The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Les deux problèmes de la création d’images artistiques et de la dissimulation des données sont intégrés en un seul et résolus par une approche unique dans cette étude. Une méthode automatique pour générer un nouveau type d'art informatique, appelé image de vitrail, qui imite l'image d'un vitrail, est proposée. La méthode est basée sur l’utilisation d’une structure arborescente pour la croissance des régions afin de construire l’image artistique. L'invention concerne également un procédé de masquage de données qui utilise une caractéristique générale de la structure arborescente, à savoir le nombre de nœuds d'arborescence, pour coder les données à intégrer. Le procédé peut être modifié pour être utilisé dans trois applications de protection d'informations, à savoir la communication secrète, le filigrane et l'authentification d'image. Outre le contenu artistique de la stégo-image qui peut détourner l'attention du pirate informatique sur les données cachées, la sécurité des données est également prise en compte en randomisant à la fois les données d'entrée et les emplacements de départ pour la région en croissance, ce qui donne une stégo-image robuste contre les attaques du pirate informatique. De bons résultats expérimentaux prouvant la faisabilité des méthodes proposées sont également inclus.
Shi-Chei HUNG
National Chiao Tung University
Da-Chun WU
National Kaohsiung University of Science and Technology
Wen-Hsiang TSAI
National Chiao Tung University,Asia University
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copier
Shi-Chei HUNG, Da-Chun WU, Wen-Hsiang TSAI, "Data Hiding in Computer-Generated Stained Glass Images and Its Applications to Information Protection" in IEICE TRANSACTIONS on Information,
vol. E103-D, no. 4, pp. 850-865, April 2020, doi: 10.1587/transinf.2019EDP7239.
Abstract: The two issues of art image creation and data hiding are integrated into one and solved by a single approach in this study. An automatic method for generating a new type of computer art, called stained glass image, which imitates the stained-glass window picture, is proposed. The method is based on the use of a tree structure for region growing to construct the art image. Also proposed is a data hiding method which utilizes a general feature of the tree structure, namely, number of tree nodes, to encode the data to be embedded. The method can be modified for uses in three information protection applications, namely, covert communication, watermarking, and image authentication. Besides the artistic stego-image content which may distract the hacker's attention to the hidden data, data security is also considered by randomizing both the input data and the seed locations for region growing, yielding a stego-image which is robust against the hacker's attacks. Good experimental results proving the feasibility of the proposed methods are also included.
URL: https://global.ieice.org/en_transactions/information/10.1587/transinf.2019EDP7239/_p
Copier
@ARTICLE{e103-d_4_850,
author={Shi-Chei HUNG, Da-Chun WU, Wen-Hsiang TSAI, },
journal={IEICE TRANSACTIONS on Information},
title={Data Hiding in Computer-Generated Stained Glass Images and Its Applications to Information Protection},
year={2020},
volume={E103-D},
number={4},
pages={850-865},
abstract={The two issues of art image creation and data hiding are integrated into one and solved by a single approach in this study. An automatic method for generating a new type of computer art, called stained glass image, which imitates the stained-glass window picture, is proposed. The method is based on the use of a tree structure for region growing to construct the art image. Also proposed is a data hiding method which utilizes a general feature of the tree structure, namely, number of tree nodes, to encode the data to be embedded. The method can be modified for uses in three information protection applications, namely, covert communication, watermarking, and image authentication. Besides the artistic stego-image content which may distract the hacker's attention to the hidden data, data security is also considered by randomizing both the input data and the seed locations for region growing, yielding a stego-image which is robust against the hacker's attacks. Good experimental results proving the feasibility of the proposed methods are also included.},
keywords={},
doi={10.1587/transinf.2019EDP7239},
ISSN={1745-1361},
month={April},}
Copier
TY - JOUR
TI - Data Hiding in Computer-Generated Stained Glass Images and Its Applications to Information Protection
T2 - IEICE TRANSACTIONS on Information
SP - 850
EP - 865
AU - Shi-Chei HUNG
AU - Da-Chun WU
AU - Wen-Hsiang TSAI
PY - 2020
DO - 10.1587/transinf.2019EDP7239
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E103-D
IS - 4
JA - IEICE TRANSACTIONS on Information
Y1 - April 2020
AB - The two issues of art image creation and data hiding are integrated into one and solved by a single approach in this study. An automatic method for generating a new type of computer art, called stained glass image, which imitates the stained-glass window picture, is proposed. The method is based on the use of a tree structure for region growing to construct the art image. Also proposed is a data hiding method which utilizes a general feature of the tree structure, namely, number of tree nodes, to encode the data to be embedded. The method can be modified for uses in three information protection applications, namely, covert communication, watermarking, and image authentication. Besides the artistic stego-image content which may distract the hacker's attention to the hidden data, data security is also considered by randomizing both the input data and the seed locations for region growing, yielding a stego-image which is robust against the hacker's attacks. Good experimental results proving the feasibility of the proposed methods are also included.
ER -