달력

52024  이전 다음

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31

제목: 드론 이미지에 대한 자료은닉 시스템 연구

Academic Conferences of The Institute of Electronics and Information Engineers, 2016.10, pp. 65-68

Posted by kingjung
|

  Data hiding in binary images is difficult since only 1 bit is used to represent 1 pixel and distortion is conspicuous. In this paper, we propose a data hiding method in binary images by checking the bit position and parity bit to hide a secret bit in binary images. The cover image is divided intoM6N sub-blocks and the parity bit of sub-block pixels are referenced to embed a secret bit for the suitable pixel. By finding the suitable pixel position to insert a secret bit for each sub-block, the image quality of the stego-image can be improved, while maintaining a low computational complexity. The experimental results show that the proposed method has a higher capacity and better visual quality as increasing a size of sub-block.

The Imaging Science Journal, Volume 60, 2012, pp. 329-337 (SCI)

Print ISSN: 1368-2199
Online ISSN: 1743-131X
Journal Homepage : http://maney.co.uk/index.php/journals/ims/
Posted by kingjung
|
일시 : 2010년 5월 6일
장소 : 공군사관학교(Korea Air Force Academy)
주제 : Information Hiding - Trends & Applications


'External Seminars' 카테고리의 다른 글

정보보호 정책 및 추진내용  (0) 2015.10.08
Steganography in Emulab Testbed  (0) 2015.10.08
Data Hiding - LSB기법 중심으로  (0) 2011.10.26
Information Hiding  (0) 2010.04.21
Posted by kingjung
|
일시 : 2009년 7월 15일
장소 : 공군사관학교(Korea Air Force Academy)
주제 : Information Hiding (Data Hiding) - Introduction & Research

 

 


Steganography-2.pdf


Posted by kingjung
|

In this paper, we propose a high capacity steganographic method using modulus function of pixel-value differencing (PVD) and least significant bit (LSB) replacement methods. The main idea of the proposed method is that secret data can be embedded on the smooth area by LSB substitution and on the edge area by PVD with less distortion to the human visual system and improvement of the embedding capacity. The experimental results show that the proposed method sustains a higher capacity and still a good quality compared with LSB and PVD methods.

The Imaging Science Journal, Vol. 58, 2010, pp.213~221 (SCI)
ISSN : 1368-2199 (http://www.maney.co.uk)

Posted by kingjung
|
This paper proposes a new data hiding method for twocolor images by two stage referencing. The cover image is partitioned into n x n non-overlapping sub-blocks, and calculated different values by two stages for all pixel to find the suitable replacement pixel. For a one stage, neighboring pixels with (n + 2) x (n + 2) are used to obtain difference value which is different with the current pixel value and (n + 4) x (n + 4) pixels are referenced for next stage. These two values are used to embed a secret bit on a subblock. The experimental results show that the proposed method achieves a good visual quality for the watermarked image and a high capacity for various n x n sub-block.

Ubiquitous Multimedia Computing, International Symposium on 13-15 Oct. 2008. Page(s). 206-209
Posted by kingjung
|
X. Zhang and S. Wang proposed an Exploiting Modification Direction (EMD) method that fully exploits modification directions. Modifications in different directions were used to represent different secret data. In 5-ary notational system, only one secret digit is embedded for each twopixel. This paper proposes an improved method for EMD which can hide more secret data while maintaining a high PSNR value. The proposed method could embed on every pixel for cover data. The experimental results demonstrate that the proposed method has a high capacity and good quality.

Ubiquitous Multimedia Computing, International Symposium on 13-15 Oct. 2008. Page(s). 264-266
Posted by kingjung
|
Wu and Tsai’s pixel-value differencing method and Chang and Tseng’s side-match method are based on the theory that the number of bits which can be embedded is determined by the degree of the pixel’s smoothness, or its proximity to the edge of the image. If pixels are located in the edge area, they may tolerate larger changes than those in smooth areas. However, both methods are subject to the fall off the boundary problem (FOBP). This study proposes a new scheme that can solve the FOBP. The experimental results demonstrate that the proposed method resolves the problem, and achieves a higher image quality index value than other methods.

Ubiquitous Multimedia Computing, International Symposium on 13-15 Oct. 2008 Page(s). 210 - 213
Posted by kingjung
|
ICHIT, International Conference on Convergence and Hybrid Information Technology, 2008 pp.262-265
Posted by kingjung
|

A novel data hiding method based on the least significant bit (LSB) substitution and the multi-pixel differencing (MPD) method is presented on the proposed method to improve the capacity of hidden secret data and to provide an imperceptible visual quality. First, a sum of different values for a four-pixel sub-block is calculated. The low value of the sum can be located on a smooth block and the high value is located on an edged block. The secret data are hidden into the cover image by the LSB method in the smooth block, while the MPD method is concealed in the edged block. The experimental results show that the proposed method has a higher capacity and maintains good visual quality.

ICHIT, International Conference on Convergence and Hybrid Information Technology, 2008, pp.355-358

Posted by kingjung
|
This study proposes a new method for data hiding in binary images using optimized bit position to replace a secret bit. This method manipulates blocks, which are sub-divided. The parity bit for a specified block decides whether to change or not, to embed a secret bit. By finding the best position to insert a secret bit for each divided block, the image quality of the resulting stego-image can be improved, while maintaining low computational complexity. The experimental results show that the proposed method has an improvement with respect to a previous work.

Computer Science and Software Engineering, Volume 3, 12-14 Dec. 2008 pp. 931-934
Posted by kingjung
|