Automatic Recovery of Hidden Image from Image Steganography Using DNN and Local Entropy Features
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Jae Hoon | - |
dc.contributor.author | Kang, D.Y. | - |
dc.contributor.author | Lee, J.E. | - |
dc.contributor.author | Lee, Sang-Hwa | - |
dc.contributor.author | Park, Jong-Il | - |
dc.date.accessioned | 2022-07-07T22:13:48Z | - |
dc.date.available | 2022-07-07T22:13:48Z | - |
dc.date.created | 2021-05-13 | - |
dc.date.issued | 2020-07 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/145402 | - |
dc.description.abstract | Image steganography hides secret information in an image called cover image so naturally that the other users can not recognize the existence of information in the revealed image. This paper deals with an approach to recover the hidden image information from image steganography. The proposed approach investigates that the decoded hidden image information is a normal image or not. The normal and incorrectly decoded abnormal images have been trained using a deep neural network model and entropy features. The discrimination is processed with image patches since the information may be partially embedded in the cover image. The experiments are performed with respect to the various data capacities. The proposed approach discriminates and recovers the hidden image information automatically from a tremendously large number of steganography encoding methods. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
dc.title | Automatic Recovery of Hidden Image from Image Steganography Using DNN and Local Entropy Features | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Park, Jong-Il | - |
dc.identifier.scopusid | 2-s2.0-85091421911 | - |
dc.identifier.bibliographicCitation | ITC-CSCC 2020 - 35th International Technical Conference on Circuits/Systems, Computers and Communications, pp.440 - 445 | - |
dc.relation.isPartOf | ITC-CSCC 2020 - 35th International Technical Conference on Circuits/Systems, Computers and Communications | - |
dc.citation.title | ITC-CSCC 2020 - 35th International Technical Conference on Circuits/Systems, Computers and Communications | - |
dc.citation.startPage | 440 | - |
dc.citation.endPage | 445 | - |
dc.type.rims | ART | - |
dc.type.docType | Conference Paper | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordPlus | Computer circuits | - |
dc.subject.keywordPlus | Decoding | - |
dc.subject.keywordPlus | Deep neural networks | - |
dc.subject.keywordPlus | Entropy | - |
dc.subject.keywordPlus | Steganography | - |
dc.subject.keywordPlus | Automatic recovery | - |
dc.subject.keywordPlus | Data capacity | - |
dc.subject.keywordPlus | Encoding methods | - |
dc.subject.keywordPlus | Hidden images | - |
dc.subject.keywordPlus | Image steganography | - |
dc.subject.keywordPlus | Local entropy | - |
dc.subject.keywordPlus | Neural network model | - |
dc.subject.keywordPlus | Secret information | - |
dc.subject.keywordPlus | Image processing | - |
dc.subject.keywordAuthor | Data hiding | - |
dc.subject.keywordAuthor | Deep neural network | - |
dc.subject.keywordAuthor | Image entropy | - |
dc.subject.keywordAuthor | Image steganography | - |
dc.subject.keywordAuthor | Steganalysis | - |
dc.identifier.url | https://ieeexplore.ieee.org/abstract/document/9183136 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.