달력

52025  이전 다음

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31

'Journals'에 해당되는 글 75건

  1. 2017.01.07 High-Capacity Data Hiding Scheme Based on Exploiting Modification Direction and Modulo Operation
  2. 2017.01.07 Block-based Authentication Scheme for Forgery Attacks on Digital Images
  3. 2016.10.06 Hybrid information hiding method based on the characteristics of military images on naval combat system
  4. 2016.10.06 A high-capacity reversible data hiding scheme based on sorting and prediction in digital images
  5. 2016.10.06 High-capacity reversible data hiding method using block expansion in digital images
  6. 2016.10.06 Reversible Secret Image Sharing Scheme in Encrypted Images
  7. 2016.06.10 Hybrid data hiding scheme using right-most digit replacement and adaptive least significant bit for digital images
  8. 2016.04.27 A survey of reversible data hiding methods in dual images
  9. 2016.04.07 정보은닉기법을 적용한 함정 전투체계 소나 영상의 정보관리 방안 연구
  10. 2016.04.07 안드로이드 스마트기기에서의 스테가노그래피 연구
  11. 2016.04.07 히스토그램 이동과 차분기법을 이용한 가역 비밀 이미지 공유기법
  12. 2016.04.07 2x2 서브그룹에서 최소/최대값을 이용한 가역 정보은닉기법 연구
  13. 2016.04.07 보간법과 개선된 JPEG 예측을 통한 스테가노그래픽 기법 연구
  14. 2016.04.07 픽셀값 모듈러 연산을 이용한 자료은닉 기법
  15. 2016.04.07 Emulab 테스트베드 환경에서의 분산 스테가노그래피 연구
  16. 2016.04.07 암호화된 이미지에서 대칭키 암호알고리듬을 이용한 가역 비밀공유 기법
  17. 2016.04.07 Dual image-based reversible data hiding method using neighboring pixel-value referencing
  18. 2014.07.08 High-capacity index based data hiding method
  19. 2014.02.10 Data hiding method of binary images based on block masking for key authentication
  20. 2014.02.04 Three-directional data hiding method for digital images

Advanced Science Letters (SCOPUS)

Posted by kingjung
|

Advanced Science Letters (SCOPUS)

Posted by kingjung
|

There are many kinds of military images used in naval combat system because various sensors are operated. The military images are displayed, analysed and stored with analysed informations according
to the tactical purpose on combat system. These images are used to target detection, analysis and classification. Thus the analysed information and images must be secured, the information hiding methods are the most eligible solutions to get secured informations and images. In this paper, the hybrid information hiding method based on the characteristics of the military images is proposed and the effectiveness is shown by experiments.

 

Journal of Korea Multimedia Society Vol. 19, No. 9, September 2016(pp. 1669-1678)

Posted by kingjung
|

In this paper, a new reversible data hiding method based on sorting and prediction in digital images is proposed. The proposed method can embed two bits in the 3 × 1 subblock at maximum by dividing into two groups - min and max groups. The pixel pairs of the min group and max group are firstly predicted and then are modified to embed the secret bits. The reversibility is guaranteed since the order of pixel pairs of the sub-block is not changed after embedding a secret bit into two groups. The experimental results show that the proposed method provides high embedding capacity than the previous works.

 

Multimedia Tools and Applications
DOI 10.1007/s11042-016-3739-x

Posted by kingjung
|

A reversible data hiding method allows recovery of the cover image after the secret data have been extracted. In this paper, a novel reversible data hiding method is proposed using neighboring interpolation and pixel-value differencing on block expansion. A consecutive embedding technique for a sub-block is proposed to maintain a higher embedding capacity, and a neighboring pixel-value  diffrencing is also proposed to maintain a good visual quality in stego-images. The results of experiment demonstrate that the proposed method has higher capacity and maintains a better image quality than previous reversible data hiding methods.

 

Journal of Real-Time Image Processing : Special issue on real-time data hiding and visual cryptography

Posted by kingjung
|

The previous secret image sharing schemes did not provide a copyright and privacy for cover images. The reason is that a dealer selects a cover image by itself and embeds directly the secret data into the cover image. In this paper, a reversible secret image sharing scheme in encrypted images is proposed in order to provide the copyright and privacy of the cover image. We divide a role of the dealer into an image provider and a data hider. The image provider encrypts the cover image and transmits the encrypted image to the data hider, and the standard stream cipher as one-time pad (OTP) with a random secret key is used. The data hider embeds the secret data into the encrypted image, and the encrypted shadow images are transmitted to the corresponding participant. We utilize the polynomial arithmetic operation over GF(28) during the sharing of the encrypted shadow images, and the coefficient of the highest-order term is fixed to one in order to prevent the overflow and the security problem. In the reconstruction procedure, the secret data can be extracted and the cover image can be reconstructed exactly from t or more encrypted shadow images with Lagrange interpolation. In experimental results, the proposed method shows that the PSNR is sustained close to 44 dB regardless of the embedding capacity, where the embedding capacity is 524,288 bits on average.

 

Multimedia Tools and Applications 75(21), 13931-13949, 2016

Posted by kingjung
|

The goal of image steganographic methods considers three main key issues: high embedding capacity, good visual symmetry/quality, and security. In this paper, a hybrid data hiding method combining the right-most digit replacement (RMDR) with an adaptive least significant bit (ALSB) is proposed to provide not only high embedding capacity but also maintain a good visual symmetry. The cover-image is divided into lower texture (symmetry patterns) and higher texture (asymmetry patterns) areas and these textures determine the selection of RMDR and ALSB methods, respectively, according to pixel symmetry. This paper has three major contributions. First, the proposed hybrid method enhanced the embedding capacity due to efficient ALSB utilization in the higher texture areas of cover images. Second, the proposed hybrid method maintains the high visual quality because RMDR has the closest selection process to generate the symmetry between stego and cover pixels. Finally, the proposed hybrid method is secure against statistical regular or singular (RS) steganalysis and pixel difference histogram steganalysis because RMDR is capable of evading the risk of RS detection attacks due to pixel digits replacement instead of bits. Extensive experimental tests (over 1500+ cover images) are conducted with recent least significant bit (LSB)-based hybrid methods and it is demonstrated that the proposed hybrid method has a high embedding capacity (800,019 bits) while maintaining good visual symmetry (39.00% peak signal-to-noise ratio (PSNR)).

 

Symmetry (SCIE), 2016

 

open access http://www.mdpi.com/2073-8994/8/6/41/

Posted by kingjung
|

Security systems become the first consideration to prevent illegal access as interest of information
security has increased recently. Information hiding is one of the methods for secret communication,
where the existence of the secret data is hidden. The embedding capacity and visual quality are
important issues to measure the performance. In this survey, reversible data hiding methods in dual
images are described and comparisons of these techniques are provided in terms of embedding
capacity and visual quality.

 

IETE TECHNICAL REVIEW (SCIE), 2016

 

online access with up to 50 colleagues http://www.tandfonline.com/eprint/wcRz4Its5NgRr4y9rdtM/full

Posted by kingjung
|

The SONAR waterfall image(SWI) is used typically to target detection in SONAR operation and is managed with additional data linked in the naval combat system. The SWI and additional data are very important to classify a kind of target. Although additional data of the SWI is essential and must be kept together with the SWI, it was stored separately in the current system. In this paper, we propose an improved information management method in the naval combat system, where additional data can be contained in the SWI together by using information hiding techniques. The experimental results show that the effectiveness of information hiding techniques in the naval combat system. It is demonstrated that the information hiding techniques can be applied to the SWI that can make the naval combat system to be robust and secure.

 

Journal of KIMST, Vol. 18. No. 6, pp. 779-788, 2015

Posted by kingjung
|

스마트폰 사용의 확대로 iOS와 Android 운영체제에 대한 관심이 높아지고 있다. 본 논문에서는 안드로이드 플랫폼을 기반으로 한 스테가노그래픽 기법으로 안드로이드에서 기본적으로 제공하는 그래픽 라이브러리인 스키아를 기반으로 한 영상 포맷을 분석하고, 분석된 포맷에 기반한 알고리즘을 제안한다. 제안하는 알고리즘은 Alpha, Red, Green, Blue 각각 8비트씩 총 32비트를 사용하는 트루 칼라를 기반으로 네 개의 각 8비트 영역을 활용하여 비밀자료를 숨긴다. 또한 이미지 왜곡이 덜 민감한 Alpha 영역을 활용하여 최대한 비밀자료를 숨길 수 있도록 알고리즘을 제안함으로써, 안드로이드를 기반으로 하는 스마트기기에 모두 사용이 가능할 것으로 보인다. 실험결과에서는 Alpha값의 변화에 따른 비밀자료 삽입용량과 이미지 왜곡 정도를 보임으로써 제안하는 알고리즘의 우수성을 증명하고 있다.

 

As increasing the use of smart phones, the interest of iOS and Android operating system is growing up. In this paper, a novel steganographic method based on Android platform is proposed. Firstly, we analyze the skia based image format that is supporting 2D graphic libraries in Android operating system. Then, we propose the information hiding method based on the Android bitmap image format. The proposed method hides the secret data on the four true color areas which include Alpha, Red, Green, Blue. In especial, we increase the size of the secret bits on the Alpha area because of the less image distortion. The experimental results show that the proposed method has a higher embedding capacity and less distortion by changing the size of the secret bits on the Alpha area.

