DOI QR코드

DOI QR Code

2×2 서브블록에서 최소/최대값을 이용한 가역 정보은닉기법 연구

Reversible Data Hiding Method Based on Min/Max in 2×2 Sub-blocks

  • 김우진 (경북대학교 컴퓨터공학부) ;
  • 김평한 (경북대학교 컴퓨터공학부) ;
  • 이준호 (국방과학연구소) ;
  • 정기현 (영진전문대학 컴퓨터정보계열) ;
  • 유기영 (경북대학교 컴퓨터공학부)
  • Kim, Woo-Jin (School of Computer Science and Engineering, Kyungpook National University) ;
  • Kim, Pyung-Han (School of Computer Science and Engineering, Kyungpook National University) ;
  • Lee, Joon-Ho (Agency of Defense Development) ;
  • Jung, Ki-Hyun (School of Computer Information, Yeungjin College) ;
  • Yoo, Kee-Young (School of Computer Science and Engineering, Kyungpook National University)
  • 투고 : 2014.02.28
  • 심사 : 2014.04.03
  • 발행 : 2014.04.25

초록

본 논문에서는 하나의 서브블럭내에서 픽셀값정렬과 예측오차확장기법을 확장한 새로운 가역 정보은닉기법을 제안한다. 각 $2{\times}2$ 서브블록에서 최소값 그룹과 최대값 그룹으로 나누고, 최소값 그룹에서는 제일 작은 값에 비밀자료를 숨기고, 최대값 그룹에서는 제일 큰 값에 비밀자료를 숨긴다. 제안한 알고리즘은 평균 13,900 비트의 삽입용량을 가지는데 이 결과는 31.39dB의 시각적인 왜곡을 유지하면서 기존 알고리즘보다 4,553 비트 더 많이 숨길 수 있음을 실험을 통해서 보여주고 있다.

A novel reversible data hiding method using pixel value ordering and prediction error expansion in the sub-block is resented in this paper. For each non-overlapping $2{\times}2$ sub-block, we divide into two groups. In the min group, the lowest value is changed to embed a secret bit and the highest value is changed in the max group. The experimental results show that the proposed method achieves a good visual quality and high capacity. The proposed method can embed 13,900 bits on average, it is higher 4,553 bits than the previous method and the visual quality is maintained 31.39dB on average.

키워드

참고문헌

  1. J.Y. Hsiao, K.F. Chan, and J. M. Chang, Block-based reversible data embedding, Signal Processing 89, pp. 556-569, 2009. https://doi.org/10.1016/j.sigpro.2008.10.018
  2. D.C. Lou, M.C. Hu, and J.L. Liu, Multiple layer data hiding scheme for medical images, Computer Standard & Interfaces 31, pp. 329-335, 2009. https://doi.org/10.1016/j.csi.2008.05.009
  3. B. Pfizmann. "Information Hiding Terminology." Proc. First International Information Hiding Workshop. LNCS 1174. pp. 347-350. 1996.
  4. W.L. Tai, C.M. Yeh, and C.C. Chang, Reversible data hiding based on histogram modification of pixel differences, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 19, No. 6, pp. 906-910, 2009. https://doi.org/10.1109/TCSVT.2009.2017409
  5. J. Zollner. H. Federrath. H. Klimant. A. Pfitzmann. R Piotraschke. A. Westfeld. G. Wicke. G. Wolf. "Modeling the Security of Steganographic Systems." 2nd Workshop on Information Hiding. pp. 345-355. 1988
  6. J. Tian, Reversible data embedding using a difference expansion, IEEE Transactions on Circuits and Systems for Video Technology 13(8), pp. 890-896, 2003. https://doi.org/10.1109/TCSVT.2003.815962
  7. A.M. Alattar, Reversible watermark using the difference expansion of a generalized integer transform, IEEE Transactions on Image Processing 13(8) (2004) 1147-1156 https://doi.org/10.1109/TIP.2004.828418
  8. O.M. Al-Qershi and B.E. Khoo, Two-dimensional difference expansion (2D-DE) scheme with a characteristics-based threshold, Signal Processing 93, pp. 154-162, 2013. https://doi.org/10.1016/j.sigpro.2012.07.012
  9. Z. Ni, Y.Q. Shi, N. Ansari, and W. Su, Reversible data hiding, Proc. of International Symposium on Circuits and Systems, Vol. 2, pp. 912-915, 2003.
  10. H. Luo, F.X. Yu, H. Chen, Z.L. Huang, H. Li, and P.H. Wang, Reversible data hiding based on block median preservation, Information Sciences 181, pp. 308-328, 2011. https://doi.org/10.1016/j.ins.2010.09.022
  11. Z. Zhao, H. Luo, Z.M. Lu, and J.S. Pan, Reversible data hiding based on multilevel histogram modification and sequential recovery, AEU - International Journal of Electronics and Communications 65(10), pp. 814-826, 2011. https://doi.org/10.1016/j.aeue.2011.01.014
  12. D.M. Thodi and J.J. Rodriguez, Expansion embedding techniques for reversible watermarking, IEEE Transactions on Image Processing 16(3), pp. 721-730, 2007. https://doi.org/10.1109/TIP.2006.891046
  13. Y. Hu, H.K. Lee, and J. Li, DE-based reversible data hiding with improved over-flow location map, IEEE Transactions on Circuits and Systems for Video Technology 19(2), pp. 250-260, 2009. https://doi.org/10.1109/TCSVT.2008.2009252
  14. K.H. Jung, K.Y. Yoo, Data hiding using image interpolation, Computer Standards & Interfaces 31(2), pp. 465-470, 2009. https://doi.org/10.1016/j.csi.2008.06.001
  15. X. Li, J. Li, B. Li, and B. Yang, High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion, Signal Porcessing 93, pp. 198-205, 2013. https://doi.org/10.1016/j.sigpro.2012.07.025
  16. K.H. Jung, K.Y. Yoo, Data hiding based on two-stage referencing for two-colour images, The Imaging Science Journal 61, pp. 475-483, 2013. https://doi.org/10.1179/1743131X12Y.0000000036