The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
As duas questões de criação de imagens artísticas e ocultação de dados são integradas em uma e resolvidas por uma única abordagem neste estudo. É proposto um método automático para gerar um novo tipo de arte computacional, denominado imagem de vitral, que imita a imagem do vitral. O método baseia-se na utilização de uma estrutura de árvore de crescimento regional para construir a imagem artística. Também é proposto um método de ocultação de dados que utiliza uma característica geral da estrutura da árvore, nomeadamente, o número de nós da árvore, para codificar os dados a serem incorporados. O método pode ser modificado para uso em três aplicações de proteção de informações, a saber, comunicação secreta, marca d'água e autenticação de imagem. Além do conteúdo artístico da estego-imagem que pode distrair a atenção do hacker para os dados ocultos, a segurança dos dados também é considerada ao aleatorizar tanto os dados de entrada quanto os locais de sementes para o crescimento da região, produzindo uma estego-imagem que é robusta contra os ataques do hacker. Bons resultados experimentais comprovando a viabilidade dos métodos propostos também estão incluídos.
Shi-Chei HUNG
National Chiao Tung University
Da-Chun WU
National Kaohsiung University of Science and Technology
Wen-Hsiang TSAI
National Chiao Tung University,Asia University
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copiar
Shi-Chei HUNG, Da-Chun WU, Wen-Hsiang TSAI, "Data Hiding in Computer-Generated Stained Glass Images and Its Applications to Information Protection" in IEICE TRANSACTIONS on Information,
vol. E103-D, no. 4, pp. 850-865, April 2020, doi: 10.1587/transinf.2019EDP7239.
Abstract: The two issues of art image creation and data hiding are integrated into one and solved by a single approach in this study. An automatic method for generating a new type of computer art, called stained glass image, which imitates the stained-glass window picture, is proposed. The method is based on the use of a tree structure for region growing to construct the art image. Also proposed is a data hiding method which utilizes a general feature of the tree structure, namely, number of tree nodes, to encode the data to be embedded. The method can be modified for uses in three information protection applications, namely, covert communication, watermarking, and image authentication. Besides the artistic stego-image content which may distract the hacker's attention to the hidden data, data security is also considered by randomizing both the input data and the seed locations for region growing, yielding a stego-image which is robust against the hacker's attacks. Good experimental results proving the feasibility of the proposed methods are also included.
URL: https://global.ieice.org/en_transactions/information/10.1587/transinf.2019EDP7239/_p
Copiar
@ARTICLE{e103-d_4_850,
author={Shi-Chei HUNG, Da-Chun WU, Wen-Hsiang TSAI, },
journal={IEICE TRANSACTIONS on Information},
title={Data Hiding in Computer-Generated Stained Glass Images and Its Applications to Information Protection},
year={2020},
volume={E103-D},
number={4},
pages={850-865},
abstract={The two issues of art image creation and data hiding are integrated into one and solved by a single approach in this study. An automatic method for generating a new type of computer art, called stained glass image, which imitates the stained-glass window picture, is proposed. The method is based on the use of a tree structure for region growing to construct the art image. Also proposed is a data hiding method which utilizes a general feature of the tree structure, namely, number of tree nodes, to encode the data to be embedded. The method can be modified for uses in three information protection applications, namely, covert communication, watermarking, and image authentication. Besides the artistic stego-image content which may distract the hacker's attention to the hidden data, data security is also considered by randomizing both the input data and the seed locations for region growing, yielding a stego-image which is robust against the hacker's attacks. Good experimental results proving the feasibility of the proposed methods are also included.},
keywords={},
doi={10.1587/transinf.2019EDP7239},
ISSN={1745-1361},
month={April},}
Copiar
TY - JOUR
TI - Data Hiding in Computer-Generated Stained Glass Images and Its Applications to Information Protection
T2 - IEICE TRANSACTIONS on Information
SP - 850
EP - 865
AU - Shi-Chei HUNG
AU - Da-Chun WU
AU - Wen-Hsiang TSAI
PY - 2020
DO - 10.1587/transinf.2019EDP7239
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E103-D
IS - 4
JA - IEICE TRANSACTIONS on Information
Y1 - April 2020
AB - The two issues of art image creation and data hiding are integrated into one and solved by a single approach in this study. An automatic method for generating a new type of computer art, called stained glass image, which imitates the stained-glass window picture, is proposed. The method is based on the use of a tree structure for region growing to construct the art image. Also proposed is a data hiding method which utilizes a general feature of the tree structure, namely, number of tree nodes, to encode the data to be embedded. The method can be modified for uses in three information protection applications, namely, covert communication, watermarking, and image authentication. Besides the artistic stego-image content which may distract the hacker's attention to the hidden data, data security is also considered by randomizing both the input data and the seed locations for region growing, yielding a stego-image which is robust against the hacker's attacks. Good experimental results proving the feasibility of the proposed methods are also included.
ER -