 

전자공학회 논문지 제52권 제4호, 2015 711-717
Journal of The Institute of Electronics and Information Engineers Vol. 52, No. 4. April 2015, pp. 711-717

Posted by kingjung
|

본 논문에서는 히스토그램 이동(histogram shifting)과 차분(difference expansion)기법을 이용한 (2,2)-가역 비밀 이미지 공유 기법을 제안한다. 히스토그램 이동과 차분기법은 정보은닉(information hiding)에서 널리 사용되는 방법으로 원본(original)과 스테고 이미지(stego image) 간의 왜곡(distortion)을 줄이면서 비밀데이터의 삽입용량(embedding capacity)을 높이는 장점을 지닌다. 비밀 이미지(secret image) 공유 과정에서는, 기존 Shamir의 비밀 공유(secret sharing) 기법과 달리 원본 이미지와 이를 복사한 이미지 간의 픽셀 값에 대한 차분을 이용하여 차이값을 계산한 후 히스토그램을 생성하여 비밀 정보를 삽입하는 동시에 히스토그램을 이동시킨다. 생성된 2개의 공유된 이미지(shadow image)는 두 명의 참가자에게 나누어 주게 된다. 실험에서는 비밀 이미지의 삽입용량과 공유된 이미지와 원본 이미지 간의 왜곡 비율(ratio)을 측정한다. 실험 결과에서는 기존에 제안되었던 기법과의 비교·분석을 통하여 제안 기법의 우수성을 검증한다.

 

This paper proposes a (2,2)-reversible secret image sharing scheme using histogram shifting and difference expansion. These two techniques are widely used in information hiding. Advantages of the previous two works are the low distortion between cover and stego images and the high embedding capacity. In the secret image sharing procedure, the difference between the original image and copy image of original is computed by difference expansion unlike Shamir’s secret sharing. And then, the secret image is embedded into original and copy images by using histogram shifting. Lastly, two generated shdow images are distributed to each participant by the dealer. The experimental results show that the embedding capacity and image distortion ratio of the proposed scheme are superior to the previous schemes.

 

한국멀티미디어학회논문지 / v.17, no.7, 2014년, pp.849-857

Posted by kingjung
|

본 논문에서는 하나의 서브블럭내에서 픽셀값정렬과 예측오차확장기법을 확장한 새로운 가역 정보은닉기법을 제안한다. 각 2x2 서브블록에서 최소값 그룹과 최대값 그룹으로 나누고, 최소값 그룹에서는 제일 작은 값에 비밀자료를 숨기고, 최대값 그룹에서는 제일 큰 값에 비밀자료를 숨긴다. 제안한 알고리즘은 평균 13,900 비트의 삽입용량을 가지는데 이 결과는 31.39dB의 시각적인 왜곡을 유지하면서 기존 알고리즘보다 4,553 비트 더 많이 숨길 수 있음을 실험을 통해서 보여주고 있다.

 

A novel reversible data hiding method using pixel value ordering and prediction error expansion in the sub-block is resented in this paper. For each non-overlapping 2x2 sub-block, we divide into two groups. In the min group, the lowest value is changed to embed a secret bit and the highest value is changed in the max group. The experimental results show that the proposed method achieves a good visual quality and high capacity. The proposed method can embed 13,900 bits on average, it is higher 4,553 bits than the previous method and the visual quality is maintained 31.39dB on average.

 

전자공학회 논문지 제51권 제4호, 2014 745-751

Posted by kingjung
|

The previous steganographic methods by using the interpolation were difficult to estimate exactly because the size of cover images are extended by interpolation algorithms. In this paper, we propose the improved steganographic method based on the pixel replacement algorithms. In our method, we cannot extend a cover image, but also can estimate exactly the image quality of the stego-images. In the experimental results, the estimated quality and embedding capacity of stego-image are shown on three pixel replacement methods.

 

한국군사과학기술학회지, 제16권 제2호(2013년4월) pp. 185-190

Posted by kingjung
|

Data hiding is one of protective methods that can authenticate the completeness of digital information and protect intelligent property rights and copyright through secret communications. In this paper, we propose a data hiding method using pixel-value modular operation that has a high capacity while maintaining a good visual quality. The proposed method can embed secret data on the every pixel of a cover image by modular operation. The experiment results demonstrate that the proposed method has a high capacity and good visual quality where the embedding capacity is 91,138 bytes, the PSNR is 47.94dB, and the Q index is 0.968.

