PCM 2004: Advances in Multimedia Information Processing - PCM 2004 pp 426-432 | Cite as
A Secure Steganographic Method on Wavelet Domain of Palette-Based Images
Abstract
This article presents a novel secure steganographic method on wavelet domain of GIF images. Secret information is usually embedded in palettes or indices of GIF images directly by formerly presented steganographic methods. These methods may introduce visible noise and detectable changes of parameters in images. The new method based on integer wavelet transform dispels noise introduced by data-hidding into adjacent pixels. Matrix encoding is also applied in embedding. Both scattering noise and matrix encoding improve the quality of the stego-images and the security of secret communication. Experimental results show the fine security of the proposed method in resisting attacks by χ 2 detecting method and Fridrich’s detecting method.
Keywords
Steganography GIF image integer wavelet matrix encoding securityPreview
Unable to display preview. Download preview PDF.
References
- 1.Kwan, M.: Gifshuffle 2.0. IEEE Trans (2003), Available from http://www.darkside.com.au/gifshuffle/
- 2.Westfeld, A., Pfitzmann, A.: Attacks on Steganographic Systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)CrossRefGoogle Scholar
- 3.Brown, A.: S-Tools for Windows, Shareware (1994), http://www.jjct.com/steganography/toolmatrix.htm
- 4.Moroney, C.: Available from http://www.jjct.com/steganography/toolmatrix.htm
- 5.Machado, R.: EZ Stego, Stego Online, Stego (1997), Available from http://www.stego.com
- 6.Fridrich, J.: Applications of data hiding in digital images. In: Tutorial for The ISSPA 1999, Brisbane, Australia (1999)Google Scholar
- 7.Fridrich, J.: A new steganographic method for palette-based images. IS&T PICS, Savannah, Georgia, 25-28, 285–289 (1999)Google Scholar
- 8.Fridrich, J., Du, J.: Secure steganographic methods for palette images. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 47–60. Springer, Heidelberg (2000)CrossRefGoogle Scholar
- 9.Fridrich, J., Goljan, M., Soukal, D.: Higher-order statistical steganalysis of palette images. In: Proc. EI SPIE Santa Clara, CA, January 2003, pp. 178–190 (2003)Google Scholar
- 10.Chu, R., You, X., Kong, X., Ba, X.: A DCT-based Image Steganographic Method Resisting Statistical Attacks. In: The 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing, IEEE ICASSP 2004 (2004)Google Scholar
- 11.Calderbank, A.R., Daubechies, I., Sweldens, W., et al.: Wavelet transforms that map integers to integers. Department of Mathematics. Princeton University, Princeton (1996)Google Scholar
- 12.Crandall, R.: Some Notes on Steganography. Posted on Steganography Mailing List (1998), http://os.inf.tu-dresden.de/.westfeld/crandall.pdf
- 13.Westfeld, A.: F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)CrossRefGoogle Scholar
- 14.