http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Halder, Tanmoy,Karforma, Sunil,Mandal, Rupali Korea Information Processing Society 2019 Journal of information processing systems Vol.15 No.2
In order to protect secret digital documents against vulnerabilities while communicating, steganography algorithms are applied. It protects a digital file from unauthorized access by hiding the entire content. Pixel-value-difference being a method from spatial domain steganography utilizes the difference gap between neighbor pixels to fulfill the same. The proposed approach is a block-wise embedding process where blocks of variable size are chosen from the cover image, therefore, a stream of secret digital contents is hidden. Least significant bit (LSB) substitution method is applied as an adaptive mechanism and optimal pixel adjustment process (OPAP) is used to minimize the error rate. The proposed application succeeds to maintain good hiding capacity and better signal-to-noise ratio when compared against other existing methods. Any means of digital communication specially e-Governance applications could be highly benefited from this approach.
효과적인 가역 정보은닉을 위한 픽셀의 차이 값을 이용한 개선된 보간법
김평한,정기현,윤은준,유관우,Kim, Pyung Han,Jung, Ki Hyun,Yoon, Eun-Jun,Ryu, Kwan-Woo 한국멀티미디어학회 2021 멀티미디어학회논문지 Vol.24 No.6
The reversible data hiding technique safely transmits secret data to the recipient from malicious attacks by third parties. In addition, this technique can completely restore the image used as a transmission medium for secret data. The reversible data hiding schemes have been proposed in various forms, and recently, the reversible data hiding schemes based on interpolation are actively researching. The reversible data hiding scheme based on the interpolation method expands the original image into the cover image and embed secret data. However, the existing interpolation-based reversible data hiding schemes did not embed secret data during the interpolation process. To improve this problem, this paper proposes embedding the first secret data during the image interpolation process and embedding the second secret data into the interpolated cover image. In the embedding process, the original image is divided into blocks without duplicates, and the maximum and minimum values are determined within each block. Three way searching based on the maximum value and two way searching based on the minimum value are performed. And, image interpolation is performed while embedding the first secret data using the PVD scheme. A stego image is created by embedding the second secret data using the maximum difference value and log function in the interpolated cover image. As a result, the proposed scheme embeds secret data twice. In particular, it is possible to embed secret data even during the interpolation process of an image that did not previously embed secret data. Experimental results show that the proposed scheme can transmit more secret data to the receiver while maintaining the image quality similar to other interpolation-based reversible data hiding schemes.
Tanmoy Halder,Sunil Karforma,Rupali Mandal 한국정보처리학회 2019 Journal of information processing systems Vol.15 No.2
In order to protect secret digital documents against vulnerabilities while communicating, steganographyalgorithms are applied. It protects a digital file from unauthorized access by hiding the entire content. Pixelvalue-difference being a method from spatial domain steganography utilizes the difference gap betweenneighbor pixels to fulfill the same. The proposed approach is a block-wise embedding process where blocks ofvariable size are chosen from the cover image, therefore, a stream of secret digital contents is hidden. Leastsignificant bit (LSB) substitution method is applied as an adaptive mechanism and optimal pixel adjustmentprocess (OPAP) is used to minimize the error rate. The proposed application succeeds to maintain good hidingcapacity and better signal-to-noise ratio when compared against other existing methods. Any means of digitalcommunication specially e-Governance applications could be highly benefited from this approach.