A new data hiding scheme for binary image authentication with small image distortion
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Younho | - |
dc.contributor.author | Kim, Heeyoul | - |
dc.contributor.author | Park, Yongsu | - |
dc.date.accessioned | 2022-12-20T20:21:19Z | - |
dc.date.available | 2022-12-20T20:21:19Z | - |
dc.date.created | 2022-08-26 | - |
dc.date.issued | 2009-11 | - |
dc.identifier.issn | 0020-0255 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/175966 | - |
dc.description.abstract | A new data hiding scheme for binary image authentication that has a small distortion of the cover image is proposed in this paper. Using the data-embedding algorithm that is based on Hamming codes, the proposed scheme embeds authentication information into the cover image with flipping only a small number of pixels. A special type of the pixels are selected and flipped by a new algorithm to minimize visual distortion. This new algorithm is based on ELSSM (Edge Line Segment Similarity Measure). Randomly shuffling the bit-order of the authentication information to be embedded, the information can only be extracted by the designated receiver who has the symmetric key. We employ two measurement metrics: miss detection rates for the degree of security and PSNR (Peak Signal-to-Noise Ratio) and ELSSM for the degree of the image distortion to demonstrate the feasibility of the proposed scheme. Using these metrics, we analyze the proposed scheme and the previous schemes. The analysis reveals that the proposed scheme requires less image distortion than the previous schemes whilst achieving the same level of the miss detection rate. Experimental results demonstrate that the proposed scheme is more resilient against recent steganalysis attacks than the previous schemes. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER SCIENCE INC | - |
dc.title | A new data hiding scheme for binary image authentication with small image distortion | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Park, Yongsu | - |
dc.identifier.doi | 10.1016/j.ins.2009.07.014 | - |
dc.identifier.scopusid | 2-s2.0-69549116445 | - |
dc.identifier.wosid | 000270620400004 | - |
dc.identifier.bibliographicCitation | INFORMATION SCIENCES, v.179, no.22, pp.3866 - 3884 | - |
dc.relation.isPartOf | INFORMATION SCIENCES | - |
dc.citation.title | INFORMATION SCIENCES | - |
dc.citation.volume | 179 | - |
dc.citation.number | 22 | - |
dc.citation.startPage | 3866 | - |
dc.citation.endPage | 3884 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.subject.keywordPlus | STEGANOGRAPHY | - |
dc.subject.keywordPlus | WATERMARKING | - |
dc.subject.keywordPlus | SECURITY | - |
dc.subject.keywordAuthor | Security | - |
dc.subject.keywordAuthor | Information hiding | - |
dc.subject.keywordAuthor | Image authentication | - |
dc.subject.keywordAuthor | Digital watermarking | - |
dc.subject.keywordAuthor | Authentication codes | - |
dc.identifier.url | https://www.sciencedirect.com/science/article/pii/S0020025509003272?via%3Dihub | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.