• Title/Summary/Keyword: Information hiding

Search Result 360, Processing Time 0.036 seconds

Information Hiding Method based on Interpolation using Max Difference of RGB Pixel for Color Images (컬러 영상의 RGB 화소 최대차분 기반 보간법을 이용한 정보은닉 기법)

  • Lee, Joon-Ho;Kim, Pyung-Han;Jung, Ki-Hyun;Yoo, Kee-Young
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.4
    • /
    • pp.629-639
    • /
    • 2017
  • Interpolation based information hiding methods are widely used to get information security. Conventional interpolation methods use the neighboring pixel value and simple calculation like average to embed secret bit stream into the image. But these information hiding methods are not appropriate to color images like military images because the characteristics of military images are not considered and these methods are restricted in grayscale images. In this paper, the new information hiding method based on interpolation using RGB pixel values of color image is proposed and the effectiveness is analyzed through experiments.

The Method to Estimate Quality Degradation from Information Hiding in JPEG Compression Environment (JPEG 압축 환경의 정보은닉에서 영상 질 저하 예측방법)

  • Choi, Yong-Soo;Kim, Hyoung-Joong;Lee, Dal-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.551-555
    • /
    • 2008
  • In these days, compressed file is useful in internet environment and has many advantages. So a lot of data hiding algorithms works on JPEG compressed file. Of course they know basic rules of transformation and quantization and they utilize those rules to implement their programming. But most of them evaluate the affection of data hiding after data modification. We propose how to predict the affection of data modification in course of data hiding process. Through some kind of experiments, several valuable facts are revealed which used in data hiding in compressed domain such as JPEG. These facts will improve existing data hiding algorithms (F3, F4 and F5 which including Matrix Encoding)[1],[5],[6].

  • PDF

Topology-Hiding Broadcast Based on NTRUEncrypt

  • Mi, Bo;Liu, Dongyan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.431-443
    • /
    • 2016
  • Secure multi-party computation (MPC) has been a research focus of cryptography in resent studies. However, hiding the topology of the network in secure computation is a rather novel goal. Inspired by a seminal paper [1], we proposed a topology-hiding broadcast protocol based on NTRUEncrypt and secret sharing. The topology is concealed as long as any part of the network is corrupted. And we also illustrated the merits of our protocol by performance and security analysis.

Hybrid Information Hiding Method Based on the Characteristics of Military Images on Naval Combat System (함정 전투체계 군사영상 특성에 기반한 하이브리드 정보은닉 기법)

  • Lee, Joon-Ho;Jung, Ki-Hyun;Yoo, Kee-Young
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.9
    • /
    • pp.1669-1678
    • /
    • 2016
  • There are many kinds of military images used in naval combat system because various sensors are operated. The military images are displayed, analysed and stored with analysed informations according to the tactical purpose on combat system. These images are used to target detection, analysis and classification. Thus the analysed information and images must be secured, the information hiding methods are the most eligible solutions to get secured informations and images. In this paper, the hybrid information hiding method based on the characteristics of the military images is proposed and the effectiveness is shown by experiments.

Two-level Information Hiding Method for the Transmission of Military Secret Images (군사용 비밀 영상 전송을 위한 이단계 정보은닉 기법)

  • Kim, In-Taek;Kim, Jae-Cheol;Lee, Yong-Kyun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.3
    • /
    • pp.482-491
    • /
    • 2011
  • The purpose of this study is to design and implement a 2-level secret information transmission system which can be used for information hiding of images transmitted over various IT communication media. To increase the robustness of the hiding power, we combined the steganography method which inserts secret object into cover object to hide the very fact of information hiding itself, and the preprocessing stage to encrypt the secret object before the stego-insertion stage. As a result, even when the stego-image is broken by an attacker, the secret image is protected by encryption. We implemented the 2-level image insertion and extraction algorithm by using C++ programming language. Experiment shows that the PSNR values of stego-images of ours exceed 30.00db which is the threshold of human recognition. The methodology of this study can be applied broadly to the information hiding and protection of the military secret images.

A Lossless Data Hiding Scheme for VQ Indexes Based on Joint Neighboring Coding

  • Rudder, Andrew;Kieu, The Duc
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.8
    • /
    • pp.2984-3004
    • /
    • 2015
  • Designing a new reversible data hiding technique with a high embedding rate and a low compression rate for vector quantization (VQ) compressed images is encouraged. This paper proposes a novel lossless data hiding scheme for VQ-compressed images based on the joint neighboring coding technique. The proposed method uses the difference values between a current VQ index and its left and upper neighboring VQ indexes to embed n secret bits into one VQ index, where n = 1, 2, 3, or 4. The experimental results show that the proposed scheme achieves the embedding rates of 1, 2, 3, and 4 bits per index (bpi) with the corresponding average compression rates of 0.420, 0.483, 0.545, and 0.608 bit per pixel (bpp) for a 256 sized codebook. These results confirm that our scheme performs better than other selected reversible data hiding schemes.

