Skip to main content

Keyless Steganography in Spatial Domain Using Energetic Pixels

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7671))

Abstract

Steganography is the field of hiding messages in apparently innocuous media (e.g. images). Hiding messages in the pixel intensities of images is a popular approach in spatial domain steganography. However, since most schemes do not consider the image content when choosing the message carrying pixels, they are readily defeated by visual and statistical attacks. We show how to distribute the message in selective parts of an image, particularly in the places where a large change in the color/intensity occurs, using a variety of embedding schemes. Our definition of energetic pixels captures this notion of ‘busy’ area in an image and our embedding techniques keep the energy function invariant between the cover and the stego images for lossless data recovery, without the necessity of sharing a key or a pass-phrase between the sender and the receiver. We show that our approach provides minimum visual disturbance and can overcome popular first order statistical tests.

This work was done in part while the first author was visiting RWTH Aachen, Germany as an Alexander von Humboldt Fellow.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P.: Digital image steganography: survey and analysis of current methods. Signal Processing 90(3), 727–752 (2010)

    Article  MATH  Google Scholar 

  2. Cipra, B.: An Introduction to the Ising Model. American Mathematical Monthly 94(10), 937–959 (1987)

    Article  MathSciNet  Google Scholar 

  3. Coremen, T., Leiserson, C., Rivest, R., Stein, C.: Introduction to Algorithm, 2nd edn. McGraw Hill (2001)

    Google Scholar 

  4. Dumitrescu, S., Wu, X., Memon, N.: On Steganalysis of Random LSB Embedding in Continuous-tone Images. In: IEEE ICIP 2002, New York, USA, vol. III, pp. 641–644 (September 2002)

    Google Scholar 

  5. Fridrich, J., Goljan, M., Dui, R.: Reliable Detection of LSB Steganography in Color and Grayscale Images. In: Proceedings of the ACM Workshop on Multimedia and Security, Ottawa, CA, October 5, pp. 27–30 (2001)

    Google Scholar 

  6. Fridrich, J., Pevny, T., Kodovsky, J.: Statistically undetectable jpeg steganography: dead ends challenges, and opportunities. In: Proc. MM & Sec 2007, pp. 3–14 (2007)

    Google Scholar 

  7. The Gifshuffle Home Page, http://www.darkside.com.au/gifshuffle

  8. Jain, A.K.: Fundamentals of digital image processing. Prentice Hall (1989)

    Google Scholar 

  9. Johnson, N.F., Jajodia, S.: Steganalysis: The Investigation of Hidden Information. In: IEEE Conference on Information Technology, pp. 113–116 (1998)

    Google Scholar 

  10. Johnson, N.F., Jajodia, S.: Steganalysis of Images Created Using Current Steganography Software. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 273–289. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  11. Lyu, S., Farid, H.: Steganalysis Using Higher-Order Image Statistics. IEEE Transactions on Information Forensics and Security 1(1), 111–119 (2006)

    Article  Google Scholar 

  12. Luo, W., Huang, F., Huang, J.: Edge Adaptive Image Steganography Based on LSB Matching Revisited. IEEE Transactions on Information Forensics and Security 5(2), 201–214 (2010)

    Article  MathSciNet  Google Scholar 

  13. Nakatani, H.: Boundary value problem of image modification. Opt. Eng. 31, 280–286 (1992)

    Article  Google Scholar 

  14. Oskoei, M.A., Hu, H.: A Survey on Edge Detection Methods. Technical Report: CES-506, School of Computer Science & Electronic Engineering, University of Essex, U.K. (February 2010)

    Google Scholar 

  15. Provos, N.: Defending against Statistical Steganalysis. In: Tenth USENIX Security Symposium, pp. 325–335 (2001)

    Google Scholar 

  16. Steganography Software Archive, http://www.jjtc.com/Steganography/tools.html

  17. http://www.petitcolas.net/fabien/watermarking/stirmark

  18. Tanaka, H., Tamura, S., Tanaka, S.: On assembling subimages into a mosaic image. IEEE Trans. on Systems, Man, and Cybernetics SMC-7, 42–48 (1977)

    Article  MathSciNet  Google Scholar 

  19. Westfield, A., Pfitzmann, A.: Attacks on Steganographic Systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Paul, G., Davidson, I., Mukherjee, I., Ravi, S.S. (2012). Keyless Steganography in Spatial Domain Using Energetic Pixels. In: Venkatakrishnan, V., Goswami, D. (eds) Information Systems Security. ICISS 2012. Lecture Notes in Computer Science, vol 7671. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35130-3_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35130-3_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35129-7

  • Online ISBN: 978-3-642-35130-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics