Multimedia Tools and Applications

, Volume 75, Issue 8, pp 4559–4575 | Cite as

Voicing of animated GIF by data hiding

A technique to add sound to the GIF format
  • Sonia Djaziri-Larbi
  • Awatef Zaien
  • Sylvie Sevestre-Ghalila
Article

Abstract

GIF animations are silent image sequences widely used on the web thanks to their wide support and portability. In this work, we propose an original technique based on data hiding, to add sound tracks in GIF animations. Data hiding is usually used to embed security codes in a host medium to prevent from illegal copying or to protect copyrights (watermarking) or to send secret messages to a dedicated receiver (steganography). We propose to use host GIF images as a “transmission channel” to convey “hidden” sound bits with lowest perceptual image distortion and without altering the wide portability of the GIF format, by means of data hiding. The inserted bits are neither secret nor intended for security issues. They are intended to be played by an audio player synchronously with the GIF player to add sound to the GIF animation. The embedding process is a low complexity, luminance based steganography algorithm, that slightly modifies the pixels colors of the GIF images to insert the sound bits. The extraction of the inserted audio is completely blind: the audio is directly extracted from the pixels of each cover image. The proposed GIF voicing was tested with different GIF sequences (cartoons and real scenes) and no audio degradation was reported while a slight, most imperceptible, color modification was noticed in case of an important amount of inserted data. The cover images have undergone objective quality criteria and informal subjective evaluation and has proved to be of good quality.

Keywords

GIF format Animated GIF GIF voicing Data hiding Steganography Sound embedding 

References

  1. 1.
    Cazenave F, Quint V, Roisin C (2011) Timesheets. js: when SMIL meets HTML5 and CSS3. In: 11th ACM symposium on Document engineering, New YorkGoogle Scholar
  2. 2.
    Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: survey and analysis of current methods. Signal Proc 90(3):727–752CrossRefMATHGoogle Scholar
  3. 3.
    Cox IJ, Miller ML, McKellips AL (1999) Watermarking as communications with side information. Proc. IEEE 87(7):1127–1141CrossRefGoogle Scholar
  4. 4.
    Djaziri-Larbi S, Mahé G, Marrakchi I, Turki M, Jaïdane M (2011) Doping and witness watermarking for audio processing. In: 7th Int. Workshop on Systems, Signal Process. and their Applications, AlgeriaGoogle Scholar
  5. 5.
    Fridrich J (1999) A new steganographic method for palette-based images. In: IS&T PICS conferenceGoogle Scholar
  6. 6.
    Fridrich J, Rui D (2000) Secure steganographic methods for palette imagesGoogle Scholar
  7. 7.
    Johnson S, et al (2010) Adobe Illustrator CS5 on Demand. Que PublishingGoogle Scholar
  8. 8.
    Katzenbeisser S, Petitcolas FAP (eds) (2000) Information hiding techniques for steganography and digital watermarking. Artech House, NorwoodGoogle Scholar
  9. 9.
    Kim S-M, Cheng Z, Yoo K-Y (2009) A new steganography scheme based on an index-color image. In: 6 th Int. Conf. on Information Technology, Las VegasGoogle Scholar
  10. 10.
    Kohler E Gifsicle 1.7. Available from http://www.lcdf.org/gifsicle
  11. 11.
    Krasner J (2004) Motion graphics design and fine art animation: principles and practice. Elsevier, New YorkGoogle Scholar
  12. 12.
    Kwan M (2010) GIFshuffle 2.0. Available from http://www.darkside.com.au/gifshuffle/
  13. 13.
    Machado R, Stego E (1997). Available from http://www.stego.com
  14. 14.
    Mantiuk RK, Tomaszewska A, Mantiuk R Comparison of four subjective methods for image quality assessmentGoogle Scholar
  15. 15.
    Morkel T, Eloff JHP, Olivier MS (2005) An overview of image steganography. In: Information Systems Security International Conference (ISSA), pp 1–11Google Scholar
  16. 16.
    Mukherjee D, Chae JJ, Mitra SK (1998) A source and channel coding approach to data hiding with application to hiding speech in video. In: Proceedings International Conference on Image Processing, vol 1. IEEE, pp 348–352Google Scholar
  17. 17.
    Niederst J, Robbins J (2001) Web design in a nutshell: A desktop quick reference. vol 2. O’Reilly Media, Inc.Google Scholar
  18. 18.
    Sagi A, Malah D (2007) Bandwith extension of telephone speech aided by data embedding. Eurasip J Appl Signal ProcessGoogle Scholar
  19. 19.
    Tzeng CH, Yang ZF, Tsai WH (2004) Adaptive data hiding in palette images by color ordering and mapping with security protection. IEEE Trans on Commun 52(5)Google Scholar
  20. 20.
    Wang X, Yao T, Li C-T (2005) A palette-based image steganographic method using colour quantisation. In: IEEE Int. Conf. on Image Process.Google Scholar
  21. 21.
    Wang Z, Bovik AC, Sheikh HR, Simoncelli E P (2004) Image quality assessment: From error visibility to structural similarity. IEEE Trans Image Proc 13(4)Google Scholar
  22. 22.
    Wu H, Wang H (2013) Multibit color-mapping steganography using depth-first search. In: International Symposium on Biometrics and Security Technologies, pp 224–229. IEEEGoogle Scholar
  23. 23.
    Wu H, Wang H, Zhao Hg, Yu X (2014) Multi-layer assignment steganography using graph-theoretic approach. Multi Tools Appl:1–26Google Scholar
  24. 24.
    Wu MY, Ho YK, Lee JH (2004) An iterative method of palette-based image steganography. Pattern Recogn Lett 25(3)Google Scholar
  25. 25.
    Zhang D, Zhang R, Niu Xn, Yang Y (2010) A digital watermarking algorithm for high capacity index image robust to format transformation. In: 3rd International Conference on Computer Science and Information Technology, vol 3, pp 216–220Google Scholar
  26. 26.
    Zhang X, Wang S, Zhou Z (2008) Multibit assignment steganography in palette images. Signal Processing Lett 15:553–556CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2015

Authors and Affiliations

  • Sonia Djaziri-Larbi
    • 1
  • Awatef Zaien
    • 2
  • Sylvie Sevestre-Ghalila
    • 2
  1. 1.Ecole Nationale d’Ingénieurs de Tunis, Signals and Systems LabUniversité Tunis El ManarBelvédèreTunisia
  2. 2.CEA Linklab, Telnet Innovation Labs, Pole Technologique El GhazalaArianaTunisia

Personalised recommendations