Steganography by Constructing Texture Images
Received date: 2016-08-06
Revised date: 2016-08-19
Online published: 2016-09-30
This paper proposes a new steganography method using texture construction. The data-hider first constructs a database of elements containing many different patterns and features used to represent secret bits. The data-hider selects patterns and features from the database according to the secret message. The selected elements are painted onto specified positions on a white paper, and some background elements added to the painted paper. With pre-defined transforming functions, the data-hider transforms the painted image to construct a stego-image. On the receiver side, secret messages can be extracted from the stego-image using the inverse operations. Experimental results show that the constructed stego-image has good visual effects, and the secret messages can be properly hidden into the image. Meanwhile, any amount of message can be hidden by choosing different parameters.
Key words: information hiding; texture synthesis; steganography
PAN Lin, QIAN Zhen-xing, ZHANG Xin-peng . Steganography by Constructing Texture Images[J]. Journal of Applied Sciences, 2016 , 34(5) : 625 -632 . DOI: 10.3969/j.issn.0255-8297.2016.05.015
[1] Fridrich J. Steganography in digital media: principles, algorithms and applications [M]. Cambridge: Cambridge University Press, 2009.
[2] Wang H, Wang S. Cyber warfare: steganography vs. steganalysis [J]. Communication of ACM, 2004, 47(10): 76-82.
[3] Fridrich J, Goljan M. Practical steganalysis of digital images-state of the art [C]//Security and Watermarking of Multimedia Contents IV, Proceedings of SPIE, 2002, 4675: 1-13.
[4] Fridrich J, Soukal D. Matrix embedding for large payloads [J]. IEEE Transactions Information Forensics and Security, 2006, 1(3): 390-395.
[5] Zhang X, Wang S. Dynamical running coding in digital steganography [J]. IEEE Signal Processing Letters, 2006, 13(3): 165-168.
[6] Zhang W, Zhang X, Wang S. Near-optimal codes for information embedding in gray-scale signals [J]. IEEE Transactions Information Theory, 2010, 56(3): 1262-1270.
[7] Fridrich J. Asymptotic behavior of the ZZW embedding construction [J]. IEEE Transactions Information Forensics and Security, 2009, 4(1): 151-154.
[8] Zhang W, Wang X. Generalization of the ZZW embedding construction for steganography [J]. IEEE Transactions Information Forensics and Security, 2009, 4(3): 564-569.
[9] Filler T, Judas J, Fridrich J. Minimizing embedding impact in steganography using trelliscoded quantization [C]//Electronic Imaging, Media Forensics, and Security XII, Proceedings of SPIE, 2010, 7541: 1-14.
[10] Pevny T, Fridrich J. Merging Markov and DCT features for multi-class JPEG steganalysis[C]//Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, Proceedings of SPIE, 2007, 6505: 3-4.
[11] Shi Y Q, Chen C, Chen W. A Markov process based approach to effective attacking JPEG steganography [C]//Proceedings of the 8th International Workshop of Lecture Notes in Computer Science, LNCS, 2007, 4437: 249-264.
[12] Lyu S W, Farid H. Steganalysis using higher-order image statistics [J]. IEEE Transactions Information Forensics and Security, 2006, 1(1): 111-119.
[13] Bas P P, Fridrich J. Steganalysis by subtractive pixel adjacency matrix [J]. IEEE Transactions Information Forensics and Security, 2010, 5(2): 215-224.
[14] Fridrich J, Kodovsky J. Rich models for steganalysis of digital images [J]. IEEE Transactions Information Forensics and Security, 2012, 7(3): 868-882.
[15] Otori H, Kuriyama S. Data-embeddable texture synthesis [C]//Proceedings of the 8th International Symposium on Smart Graphics, Kyoto, Japan, 2007: 146-157.
[16] Otori H, Kuriyama S. Texture synthesis for mobile data communications [J]. IEEE Conference Graphics Applications, 2009, 29(6): 74-81.
[17] Wu K C, Wang C M. Steganography using reversible texture synthesis [J]. IEEE Transactions Image Proceedings, 2015, 24(1): 130-139.
[18] Xu J, Mao X, Jin X. Hidden message in a deformation-based texture [J]. Visual Computer, 2015, 31: 1653-1669.
/
| 〈 |
|
〉 |