• 제목/요약/키워드: Secret Data

검색결과 367건 처리시간 0.023초

비밀자료 삽입용량을 증가시키기 위한 비밀 공유 기반의 이중 이미지 가역 정보은닉 기법 (Dual Image Reversible Data Hiding Scheme Based on Secret Sharing to Increase Secret Data Embedding Capacity)

  • 김평한;유관우
    • 한국멀티미디어학회논문지
    • /
    • 제25권9호
    • /
    • pp.1291-1306
    • /
    • 2022
  • The dual image-based reversible data hiding scheme embeds secret data into two images to increase the embedding capacity of secret data. The dual image-based reversible data hiding scheme can transmit a lot of secret data. Therefore, various schemes have been proposed until recently. In 2021, Chen and Hong proposed a dual image-based reversible data hiding scheme that embeds a large amount of secret data using a reference matrix, secret data, and bit values. However, in this paper, more secret data can be embedded than Chen and Hong's scheme. To achieve this goal, the proposed scheme generates polynomials and shared values using secret sharing scheme, and embeds secret data using reference matrix and septenary number, and random value. Experimental results show that the proposed scheme can transmit more secret data to the receiver while maintaining the image quality similar to other dual image-based reversible data hiding schemes.

효과적인 가역 정보은닉을 위한 픽셀의 차이 값을 이용한 개선된 보간법 (An Improved Interpolation Method using Pixel Difference Values for Effective Reversible Data Hiding)

  • 김평한;정기현;윤은준;유관우
    • 한국멀티미디어학회논문지
    • /
    • 제24권6호
    • /
    • pp.768-788
    • /
    • 2021
  • The reversible data hiding technique safely transmits secret data to the recipient from malicious attacks by third parties. In addition, this technique can completely restore the image used as a transmission medium for secret data. The reversible data hiding schemes have been proposed in various forms, and recently, the reversible data hiding schemes based on interpolation are actively researching. The reversible data hiding scheme based on the interpolation method expands the original image into the cover image and embed secret data. However, the existing interpolation-based reversible data hiding schemes did not embed secret data during the interpolation process. To improve this problem, this paper proposes embedding the first secret data during the image interpolation process and embedding the second secret data into the interpolated cover image. In the embedding process, the original image is divided into blocks without duplicates, and the maximum and minimum values are determined within each block. Three way searching based on the maximum value and two way searching based on the minimum value are performed. And, image interpolation is performed while embedding the first secret data using the PVD scheme. A stego image is created by embedding the second secret data using the maximum difference value and log function in the interpolated cover image. As a result, the proposed scheme embeds secret data twice. In particular, it is possible to embed secret data even during the interpolation process of an image that did not previously embed secret data. Experimental results show that the proposed scheme can transmit more secret data to the receiver while maintaining the image quality similar to other interpolation-based reversible data hiding schemes.

오차 확산법을 이용한 기밀 데이터 합성법 (Embedding Method of Secret Data using Error-Diffusion)

  • 박영란;이혜주;박지환
    • 한국멀티미디어학회논문지
    • /
    • 제2권2호
    • /
    • pp.155-165
    • /
    • 1999
  • 암호화(encryption)된 정보는 랜멈한 형태이기 때문에 공격자에 의해 기밀 정보가 누출될 위협이 있다. 한편, 화상 심충암호(image steganography)는 화상 내에 기밀 정보를 몰래 숨겨서 전송하는 것으로 제3자는 기밀 정보의 폰재 사실을 알 수 없기 때문에 공격의 위협을 줄일 수 있게 된다. 화상 심충암호에서 기밀 정보는 잡음의 형태로 화상의 화소값을 변경하여 숨기게 된다 이와 같이 농담화상(gray image)에 기밀 정보 를 숨기는 경우에는 잡음으로 인한 화질 열화를 초래한다. 따라서, 농담화상에 디더링(dithering)을 수행하는 과정에서 기밀 정보를 숨기는 방식이 고안되었다 오차 확산법을 이용한 기존의 방식은 고정된 간격마다 기밀 정보를 합성함에 따라 일정한 패턴이 생기는 문제점이 있다 이러한 문제를 해결하고 기존의 방법을 향상시키기 위하여 본 논문에서는 런 길이(run length)를 이용하여 변환점에 기밀 정보를 합성하거나 원래의 디더값과 오차가 가장 적은 위치에 기밀 정보를 합성하는 새로운 방법을 제안하고, 그 성능을 컴퓨터 시율레이 션올 통하여 평가하였다.

