• 제목/요약/키워드: Stego Data

검색결과 63건 처리시간 0.03초

효율적인 가역 데이터 은닉 기법 (An Efficient Reversible Data Hiding Algorithm)

  • 정수목
    • 서비스연구
    • /
    • 제6권1호
    • /
    • pp.71-81
    • /
    • 2016
  • Cover image에 데이터를 임베딩 하여 stego-image를 생성하고, stego-image로부터 cover image를 손실 없이 복원하며 임베딩 된 데이터를 손실 없이 복원할 수 있는 가역 데이터 은닉기법의 성능을 개선하는 효율적인 기법을 제안하였다. 제안된 기법에서의 임베딩 된 데이터 크기는 이전의 기법에 비하여 더 크고, stego-image의 PSNR값은 48dB보다 더 크게 되는 것이 보장된다. 실험을 통하여 제안된 기법의 성능을 확인하였다.

A Study on Confidential Data Hiding Technique with Spatial Encryption for Color Image

  • Jung, Soo-Mok
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제11권1호
    • /
    • pp.85-88
    • /
    • 2019
  • In this paper, we propose a technique for spatially encrypting confidential data into R, G, B planes of color image and extracting spatially encrypted confidential data. The effectiveness of the proposed technique is verified by mathematically analyzing the quality of the stego-image generated using the proposed technique. The proposed technique can hide confidential data securely into cover image by spatially encrypting the confidential data, and can extract confidential data from the stego-image. The quality of the stego-image created by applying the proposed technique is very good. The average value of the quality of the stego-image is 51.14 dB. Therefore, it is not visually recognizable whether the confidential data is hidden in the stego-image. The proposed technique can be widely used for military and intellectual property protection.

An Improved Reversible Data Hiding Technique using Histogram Characteristics and Double Encryption Technique

  • Soo-Mok Jung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제16권1호
    • /
    • pp.132-139
    • /
    • 2024
  • In this paper, we proposed an effective technique that uses location-based encryption technique and spatial encryption technique to improve security vulnerabilities in previous reversible data hiding technique that can hide twice as much confidential data as the NSAS technique. If the proposed technique is applied to hide confidential data in an image, the same amount of confidential data can be hidden compared to the previous technique, but the security of confidential data is greatly enhanced. By hiding confidential data in an image using the proposed technique, high-quality stego-image can be generated, making it impossible to visually distinguish whether confidential data is hidden in the image. Additionally, confidential data can be restored from stego-image without loss, and the original cover image can also be restored without loss. Through experiments, it was confirmed that when confidential data is hidden by applying the proposed technique, the quality of the stego-image is maintained up to 39.73dB, and the security of the stego-image is greatly strengthened.

Recognizing F5-like stego images from multi-class JPEG stego images

  • Lu, Jicang;Liu, Fenlin;Luo, Xiangyang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권11호
    • /
    • pp.4153-4169
    • /
    • 2014
  • To recognize F5-like (such as F5 and nsF5) steganographic algorithm from multi-class stego images, a recognition algorithm based on the identifiable statistical feature (IDSF) of F5-like steganography is proposed in this paper. First, this paper analyzes the special modification ways of F5-like steganography to image data, as well as the special changes of statistical properties of image data caused by the modifications. And then, by constructing appropriate feature extraction sources, the IDSF of F5-like steganography distinguished from others is extracted. Lastly, based on the extracted IDSFs and combined with the training of SVM (Support Vector Machine) classifier, a recognition algorithm is presented to recognize F5-like stego images from images set consisting of a large number of multi-class stego images. A series of experimental results based on the detection of five types of typical JPEG steganography (namely F5, nsF5, JSteg, Steghide and Outguess) indicate that, the proposed algorithm can distinguish F5-like stego images reliably from multi-class stego images generated by the steganography mentioned above. Furthermore, even if the types of some detected stego images are unknown, the proposed algorithm can still recognize F5-like stego images correctly with high accuracy.

A High Quality Steganographic Method Using Morphing

  • Bagade, Anant M.;Talbar, Sanjay N.
    • Journal of Information Processing Systems
    • /
    • 제10권2호
    • /
    • pp.256-270
    • /
    • 2014
  • A new morphed steganographic algorithm is proposed in this paper. Image security is a challenging problem these days. Steganography is a method of hiding secret data in cover media. The Least Significant Bit is a standard Steganographic method that has some limitations. The limitations are less capacity to hide data, poor stego image quality, and imperceptibility. The proposed algorithm focuses on these limitations. The morphing concept is being used for image steganography to overcome these limitations. The PSNR and standard deviation are considered as a measure to improve stego image quality and morphed image selection, respectively. The stego keys are generated during the morphed steganographic embedding and extracting process. Stego keys are used to embed and extract the secret image. The experimental results, which are based on hiding capacity and PSNR, are presented in this paper. Our research contributes towards creating an improved steganographic method using image morphing. The experimental result indicates that the proposed algorithm achieves an increase in hiding capacity, stego image quality, and imperceptibility. The experimental results were compared with state of the art steganographic methods.

삼중 암호화 기법을 적용한 가역 데이터 은닉기법 (Reversible data hiding technique applying triple encryption method)

  • 정수목
    • 한국정보전자통신기술학회논문지
    • /
    • 제15권1호
    • /
    • pp.36-44
    • /
    • 2022
  • 영상의 히스토그램을 시프트 시켜 영상에 기밀 데이터를 은닉하는 가역 데이터 은닉기법들이 개발되었다. 이러한 기법들은 은닉된 기밀 데이터의 보안이 취약한 단점이 있다. 본 논문에서는 이러한 단점을 해결하기 위하여 픽셀값 정보를 사용하여 기밀 데이터를 삼중으로 암호화한 후 커버 이미지에 은닉하는 기법을 제안하였다. 제안된 기법을 사용하여 기밀 데이터를 삼중으로 암호화하여 커버 이미지에 은닉하여 스테고 이미지를 생성하면, 픽셀 정보에 기반한 암호화가 삼중으로 수행되었으므로 삼중으로 암호화되어 은닉된 기밀 데이터의 보안성이 크게 향상된다. 제안된 기법의 성능을 측정하기 위한 실험에서, 스테고 이미지로부터 삼중으로 암호화된 기밀 데이터를 추출하여도 암호화 키 없이는 원본 기밀 데이터를 추출할 수 없었다. 그리고 스테고 이미지(stego-image)의 화질이 48.39dB 이상인 매우 우수한 영상이기 때문에 스테고 이미지에 기밀데이터가 은닉되어있는지 인지할 수 없었으며, 스테고 이미지에 30,487비트 이상의 기밀 데이터가 은닉되었다. 제안된 기법은 스테고 이미지에 은닉되어있는 삼중으로 암호화된 기밀 데이터로부터 원본 기밀 데이터를 손실 없이 추출할 수 있으며, 스테고 이미지로부터 원본 커버 이미지를 왜곡 없이 복원할 수 있다. 따라서 제안된 기법은 보안이 중요하고 원본 커버 이미지를 완벽하게 복원하는 것이 필요한 군사, 의료, 디지털 라이브러리 등의 응용 분야에 효과적으로 활용될 수 있다.

An Improved Reversible Data Hiding Technique using Histogram Characteristics of Image

  • Soo-Mok, Jung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제15권1호
    • /
    • pp.63-69
    • /
    • 2023
  • In this paper, we propose an effective reversible data hiding technique that increases the confidential data hiding amount of the NSAS technique itself by utilizing the characteristics of image. The proposed technique shifts the histogram using multiple zeros of the histogram and hides 2 bits of confidential data at each peak point. Using the proposed technique, the amount of confidential data that can be hidden is doubled compared to the existing technique, and high-quality stego-image can be created. Confidential data can be restored without loss from the stego- image, and the original cover image can be restored without loss. Through experiments, it was confirmed that the proposed technique can hide twice as much confidential data than the existing technique, and the image quality of the stego-image is very good with a maximum of 39.75dB.

Data hiding technique using image pixel value and spatial encryption technique

  • Jung, Soo-Mok
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제13권3호
    • /
    • pp.50-55
    • /
    • 2021
  • In this paper, we proposed a technique for hiding the double-encrypted confidential data in the image using the pixel value of the image and the spatial encryption technique. The proposed technique inserts encrypted confidential data into the LSB of an image pixel in order to maintain high image quality. The stego-image generated by hiding the encrypted confidential data has very good quality and is visually indistinguishable from the original cover image, so that it is impossible to recognize whether the confidential data is hidden in the stego-image. It is possible to extract the original confidential data from the stego-image without loss. By conducting an experiment on the proposed technique, it was confirmed that the proposed technique is an effective technique for the practical application of data hiding. The proposed technique can be used in applications such as military and intellectual property protection that require high security.

개선된 Lowbit Encoding 방법을 이용한 StegoWavek의 구현 (Implementation of StegoWaveK using an Improved Lowbit Encoding Method)

  • 김영실;김영미;백두권
    • 한국정보과학회논문지:컴퓨팅의 실제 및 레터
    • /
    • 제9권4호
    • /
    • pp.470-485
    • /
    • 2003
  • 멀티미디어 데이타중에서 오디오데이타를 이용한 상용화된 오디오 스테가노그라피(audio steganography) 소프트웨어들은 시각적인 측면에서 비밀 메시지가 은닉되어 있다는 것을 쉽게 인지할 수 있다는 것과 숨길 정보의 크기에 제한이 있다는 문제점을 가지고 있다. 이러한 문제점을 해결하기 위해 동적으로 메시지를 은닉하는 방법을 제안하였다. 또한 비밀 메시지의 보안수준을 향상시키기 위해 파일 암호화 알고리즘도 적용하였다. 본 논문에서는 제안한 오디오 스테가노그라피를 수행해주는 StegoWaveK시스템을 상용화된 오디오 스테가노그라피 시스템의 5가지 측면으로 비교 분석하였으며, 성능면에서 우수함을 보였다. StegoWaveK는 상용화된 시스템에 비해 시각적 공격 측면이나 은닉할 메시지 크기 측면에서는 좋으나 인터페이스 측면에서는 사용자 위주의 편리성을 제공할 수 있도록 보완되어야 한다. 그리고 StegoWavek와 상용화된 시스템이 견고성이 약하다는 단점을 보완해야 하며, 다양한 멀티미디어 데이타를 이용한 스테가노그라피로의 추후연구가 필요하다.

A Reversible Data Hiding Method for AMBTC Compressed Image without Expansion inside Stego Format

  • Hui, Zheng;Zhou, Quan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권11호
    • /
    • pp.4443-4462
    • /
    • 2020
  • This paper proposes a new framework of reversible data hiding scheme for absolute moment truncation coding (AMBTC) compressed images. AMBTC-based RDH can be applied to optical remote sensing (ORS) image transmission, which achieves target region preservation and image compression simultaneously. Existing methods can be concluded as two types. In type I schemes, stego codes mimic the original AMBTC format where no file bloat occurs, yet the carried secret data is limited. Type II schemes utilize predication errors to recode quantity levels of AMBTC codes which achieves significant increase in embedding capacity. However, such recoding causes bloat inside stego format, which is not appropriate in mentioned ORS transmission. The proposed method is a novel type I RDH method which prevents bloat inside AMBTC stego codes with significant improvement in embedding capacity. The AMBTC compressed trios are grouped into two categories according to a given threshold. In smooth trio, the modified low quantity level is constructed by concatenating Huffman codes and secret bits. The reversible contrast mapping (RCM) is performed to complex trios for data embedment. Experiments show that the proposed scheme provides highest payload compared with existing type I methods. Meanwhile, no expansion inside stego codes is caused.