Special Issue: Information Security of Multimedia Contents

Steganography by Constructing Texture Images

Expand
  • School of Communication and Information Engineering, Shanghai University, Shanghai 200444, China

Received date: 2016-08-06

  Revised date: 2016-08-19

  Online published: 2016-09-30

Abstract

This paper proposes a new steganography method using texture construction. The data-hider first constructs a database of elements containing many different patterns and features used to represent secret bits. The data-hider selects patterns and features from the database according to the secret message. The selected elements are painted onto specified positions on a white paper, and some background elements added to the painted paper. With pre-defined transforming functions, the data-hider transforms the painted image to construct a stego-image. On the receiver side, secret messages can be extracted from the stego-image using the inverse operations. Experimental results show that the constructed stego-image has good visual effects, and the secret messages can be properly hidden into the image. Meanwhile, any amount of message can be hidden by choosing different parameters.

Cite this article

PAN Lin, QIAN Zhen-xing, ZHANG Xin-peng . Steganography by Constructing Texture Images[J]. Journal of Applied Sciences, 2016 , 34(5) : 625 -632 . DOI: 10.3969/j.issn.0255-8297.2016.05.015

References

[1] Fridrich J. Steganography in digital media: principles, algorithms and applications [M]. Cambridge: Cambridge University Press, 2009.
[2] Wang H, Wang S. Cyber warfare: steganography vs. steganalysis [J]. Communication of ACM, 2004, 47(10): 76-82.
[3] Fridrich J, Goljan M. Practical steganalysis of digital images-state of the art [C]//Security and Watermarking of Multimedia Contents IV, Proceedings of SPIE, 2002, 4675: 1-13.
[4] Fridrich J, Soukal D. Matrix embedding for large payloads [J]. IEEE Transactions Information Forensics and Security, 2006, 1(3): 390-395.
[5] Zhang X, Wang S. Dynamical running coding in digital steganography [J]. IEEE Signal Processing Letters, 2006, 13(3): 165-168.
[6] Zhang W, Zhang X, Wang S. Near-optimal codes for information embedding in gray-scale signals [J]. IEEE Transactions Information Theory, 2010, 56(3): 1262-1270.
[7] Fridrich J. Asymptotic behavior of the ZZW embedding construction [J]. IEEE Transactions Information Forensics and Security, 2009, 4(1): 151-154.
[8] Zhang W, Wang X. Generalization of the ZZW embedding construction for steganography [J]. IEEE Transactions Information Forensics and Security, 2009, 4(3): 564-569.
[9] Filler T, Judas J, Fridrich J. Minimizing embedding impact in steganography using trelliscoded quantization [C]//Electronic Imaging, Media Forensics, and Security XII, Proceedings of SPIE, 2010, 7541: 1-14.
[10] Pevny T, Fridrich J. Merging Markov and DCT features for multi-class JPEG steganalysis[C]//Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, Proceedings of SPIE, 2007, 6505: 3-4.
[11] Shi Y Q, Chen C, Chen W. A Markov process based approach to effective attacking JPEG steganography [C]//Proceedings of the 8th International Workshop of Lecture Notes in Computer Science, LNCS, 2007, 4437: 249-264.
[12] Lyu S W, Farid H. Steganalysis using higher-order image statistics [J]. IEEE Transactions Information Forensics and Security, 2006, 1(1): 111-119.
[13] Bas P P, Fridrich J. Steganalysis by subtractive pixel adjacency matrix [J]. IEEE Transactions Information Forensics and Security, 2010, 5(2): 215-224.
[14] Fridrich J, Kodovsky J. Rich models for steganalysis of digital images [J]. IEEE Transactions Information Forensics and Security, 2012, 7(3): 868-882.
[15] Otori H, Kuriyama S. Data-embeddable texture synthesis [C]//Proceedings of the 8th International Symposium on Smart Graphics, Kyoto, Japan, 2007: 146-157.
[16] Otori H, Kuriyama S. Texture synthesis for mobile data communications [J]. IEEE Conference Graphics Applications, 2009, 29(6): 74-81.
[17] Wu K C, Wang C M. Steganography using reversible texture synthesis [J]. IEEE Transactions Image Proceedings, 2015, 24(1): 130-139.
[18] Xu J, Mao X, Jin X. Hidden message in a deformation-based texture [J]. Visual Computer, 2015, 31: 1653-1669.

Outlines

/