  • PDF

비밀데이터의 패턴정보에 기반한 새로운 정보은닉 기법 (A New Information Data Hiding Scheme based on Pattern Information of Secret Data)

  • 김기종;신상호;유기영
    • 한국멀티미디어학회논문지
    • /
    • 제15권4호
    • /
    • pp.526-539
    • /
    • 2012
  • 현재까지 연구된 대부분의 정보은닉 기법관련 알고리듬들은 커버영상(cover image)의 변경 또는 조작을 통해 비밀데이터를 삽입(embedding)하여 스테고영상(stego image)을 생성하고, 생성된 스테고영상으로부터 비밀데이터를 추출(extraction)하였다. 이러한 알고리듬은 PSNR의 수치가 높고, 비밀데이터의 수용량(capacity)이 많을수록 좋은 것으로 간주한다. 본 논문에서는 비밀데이터의 패턴(pattern)을 분석하여 숨기는 비밀데이터의 양이 많고, PSNR의 값이 우수한 효율적인 정보은닉 알고리듬을 제안한다. 제안하는 정보은닉 알고리듬은 비밀데이터를 분석하여 비밀데이터 내의 빈도수가 높은 값들을 찾고, 이들의 좌표 값과 인덱스(index)정보를 이용해 커버영상에 삽입한다. 이를 통해 커버영상과 스테고영상 간의 차이는 줄이면서 기존의 제안되었던 알고리듬에 비해 높은 수용량을 보여줌을 실험을 통해 비교한다. 실험결과에서는 5 종류의 비밀 데이터와 8 가지 이하의 패턴을 이용해 커버영상에 삽입하여 생성된 스테고영상과의 차이를 측정한 PSNR과 숨겨진 비밀데이터의 양의 결과를 통해 기존에 제안되었던 알고리듬들 비해 제안하는 정보은닉 알고리듬이 우수함을 보여준다.

An Intelligent 2D Secret Share Construction using Visual Cryptography for Secure Transmission

  • Kumar, N. Rajesh;Krishnan, R. Bala;Manikandan, G.;Raajan, N.R.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권7호
    • /
    • pp.2862-2878
    • /
    • 2020
  • Data Security is the most challenging area in Internet communication, where most of the secret sharing schemes are proposed for binary images. But still it lacks in providing security for data communication, especially in image transmission. Traditional visual cryptography scheme generate meaningless diwies and the reconstruction phase leads to quality degradation over the secret image. In this work, an intelligent two dimensional secret share construction scheme is proposed. A secret image is expanded into n diwies with the choice of scheme selection. By Stacking all the qualified diwies to revert the secret image without content loss and less than s* - 1 shares could not reveal any information about the secret image. The experimental results emphasize that the proposed secret share scheme is highly secured for image transmission.

비밀 공유 기반의 7×7 스도쿠를 사용한 가역 정보 은닉 기법 (A Reversible Data Hiding Scheme Using 7×7 Sudoku Based on Secret Sharing)

  • 김영주;김평한;유기영
    • 한국멀티미디어학회논문지
    • /
    • 제20권2호
    • /
    • pp.261-270
    • /
    • 2017
  • Data hiding is a way to hide the information in multimedia media such as images or video. The scheme proposed by Nguyen and Chang, was able to embed, extract, and restore the cover image and the secret data using Sudoku. But in the extracting phase, the occurrence of duplicate values in the reference matrix was found to decrease the embedding capacity of secret data. This paper has proposed a reversible data hiding scheme while maintaining the quality of the image to provide high embedding capacity using $7{\times}7$ Sudoku and Shamir's secret sharing scheme.

