The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Dua isu penciptaan imej seni dan penyembunyian data disepadukan menjadi satu dan diselesaikan dengan pendekatan tunggal dalam kajian ini. Kaedah automatik untuk menghasilkan jenis seni komputer baharu, dipanggil imej kaca berwarna, yang meniru gambar tingkap kaca berwarna, dicadangkan. Kaedah ini berdasarkan penggunaan struktur pokok untuk kawasan tumbuh untuk membina imej seni. Turut dicadangkan ialah kaedah penyembunyian data yang menggunakan ciri umum struktur pokok, iaitu bilangan nod pokok, untuk mengekod data yang akan dibenamkan. Kaedah ini boleh diubah suai untuk kegunaan dalam tiga aplikasi perlindungan maklumat, iaitu, komunikasi rahsia, penanda air, dan pengesahan imej. Selain kandungan imej stego artistik yang boleh mengalih perhatian penggodam kepada data tersembunyi, keselamatan data juga dipertimbangkan dengan merawak kedua-dua data input dan lokasi benih untuk pertumbuhan wilayah, menghasilkan imej stego yang teguh terhadap serangan penggodam. Keputusan eksperimen yang baik membuktikan kebolehlaksanaan kaedah yang dicadangkan juga disertakan.
Shi-Chei HUNG
National Chiao Tung University
Da-Chun WU
National Kaohsiung University of Science and Technology
Wen-Hsiang TSAI
National Chiao Tung University,Asia University
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Salinan
Shi-Chei HUNG, Da-Chun WU, Wen-Hsiang TSAI, "Data Hiding in Computer-Generated Stained Glass Images and Its Applications to Information Protection" in IEICE TRANSACTIONS on Information,
vol. E103-D, no. 4, pp. 850-865, April 2020, doi: 10.1587/transinf.2019EDP7239.
Abstract: The two issues of art image creation and data hiding are integrated into one and solved by a single approach in this study. An automatic method for generating a new type of computer art, called stained glass image, which imitates the stained-glass window picture, is proposed. The method is based on the use of a tree structure for region growing to construct the art image. Also proposed is a data hiding method which utilizes a general feature of the tree structure, namely, number of tree nodes, to encode the data to be embedded. The method can be modified for uses in three information protection applications, namely, covert communication, watermarking, and image authentication. Besides the artistic stego-image content which may distract the hacker's attention to the hidden data, data security is also considered by randomizing both the input data and the seed locations for region growing, yielding a stego-image which is robust against the hacker's attacks. Good experimental results proving the feasibility of the proposed methods are also included.
URL: https://global.ieice.org/en_transactions/information/10.1587/transinf.2019EDP7239/_p
Salinan
@ARTICLE{e103-d_4_850,
author={Shi-Chei HUNG, Da-Chun WU, Wen-Hsiang TSAI, },
journal={IEICE TRANSACTIONS on Information},
title={Data Hiding in Computer-Generated Stained Glass Images and Its Applications to Information Protection},
year={2020},
volume={E103-D},
number={4},
pages={850-865},
abstract={The two issues of art image creation and data hiding are integrated into one and solved by a single approach in this study. An automatic method for generating a new type of computer art, called stained glass image, which imitates the stained-glass window picture, is proposed. The method is based on the use of a tree structure for region growing to construct the art image. Also proposed is a data hiding method which utilizes a general feature of the tree structure, namely, number of tree nodes, to encode the data to be embedded. The method can be modified for uses in three information protection applications, namely, covert communication, watermarking, and image authentication. Besides the artistic stego-image content which may distract the hacker's attention to the hidden data, data security is also considered by randomizing both the input data and the seed locations for region growing, yielding a stego-image which is robust against the hacker's attacks. Good experimental results proving the feasibility of the proposed methods are also included.},
keywords={},
doi={10.1587/transinf.2019EDP7239},
ISSN={1745-1361},
month={April},}
Salinan
TY - JOUR
TI - Data Hiding in Computer-Generated Stained Glass Images and Its Applications to Information Protection
T2 - IEICE TRANSACTIONS on Information
SP - 850
EP - 865
AU - Shi-Chei HUNG
AU - Da-Chun WU
AU - Wen-Hsiang TSAI
PY - 2020
DO - 10.1587/transinf.2019EDP7239
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E103-D
IS - 4
JA - IEICE TRANSACTIONS on Information
Y1 - April 2020
AB - The two issues of art image creation and data hiding are integrated into one and solved by a single approach in this study. An automatic method for generating a new type of computer art, called stained glass image, which imitates the stained-glass window picture, is proposed. The method is based on the use of a tree structure for region growing to construct the art image. Also proposed is a data hiding method which utilizes a general feature of the tree structure, namely, number of tree nodes, to encode the data to be embedded. The method can be modified for uses in three information protection applications, namely, covert communication, watermarking, and image authentication. Besides the artistic stego-image content which may distract the hacker's attention to the hidden data, data security is also considered by randomizing both the input data and the seed locations for region growing, yielding a stego-image which is robust against the hacker's attacks. Good experimental results proving the feasibility of the proposed methods are also included.
ER -