Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 박종일 | - |
dc.date.accessioned | 2022-03-28T02:03:00Z | - |
dc.date.available | 2022-03-28T02:03:00Z | - |
dc.date.issued | 2020-07 | - |
dc.identifier.citation | 2020 35th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC), page. 440-445 | en_US |
dc.identifier.isbn | 978-4-88552-328-1 | - |
dc.identifier.uri | https://ieeexplore.ieee.org/document/9183136?arnumber=9183136&SID=EBSCO:edseee | - |
dc.identifier.uri | https://repository.hanyang.ac.kr/handle/20.500.11754/169439 | - |
dc.description.abstract | Image steganography hides secret information in an image called cover image so naturally that the other users can not recognize the existence of information in the revealed image. This paper deals with an approach to recover the hidden image information from image steganography. The proposed approach investigates that the decoded hidden image information is a normal image or not. The normal and incorrectly decoded abnormal images have been trained using a deep neural network model and entropy features. The discrimination is processed with image patches since the information may be partially embedded in the cover image. The experiments are performed with respect to the various data capacities. The proposed approach discriminates and recovers the hidden image information automatically from a tremendously large number of steganography encoding methods. | en_US |
dc.description.sponsorship | This work was supported by the research fund of Signal Intelligence Research Center supervised by the Defense Acquisition Program Administration and the Agency for Defense Development of Korea. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.subject | Image steganography | en_US |
dc.subject | Data hiding | en_US |
dc.subject | Steganalysis | en_US |
dc.subject | Image entropy | en_US |
dc.subject | Deep neural network | en_US |
dc.title | Automatic Recovery of Hidden Image from Image Steganography Using DNN and Local Entropy Features | en_US |
dc.type | Article | en_US |
dc.relation.page | 440-445 | - |
dc.contributor.googleauthor | Lee, J. H. | - |
dc.contributor.googleauthor | Kang, D. Y. | - |
dc.contributor.googleauthor | Lee, J. E. | - |
dc.contributor.googleauthor | Lee, S. H. | - |
dc.contributor.googleauthor | Park, J.-I. | - |
dc.sector.campus | S | - |
dc.sector.daehak | COLLEGE OF ENGINEERING[S] | - |
dc.sector.department | SCHOOL OF COMPUTER SCIENCE | - |
dc.identifier.pid | jipark | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.