New Secret Sharing Scheme for Privacy Data Management

  • 송유진;이동혁
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2006년도 하계학술대회
    • /
    • pp.765-773
    • /
    • 2006
  • In ubiquitous environment, private enterprise or public institution's privacy data are sometimes exposed to hackers because of the lack of the sense of information security. We apply secret sharing scheme to solve the privacy problems. But, the existing secret sharing scheme are not suitable for the management of large a quantity of data because that required operation of large capacity. In this paper, We propose new secret sharing scheme for privacy data management. Our scheme makes high-speed operation possible, and it also allows for set weight for each secret pieces depending on weight of participants. The scheme proposed in this paper makes it efficient to collect and manage secure privacy data in ubiquitous environment.

  • PDF

Dual Optical Encryption for Binary Data and Secret Key Using Phase-shifting Digital Holography

  • Jeon, Seok Hee;Gil, Sang Keun
    • Journal of the Optical Society of Korea
    • /
    • 제16권3호
    • /
    • pp.263-269
    • /
    • 2012
  • In this paper, we propose a new dual optical encryption method for binary data and secret key based on 2-step phase-shifting digital holography for a cryptographic system. Schematically, the proposed optical setup contains two Mach-Zehnder type interferometers. The inner interferometer is used for encrypting the secret key with the common key, while the outer interferometer is used for encrypting the binary data with the same secret key. 2-step phase-shifting digital holograms, which result in the encrypted data, are acquired by moving the PZT mirror with phase step of 0 or ${\pi}/2$ in the reference beam path of the Mach-Zehnder type interferometer. The digital hologram with the encrypted information is a Fourier transform hologram and is recorded on CCD with 256 gray level quantized intensities. Computer experiments show the results to be encryption and decryption carried out with the proposed method. The decryption of binary secret key image and data image is performed successfully.

Constructive Steganography by Tangles

  • Qian, Zhenxing;Pan, Lin;Huang, Nannan;Zhang, Xinpeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권8호
    • /
    • pp.3911-3925
    • /
    • 2018
  • This paper proposes a novel steganography method to hide secret data during the generation of tangle patterns. Different from the traditional steganography based on modifying natural images, we propose to construct stego images according to the secret messages. We first create a model to group a selected image contour, and define some basic operations to generate various pattern cells. During data hiding, we create a cell library to establish the relationships between cells and secret data. By painting the cell inside the image contour, we create a dense tangle pattern to carry secret data. With the proposed method, a recipient can extract the secret data correctly. Experimental results show that the proposed method has a flexible embedding capacity. The constructed stego tangle image has good visual effects, and is secure against adversaries. Meanwhile, the stego tangle pattern is also robust to JPEG compression.

Novel Secure Hybrid Image Steganography Technique Based on Pattern Matching

  • Hamza, Ali;Shehzad, Danish;Sarfraz, Muhammad Shahzad;Habib, Usman;Shafi, Numan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권3호
    • /
    • pp.1051-1077
    • /
    • 2021
  • The secure communication of information is a major concern over the internet. The information must be protected before transmitting over a communication channel to avoid security violations. In this paper, a new hybrid method called compressed encrypted data embedding (CEDE) is proposed. In CEDE, the secret information is first compressed with Lempel Ziv Welch (LZW) compression algorithm. Then, the compressed secret information is encrypted using the Advanced Encryption Standard (AES) symmetric block cipher. In the last step, the encrypted information is embedded into an image of size 512 × 512 pixels by using image steganography. In the steganographic technique, the compressed and encrypted secret data bits are divided into pairs of two bits and pixels of the cover image are also arranged in four pairs. The four pairs of secret data are compared with the respective four pairs of each cover pixel which leads to sixteen possibilities of matching in between secret data pairs and pairs of cover pixels. The least significant bits (LSBs) of current and imminent pixels are modified according to the matching case number. The proposed technique provides double-folded security and the results show that stego image carries a high capacity of secret data with adequate peak signal to noise ratio (PSNR) and lower mean square error (MSE) when compared with existing methods in the literature.