A Secure Steganographic Method on Wavelet Domain of Palette-Based Images

  • Wei Ding
  • Xiang-Wei Kong
  • Xin-Gang You
  • Zi-Ren Wang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3333)

Abstract

This article presents a novel secure steganographic method on wavelet domain of GIF images. Secret information is usually embedded in palettes or indices of GIF images directly by formerly presented steganographic methods. These methods may introduce visible noise and detectable changes of parameters in images. The new method based on integer wavelet transform dispels noise introduced by data-hidding into adjacent pixels. Matrix encoding is also applied in embedding. Both scattering noise and matrix encoding improve the quality of the stego-images and the security of secret communication. Experimental results show the fine security of the proposed method in resisting attacks by χ 2 detecting method and Fridrich’s detecting method.

Keywords

Steganography GIF image integer wavelet matrix encoding security 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Kwan, M.: Gifshuffle 2.0. IEEE Trans (2003), Available from http://www.darkside.com.au/gifshuffle/
  2. 2.
    Westfeld, A., Pfitzmann, A.: Attacks on Steganographic Systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  3. 3.
    Brown, A.: S-Tools for Windows, Shareware (1994), http://www.jjct.com/steganography/toolmatrix.htm
  4. 4.
  5. 5.
    Machado, R.: EZ Stego, Stego Online, Stego (1997), Available from http://www.stego.com
  6. 6.
    Fridrich, J.: Applications of data hiding in digital images. In: Tutorial for The ISSPA 1999, Brisbane, Australia (1999)Google Scholar
  7. 7.
    Fridrich, J.: A new steganographic method for palette-based images. IS&T PICS, Savannah, Georgia, 25-28, 285–289 (1999)Google Scholar
  8. 8.
    Fridrich, J., Du, J.: Secure steganographic methods for palette images. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 47–60. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  9. 9.
    Fridrich, J., Goljan, M., Soukal, D.: Higher-order statistical steganalysis of palette images. In: Proc. EI SPIE Santa Clara, CA, January 2003, pp. 178–190 (2003)Google Scholar
  10. 10.
    Chu, R., You, X., Kong, X., Ba, X.: A DCT-based Image Steganographic Method Resisting Statistical Attacks. In: The 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing, IEEE ICASSP 2004 (2004)Google Scholar
  11. 11.
    Calderbank, A.R., Daubechies, I., Sweldens, W., et al.: Wavelet transforms that map integers to integers. Department of Mathematics. Princeton University, Princeton (1996)Google Scholar
  12. 12.
    Crandall, R.: Some Notes on Steganography. Posted on Steganography Mailing List (1998), http://os.inf.tu-dresden.de/.westfeld/crandall.pdf
  13. 13.
    Westfeld, A.: F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  14. 14.

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Wei Ding
    • 1
  • Xiang-Wei Kong
    • 1
  • Xin-Gang You
    • 1
  • Zi-Ren Wang
    • 1
  1. 1.School of Electronic and Information EngineeringDalian University of TechnologyChina

Personalised recommendations