DOI QR코드

DOI QR Code

비밀자료 삽입용량을 증가시키기 위한 비밀 공유 기반의 이중 이미지 가역 정보은닉 기법

Dual Image Reversible Data Hiding Scheme Based on Secret Sharing to Increase Secret Data Embedding Capacity

  • Kim, Pyung Han (Dept. of Computer Science & Eng., Graduate School, Kyungpook National University) ;
  • Ryu, Kwan-Woo (Dept. of Computer Science & Eng., Graduate School, Kyungpook National University)
  • 투고 : 2022.05.06
  • 심사 : 2022.08.24
  • 발행 : 2022.09.30

초록

The dual image-based reversible data hiding scheme embeds secret data into two images to increase the embedding capacity of secret data. The dual image-based reversible data hiding scheme can transmit a lot of secret data. Therefore, various schemes have been proposed until recently. In 2021, Chen and Hong proposed a dual image-based reversible data hiding scheme that embeds a large amount of secret data using a reference matrix, secret data, and bit values. However, in this paper, more secret data can be embedded than Chen and Hong's scheme. To achieve this goal, the proposed scheme generates polynomials and shared values using secret sharing scheme, and embeds secret data using reference matrix and septenary number, and random value. Experimental results show that the proposed scheme can transmit more secret data to the receiver while maintaining the image quality similar to other dual image-based reversible data hiding schemes.

키워드

참고문헌

  1. W. Bender, D. Gruhl, N. Morimoto, and Aiguo Lu, "Techniques for Data Hiding,"IBM Systems Journal, Vol. 35, No. 3-4, pp. 313-336, 1996. https://doi.org/10.1147/sj.353.0313
  2. N.F. Johnson and S. Jajodia, "Exploring Steganography: Seeing the Unseen,"Computer Practices, Vol. 31, No. 2, pp. 26-34, 1998.
  3. F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, "Information Hiding - A Survey, "Proceedings of the IEEE, Special Issue on P rotection of Multimedia Content, Vol. 7, No. 87, pp. 1062-1078, 1999.
  4. X. Zhang and S. Wang, "Efficient Steganographic Embedding by Exploiting Modification Direction,"IEEE Communications Letters, Vol. 10, No. 11, pp. 781-783, 2006. https://doi.org/10.1109/LCOMM.2006.060863
  5. A. Ker, "Improved Detection of LSB Steganography in Grayscale Images,"Proceeding of Information Hiding Workshop, Vol. 3200, pp. 97-115, 2004.
  6. D.C. Wu and W.H. Tsai, "A Steganographic Method for Images by Pixel-Value Differencing,"Pattern Recognition Letters, Vol. 24, pp. 1613-1626, 2003. https://doi.org/10.1016/S0167-8655(02)00402-6
  7. Z. Ni, Y. Shi, N. Ansari, and W. Su, "Reversible Data Hiding,"IEEE Transaction on Circuits and Systems for Video Technology, Vol. 16, No. 3, pp. 354-362, 2006. https://doi.org/10.1109/TCSVT.2006.869964
  8. X. Li, J. Li, B. Li, and B. Yang, "High-Fidelity Reversible Data Hiding Scheme based on Pixel-Value-Ordering and Prediction-Error Expansion,"Signal Processing, Vol. 93, pp. 198-205, 2013. https://doi.org/10.1016/j.sigpro.2012.07.025
  9. C. Chang, T. Kieu, and Y. Chou, "Reversible Data Hiding Scheme Using Two Steganographic Images,"Proceeding of IEEE Region 10 International Conference, pp. 1-4, 2007.
  10. C. Lee, K. Wang, C. Chang, and Y. Huang, "A Reversible Data Hiding Scheme based on Dual Steganographic Images,"Proceeding of the Third International Conference on Ubiquitous Information Management and Communication, pp. 228-237, 2009.
  11. C. Qin, C. Chang, and T. Hsu, "Reversible Data Hiding Scheme based on Exploiting Modification Direction with Two Steganographic Images,"Multimedia Tools and Application, Vol. 74, No. 15, pp. 5861-5872, 2015. https://doi.org/10.1007/s11042-014-1894-5
  12. T. Lu, J. Wu, and C. Huang, "Dual-ImageBased Reversible Data Hiding Method Using Center Folding Starategy,"Signal Processing, Vol. 115, pp. 195-213, 2015. https://doi.org/10.1016/j.sigpro.2015.03.017
  13. X.F. Chen and W.L. Guo, "Reversible Data Hiding Scheme Based on Fully Exploiting the Orientation Combinations of Dual Stego-Images,"International Journal of Network Security, Vol. 22, No. 1, pp. 126-135, 2019.
  14. J.Y. Lin, Y. Chen, C.C. Chang, and Y.C. Hu, "Dual-Image-Based Reversible Data Hiding Scheme with Integrity Verification Using Exploiting Modification Direction,"Multimedia Tools and Applications, Vol 78, pp. 25855-25872, 2019. https://doi.org/10.1007/s11042-019-07783-y
  15. X. Chen and C. Hong, "An Efficient DualImage Reversible Data Hiding Scheme Based on Exploiting Modification Direction,"Journal of Information Security and Applications, Vol. 58, pp. 1-9, 2021.
  16. Y.J. Kim, P.H. Kim, and K.Y. Yoo, "A Reversible Data Hiding Scheme Using 7×7 Sudoku Based on Secret Sharing,"Journal of Korea Multimedia Society, Vol. 20, No. 2, pp. 261-270, 2017. https://doi.org/10.9717/KMMS.2017.20.2.261
  17. A. Shamir, "How to Share a Secret," Communications of the ACM, Vol. 22, No. 11, pp. 612-613, 1979. https://doi.org/10.1145/359168.359176
  18. B. Boehm, "StegExpose - A Tool for Detecting LSB Steganography," Computer Science, pp. 1-11, 2014