 

멀티미디어학회 논문지 제18권4호, 2015년4월, 483-491
Journal of Korea Multimedia Society, Vol. 18. No. 4, April 2015, pp. 483-491

Posted by kingjung
|

스테가노그래피는 비밀 데이터가 숨겨져 있다는 그 자체를 숨기는 방법을 말한다. Emulab은 연구자가 언제든지 원하는 운영체제 시스템과 네트워크 토폴리지를 구성할 수 있도록 제공하는 프레임워크이다. 본 논문에서는 Emulab 환경에서 스테가노그래피 기법을 처음으로 적용하여 분산 처리가 가능함을 보이고자 한다. 칼라 비트맵 이미지를 사용하여 Emulab 환경에서 한 대의 서버와 여러 대의 클라이언트별로 나누어 처리하게 함으로써 알고리즘의 성능을 평가한다. 커버 이미지로 사용하는 칼라 이미지는 RGB 영역으로 각각 나누어지고, 각각의 영역에 대해서 비밀 데이터를 각 클라이언트에서 분산처리하게 하고, 성능을 비교하게 된다. 실험결과에서는 커버 이미지의 크기가 증가함에 따라 클라이언트/서버 구조를 가진 Emulab 환경에서 실행시간이 지속적으로 향상됨을 보여주고 있다.

 

Steganography is to conceal the existence of secrete data itself. The Emulab is a framework to provide real systems and network topology that can set up at anytime by researchers. In this paper, we show that steganography techniques can be applied in the Emulab environment. Steganography methods are evaluated on a standalone and sharing environments using the color bitmap images. The cover image is divided into RGB channels and then embedded the secret data at each client. The experimental results demonstrate that execution time is better in client/server environment as cover image size is increasing.

 

Journal of The Institute of Electronics and Information Engineers Vol. 52, NO. 11, November 2015, pp. 1973-1978

Posted by kingjung
|

This paper proposes a novel reversible secret sharing scheme using AES algorithm in encrypted images. In the proposed scheme, a role of the dealer is divided into an image provider and a data hider. The image provider encrypts the cover image with a shared secret key and sends it to the dealer. The dealer embeds the secret data into the encrypted image and transmits encrypted shadow images to the corresponding participants. We utilize Galois polynomial arithmetic operation over 28 and the coefficient of the higher-order term is fixed to one in order to prevent the overflow. In experimental results, we demonstrate that the PSNR is sustained close to 44dB and the embedding capacity is 524,288 bits.

 

멀티미디어학회논문지 제18권 제11호, 2015.11, p. 1332-1341

Posted by kingjung
|

Dual image-based reversible data hidings are recently proposed where dual copies of a cover image are used to embed the secret data. In this paper, a novel reversible data hiding method based on neighboring pixel-value differencing is proposed to increase embedding capacity with a good image quality. The mean value of neighboring pixels and the difference values are used to decide the size of embedding bits per the sub-block. The receiver can extract the secret data and recover the cover image from dual stego-images. The experimental results show that the proposed method has a higher capacity and still a good image quality where it could embed 767,922 bits and maintain 45.58 dB and 45.33 dB for dual images.

 

The Imaging Science Journal(SCIE), Vol. 63(7) (9.2015) 398-407

 

 

 

Posted by kingjung
|

In this paper, a high-capacity data hiding method based on the index function is presented. The cover image is divided into non-overlapping sub-blocks, and the basis pixel is calculated by the index function. Difference values with other pixel-pairs are referenced to decide the number of embedding secret bits with the range table. The experimental results demonstrate that the proposed method could embed 2.45 bpp on average without distortion to the human visual system. We showed that the embedding capacity of the proposed method is 214,227 bits, 213,879 bits, 9,445 bits, 12,240 bits, and 109,253 bits larger than previous works on average for 12 test images.

 

Multimedia Tools and Applications, 2014 (SCIE)

Posted by kingjung
|

This paper proposes a new data hiding method for binary images using block masking to distribute keys to two parts and authenticate the right authorized part. The proposed method divides a cover image into a small sub-blocks and design key pairs that decide the position of the embedding bit and determine whether it is possible to embed or not. Also, key pairs are required to extract secret data from the stego-image. The experimental results have a higher capacity and less distortion since almost all data were hidden into edge areas.

 

Information Sciences, Vol 277, 1 September 2014, pp. 188-196 (SCIE)

Posted by kingjung
|

A data hiding method using 3-directional pixel-value differencing for gray images is presented in this paper. The cover image is divided into non-overlapping 2 x 2 sub-blocks and the basis pixel is selected to calculate different three values of a sub-block. Difference values are replaced by embedding the number of secret bits that is referenced by the range table. For three pixel pairs in the sub-block, the optimal pixel adjustment is preceded to reduce the distortion of visual quality. The experimental results demonstrate that the proposed method provides a high capacity and good visual quality.

 

Cyptologia 38(2), 178-191, 2014 (SCIE)

Posted by kingjung
|