• 제목/요약/키워드: Secret Image

검색결과 180건 처리시간 0.024초

Optimization of 3D Triangular Mesh Watermarking Using ACO-Weber's Law

  • Narendra, Modigari;Valarmathi, M.L.;Anbarasi, L.Jani
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권10호
    • /
    • pp.4042-4059
    • /
    • 2020
  • The development of new multimedia techniques such as 3D printing is increasingly attracting the public's attention towards 3D objects. An optimized robust and imperceptible watermarking method based on Ant Colony Optimization (ACO) and Weber Law is proposed for 3D polygonal models. The proposed approach partitions the host model into smaller sub meshes and generates a secret watermark from the sub meshes using Weber Law. ACO based optimized strength factor is identified for embedding the watermark. The secret watermark is embedded and extracted on the wavelet domain. The proposed scheme is robust against geometric and photometric attacks that overcomes the synchronization problem and authenticates the secret watermark from the distorted models. The primary characteristic of the proposed system is the flexibility achieved in data embedding capacity due to the optimized strength factor. Extensive simulation results shows enhanced performance of the recommended framework and robustness towards the most common attacks like geometric transformations, noise, cropping, mesh smoothening, and the combination of such attacks.

An Image Hiding Scheme by Linking Pixels in the Circular Way

  • Chan, Chi-Shiang;Tsai, Yuan-Yu;Liu, Chao-Liang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권6호
    • /
    • pp.1718-1734
    • /
    • 2012
  • The proposed method in this paper is derived from Mielikainen's hiding method. However, there exist some significant differences between two methods. In Mielikainen's method, pixels are partitioned into pairs and a LSB matching function is applied to two pixels for hiding. On the contrary, the proposed method partitions pixels into groups with three pixels in each group. The bits of pixels in each group are linked by using an exclusive OR (XOR) operator in a circular way. If the number of different values between the calculated XOR values and the secret bits is smaller than or equal to 2 in a group, the proposed method can guarantee that at most one pixel is needed to be modified by adding/subtracting its value to/from one, and three secret bits can be embedded to three pixels. Through theoretical analysis, the amount of the embedded secret data in the proposed method is larger than those in other methods under the same amount of pixel modifications. Taking real images in our experiments, the quality of stego-images in the proposed method is higher than those in other methods.

이진영상을 위한 심층암호 기법에 관한 연구 (A Study on Steganographic Method for Binary Images)

  • 하순혜;강현호;이혜주;신상욱;박영란
    • 한국멀티미디어학회논문지
    • /
    • 제9권2호
    • /
    • pp.215-225
    • /
    • 2006
  • 흑백 두 가지의 값으로만 구성된 이진영상(만화 영상, 문서 영상 및 서명 영상 등)은 컬러 영상에 비해 적은 양의 잉여부분으로 인해 비가시적인 비밀 데이터의 삽입이 어렵다. 따라서 이진 엄폐영상을 이용한 심층암호에서는 많은 양의 비밀 데이터를 삽입하면서, 동시에 은닉영상의 비가시성을 만족시킬 수 있는 기술이 요구된다. 본 논문에서는 이에 대한 기존 연구들의 장점을 보완하여 은닉영상의 열화를 최소화 하고, 동시에 충분한 용량의 비밀 데이터를 삽입할 수 있는 방식을 제안한다. 제안 방식은 비가시적인 위치의 화소만을 변경시키며, $m{\times}n$ 크기의 한 블록에 대해서 [$log_2(mn+1)-2$] 비트의 비밀 데이터를 숨길 수 있다.

  • PDF

Data-Hiding for Halftone Images Using an Improved CPT scheme

  • Phan, Trung Huy;Nguyen, Hai Thanh;Kim, Cheonshik;Yang, Ching-Nung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권2호
    • /
    • pp.405-424
    • /
    • 2013
  • In publishing applications, it is advantageous to embed data in halftone images. The CPT scheme (Chen-Pan-Tseng, 2000) is a steganographic data hiding scheme that was proposed for binary images, e.g., facsimiles. The CPT scheme uses a secret key and weight matrix to protect the hidden data and can hide as many as $r={\lfloor}{\log}_2(m{\times}n+1){\rfloor}$ bits of data in the image by changing at most 2 bits in the image. Our proposed scheme also uses a secret key to protect it from being compromised and a weight matrix to increase the data hiding rate. Our scheme improves the performance of the CPT scheme by using the simple principle of splitting each block into two parts. Our proposed scheme is called improved CPT (ICPT) and has a very high embedding capacity compared to previous schemes. Experimental results demonstrate that our proposed scheme generally has higher performance than previous schemes.

Optical Encryption Scheme with Multiple Users Based on Computational Ghost Imaging and Orthogonal Modulation

  • Yuan, Sheng;Liu, Xuemei;Zhou, Xin;Li, Zhongyang
    • Journal of the Optical Society of Korea
    • /
    • 제20권4호
    • /
    • pp.476-480
    • /
    • 2016
  • For the application of multiusers, the arrangement and distribution of the keys is a much concerning problem in a cryptosystem. In this paper, we propose an optical encryption scheme with multiple users based on computational ghost imaging (CGI) and orthogonal modulation. The CGI encrypts the secret image into an intensity vector rather than a complex-valued matrix. This will bring convenience for post-processing and transmission of the ciphertext. The orthogonal vectors are taken as the address codes to distinguish users and avoid cross-talk. Only the decryption key and the address code owned by an authorized user are matched, the secret image belonging to him/her could be extracted from the ciphertext. Therefore, there are two security levels in the encryption scheme. The feasibility and property are verified by numerical simulations.

Reversible Data Hiding Scheme for VQ Indices Based on Absolute Difference Trees

  • Chang, Chin-Chen;Nguyen, Thai-Son;Lin, Chia-Chen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권7호
    • /
    • pp.2572-2589
    • /
    • 2014
  • Reversible data hiding is a technique for recovering original images without any distortion after secret data are extracted from the image. The technique continues to attract attention from many researchers. In this paper, we introduce a new reversible data hiding scheme based on the adjacent index differences of vector quantization (VQ) indices. The proposed scheme exploits the differences between two adjacent indices to embed secret data. Experimental results show that our scheme can achieve a lower compression rate than an earlier scheme by Yang and Lin. Our scheme's average compression rate, 0.44 bpp, outperforms that of Yang and Lin's scheme, which averages 0.53 bpp. Moreover, the embedding capacity of our scheme can rise to 1.45 bpi, which also is superior to that of Chang et al.'s scheme [35] (1.00 bpi)Yang and Lin's scheme [27] (0.91 bpi) as well as Chang et al.'s scheme [26] (0.74 bpi).

An Improved Steganography Method Based on Least-Significant-Bit Substitution and Pixel-Value Differencing

  • Liu, Hsing-Han;Su, Pin-Chang;Hsu, Meng-Hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권11호
    • /
    • pp.4537-4556
    • /
    • 2020
  • This research was based on the study conducted by Khodaei et al. (2012), namely, the least-significant-bit (LSB) substitution combined with the pixel-value differencing (PVD) steganography, and presented an improved irreversible image steganography method. Such a method was developed through integrating the improved LSB substitution with the modulus function-based PVD steganography to increase steganographic capacity of the original technique while maintaining the quality of images. It partitions the cover image into non-overlapped blocks, each of which consists of 3 consecutive pixels. The 2nd pixel represents the base, in which secret data are embedded by using the 3-bit LSB substitution. Each of the other 2 pixels is paired with the base respectively for embedding secret data by using an improved modulus PVD method. The experiment results showed that the method can greatly increase steganographic capacity in comparison with other PVD-based techniques (by a maximum amount of 135%), on the premise that the quality of images is maintained. Last but not least, 2 security analyses, the pixel difference histogram (PDH) and the content-selective residual (CSR) steganalysis were performed. The results indicated that the method is capable of preventing the detection of the 2 common techniques.

누적행렬을 이용한 ( k, n) 시각암호의 새로운 구성 (New Construction for Visual Cryptography Using the Cumulative Matrix)

  • 김문수;박지환
    • 정보보호학회논문지
    • /
    • 제11권6호
    • /
    • pp.15-26
    • /
    • 2001
  • 복잡한 암호학적 연산 없이 인간의 시각만으로 비밀정보를 직접 복원할 수 있는 시각암호는 영상형태의 비밀 정보를 n개의 랜덤한 영상(슬라이드)으로 분산시킬 때, 화소가 확장되면서 영상의 크기가 커지고 휘도가 떨어지는 문제점이 있다. 따라서 화장 화소의 수를 줄이고 휘도를 개선시키는 연구가 요구되고 있다. 본 논문에서는 n개의 슬라이드 중 k개를 겹치면 비밀정보를 복원할 수 있는 (k, n) 시각암호론 위하여 누적행렬에 따라 기저행렬을 생성하는 새로운 구성법을 제안한다. k가 홀수일 때 그 구성이 완전하며, k가 짝수일 때는 복수의 휘도를 허용함으로서 특별한 쌍의 최대 휘도를 높일 수 있는 방식이다. 제안 방식은 기존방식 중에서 최량의 휘도를 달성하는 Droste방식에 비하여 간단한 구성이면서 평균 휘도가 개선됨을 보인다. 또한, 일반 접근구조를 위한 기저행렬의 구성이 가능함을 보인다.

PCAIW A VELET BASED WATERMARKING OF MULTISPECTRAL IMAGE

  • RANGSANSERI Y.;PANYAVARAPORN J.;THITIMAJSHIMA P.
    • 대한원격탐사학회:학술대회논문집
    • /
    • 대한원격탐사학회 2005년도 Proceedings of ISRS 2005
    • /
    • pp.138-141
    • /
    • 2005
  • In this paper, we propose a watermarking technique of multispectral images. In our method, the Principal Component Analysis (PCA) is preliminarily applied on the multispectral image. The most principal component image is used for embedding with a watermark, which is a pseudo-random number sequence generated with a secret key. The embedding process is performed in the wavelet domain. The resulting image is then reinserted into the principal component images, and the final multispectral image containing the watermark can be produced by the inverse PCA. Experimental results are provided to illustrate the performance of the algorithm against various kinds of attacks.

  • PDF

블록 암호 AES에 대한 CNN 기반의 전력 분석 공격 (Power Analysis Attack of Block Cipher AES Based on Convolutional Neural Network)

  • 권홍필;하재철
    • 한국산학기술학회논문지
    • /
    • 제21권5호
    • /
    • pp.14-21
    • /
    • 2020
  • 두 통신자간 정보를 전송함에 있어 기밀성 서비스를 제공하기 위해서는 하나의 대칭 비밀키를 이용하는 블록데이터 암호화를 수행한다. 데이터 암호 시스템에 대한 전력 분석 공격은 데이터 암호를 위한 디바이스가 구동할 때 발생하는 소비 전력을 측정하여 해당 디바이스에 내장된 비밀키를 찾아내는 부채널 공격 방법 중 하나이다. 본 논문에서는 딥 러닝 기법인 CNN (Convolutional Neural Network) 알고리즘에 기반한 전력 분석 공격을 시도하여 비밀 정보를 복구하는 방법을 제안하였다. 특히, CNN 알고리즘이 이미지 분석에 적합한 기법인 점을 고려하여 1차원의 전력 분석파형을 2차원 데이터로 이미지화하여 처리하는 RP(Recurrence Plots) 신호 처리 기법을 적용하였다. 제안한 CNN 공격 모델을 XMEGA128 실험 보드에 블록 암호인 AES-128 암호 알고리즘을 구현하여 공격을 수행한 결과, 측정한 전력소비 파형을 전처리 과정없이 그대로 학습시킨 결과는 약 22.23%의 정확도로 비밀키를 복구해 냈지만, 전력 파형에 RP기법을 적용했을 경우에는 약 97.93%의 정확도로 키를 찾아낼 수 있었음을 확인하였다.