Relationship between Team Cohesion and Knowledge Hiding : Moderating Effects of Ethical Leadership (팀 응집력이 지식은폐에 미치는 영향 : 윤리적 리더십의 조절효과)

  • Kang, Sora;Han, Su Jin
    • Journal of Information Technology Applications and Management
    • /
    • v.28 no.3
    • /
    • pp.31-48
    • /
    • 2021
  • Knowledge is a key resource for organizations to gain and maintain competitive advantage. Therefore, it is important for organizations to motivate employees to share knowledge with each other in order to achieve optimal performance of knowledge resources. Despite the efforts of organizations to share knowledge, knowledge hiding is still prevalent among employees. In this paper, we want to analyze the factors that may cause more general and pervasive knowledge-hiding behavior in organizations through empirical analysis. The results of this study show that, first, the relationship between team cohesion and knowledge hiding has been verified differently depending on the sub-behavior of knowledge hiding : playing dumb, evasive hiding, and rationalized hiding. Team cohesion has been shown to significantly reduce the playing dumb and evasive hiding. On the other hand, it was shown that team cohesion did not have a significant causal relationship with rationalized hiding. Second, the moderating effect of ethical leadership has been statistically significant in terms of team cohesion and relationships with playing dumb and evasive hiding. In other words, the higher the ethical leadership, the stronger the negative relationship between team cohesion and knowledge hiding. Finally, the theoretical and practical implications of this paper and future research directions are discussed.

High-Performance Reversible Data Hiding with Overflow/Underflow Avoidance

  • Yang, Ching-Yu;Hu, Wu-Chih
    • ETRI Journal
    • /
    • v.33 no.4
    • /
    • pp.580-588
    • /
    • 2011
  • This paper proposes reversible data hiding using minimum/maximum preserved overflow/underflow avoidance (MMPOUA). The proposed MMPOUA algorithm consists of three main steps. These steps include the minimum (or maximum) pixel fixing, pixel squeezing, and pixel isolation. The aims of pixel fixing are to keep the minimum (or maximum) pixel of a host block unchanged and prevent the occurrence of overflow/underflow. Both the pixel squeezing and pixel isolation supply hiding storage while keeping the amount of distortion low. The proposed method can avoid (or significantly reduce) the overhead bits used to overcome overflow/underflow issues. At an embedding rate of 0.15 bpp, the proposed algorithm can achieve a PSNR value of 48.52 dB, which outperforms several existing reversible data hiding schemes. Furthermore, the algorithm performed well in a variety of images, including those in which other algorithms had difficulty obtaining good hiding storage with high perceived quality.

Content Adaptation based on Metadata Hiding (메타데이터 은닉에 기반한 컨텐츠 적응변환)

  • Jung, Yong-Ju;Kang, Ho-Kyung;Ro, Yong-Man
    • Proceedings of the IEEK Conference
    • /
    • 2003.11b
    • /
    • pp.31-34
    • /
    • 2003
  • In this paper, we propose an application of data hiding, especially for content adaptation, where one can reduce computational time and get better transcoding results or qualify. Hiding some useful information for content adaptation can help resource tailor to do effective transcoding so that one can achieve lower complexity as well as better quality in content adaptation. Experimental results show that the proposed method based on data hiding gives effectiveness to content adaptation with reasonable subjective quality.

  • PDF

Study of Information Hiding Methods for SONAR Images in the Naval Combat System (정보은닉기법을 적용한 함정 전투체계 소나 영상의 정보관리 방안 연구)

  • Lee, Joon-Ho;Shin, Sang-Ho;Jung, Ki-Hyun;Yoo, Kee-Young
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.6
    • /
    • pp.779-788
    • /
    • 2015
  • The SONAR waterfall image(SWI) is used typically to target detection in SONAR operation and is managed with additional data linked in the naval combat system. The SWI and additional data are very important to classify a kind of target. Although additional data of the SWI is essential and must be kept together with the SWI, it was stored separately in the current system. In this paper, we propose an improved information management method in the naval combat system, where additional data can be contained in the SWI together by using information hiding techniques. The experimental results show that the effectiveness of information hiding techniques in the naval combat system. It is demonstrated that the information hiding techniques can be applied to the SWI that can make the naval combat system to be robust and secure.