /
    • pp.19-22
    • /
    • 2000
  • In this paper, we propose a watermarking method for still images using Discrete Cosine Transform (DCT). Watermarking is a copyright protection technique for digital contents by hiding secret information into the contents. The proposed method embeds the watermark information into DCT coefficients. To obtain a watermarked image that is not only high quality but also has robustness for compression, we considered a method to change the degree of embedding by utilizing the activity of each DCT block. The simulation results show that the proposed scheme can obtain huh quality watermarked images and we can extract most of the embedded data even if they are compressed by JPEG scheme.

  • PDF