RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      KCI등재후보 SCIE SCOPUS

      Secure Modulus Data Hiding Scheme = Secure Modulus Data Hiding Scheme

      한글로보기

      https://www.riss.kr/link?id=A103351817

      • 0

        상세조회
      • 0

        다운로드
      서지정보 열기
      • 내보내기
      • 내책장담기
      • 공유하기
      • 오류접수

      부가정보

      다국어 초록 (Multilingual Abstract)

      In 2006, Zhang and Wang proposed a data hiding scheme based on Exploiting Modification Direction (EMD) to increase data hiding capacity. The major benefit of EMD is providing embedding capacity greater than 1 bit per pixel. Since then, many EMD-type d...

      In 2006, Zhang and Wang proposed a data hiding scheme based on Exploiting Modification Direction (EMD) to increase data hiding capacity. The major benefit of EMD is providing embedding capacity greater than 1 bit per pixel. Since then, many EMD-type data hiding schemes have been proposed. However, a serious disadvantage common to these approaches is that the embedded data is compromised when the embedding function is disclosed. Our proposed secure data hiding scheme remedies this disclosure shortcoming by employing an additional modulus function. The provided security analysis of our scheme demonstrates that attackers cannot get the secret information from the stegoimage even if the embedding function is made public. Furthermore, our proposed scheme also gives a simple solution to the overflow/underflow problem and maintains high embedding capacity and good stegoimage quality.

      더보기

      참고문헌 (Reference)

      1 W. C. Kuo., "The high embedding steganographic method based on general multi-EMD" 286-289, 2012

      2 J. Mie i ainen., "LSB matching revisited" 13 (13): 285-287, 2006

      3 F. A. P. Petitcolas., "In ormation hiding-a surve" 87 (87): 1062-1078, 1999

      4 C. S. Kim., "Im roved steganographic embedding exploiting modification direction in multimedia communications" Springer 130-138, 2011

      5 X. Zhang., "E icient steganogrra hic embedding b ex oiting modi i-cation" 10 (10): 781-783, 2006

      6 L. F. Turner., "Digita data securit s stem"

      7 J. Fridrich., "Detecting steganogra h in co or and gra sca e images" 8 (8): 22-28, 2001

      8 W. C. Kuo., "Data hiding based on generalized exploiting modification direction method" 2012

      9 K. Y. Lin., "Data hiding b exploiting modification direction technique using o tima ixe grou ing" 3 : 121-123, 2010

      10 D. Stinson, "Cryptography: Theory and Practice" CRC Press 1995

      1 W. C. Kuo., "The high embedding steganographic method based on general multi-EMD" 286-289, 2012

      2 J. Mie i ainen., "LSB matching revisited" 13 (13): 285-287, 2006

      3 F. A. P. Petitcolas., "In ormation hiding-a surve" 87 (87): 1062-1078, 1999

      4 C. S. Kim., "Im roved steganographic embedding exploiting modification direction in multimedia communications" Springer 130-138, 2011

      5 X. Zhang., "E icient steganogrra hic embedding b ex oiting modi i-cation" 10 (10): 781-783, 2006

      6 L. F. Turner., "Digita data securit s stem"

      7 J. Fridrich., "Detecting steganogra h in co or and gra sca e images" 8 (8): 22-28, 2001

      8 W. C. Kuo., "Data hiding based on generalized exploiting modification direction method" 2012

      9 K. Y. Lin., "Data hiding b exploiting modification direction technique using o tima ixe grou ing" 3 : 121-123, 2010

      10 D. Stinson, "Cryptography: Theory and Practice" CRC Press 1995

      11 F. M. J. Willems., "Capacity and codes for embedding information in gray-scale signals" 51 (51): 1209-1214, 2005

      12 C. F. Lee., "An improvement of EMD embedding method for large payloads by pixel segmentation strateg" 26 (26): 1670-1676, 2008

      13 T. Shar., "An im ementation o e -based digita signa steganogra h" Springer 13-26, 2001

      14 Chi-Shiang Chan, "An Image Hiding Scheme by Linking Pixels in the Circular Way" 한국인터넷정보학회 6 (6): 1718-1734, 2012

      15 C. F. Lee., "A steganographic method with high embedding capacity by improving exploiting modification direction" 1 : 497-500, 2007

      16 X. Liao., "A steganogra hic method or digita images with four-ixe di erencing and modi ied LSB substitution" 22 (22): 1-8, 2011

      17 X. T. Wang., "A nove mu ti-group exploiting modi ication direction method based on switch ma" 92 (92): 1525-1535, 2012

      18 R. L. Rivest., "A method or obtaining digita signatures and public-e cr tos stems" 21 (21): 120-126, 1978

      19 W. C. Kuo., "A data hiding scheme with high embedding capacity based on general improving exploiting modification direction method" 69-73, 2009

      더보기

      동일학술지(권/호) 다른 논문

      동일학술지 더보기

      더보기

      분석정보

      View

      상세정보조회

      0

      Usage

      원문다운로드

      0

      대출신청

      0

      복사신청

      0

      EDDS신청

      0

      동일 주제 내 활용도 TOP

      더보기

      주제

      연도별 연구동향

      연도별 활용동향

      연관논문

      연구자 네트워크맵

      공동연구자 (7)

      유사연구자 (20) 활용도상위20명

      인용정보 인용지수 설명보기

      학술지 이력

      학술지 이력
      연월일 이력구분 이력상세 등재구분
      학술지등록 한글명 : KSII Transactions on Internet and Information Systems
      외국어명 : KSII Transactions on Internet and Information Systems
      2023 평가예정 해외DB학술지평가 신청대상 (해외등재 학술지 평가)
      2020-01-01 평가 등재학술지 유지 (해외등재 학술지 평가) KCI등재
      2013-10-01 평가 등재학술지 선정 (기타) KCI등재
      2011-01-01 평가 등재후보학술지 유지 (기타) KCI등재후보
      2009-01-01 평가 SCOPUS 등재 (신규평가) KCI등재후보
      더보기

      학술지 인용정보

      학술지 인용정보
      기준연도 WOS-KCI 통합IF(2년) KCIF(2년) KCIF(3년)
      2016 0.45 0.21 0.37
      KCIF(4년) KCIF(5년) 중심성지수(3년) 즉시성지수
      0.32 0.29 0.244 0.03
      더보기

      이 자료와 함께 이용한 RISS 자료

      나만을 위한 추천자료

      해외이동버튼