A Novel Steganographic Technique Based on Image Morphing

  • Satoshi Kondo
  • Qiangfu Zhao
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4159)


Steganography is the technology of hiding messages in such a way that no one except the authorized recipient knows the existence of the messages. In steganography, a message is hidden in some cover message. The larger the cover message is relative to the hidden message, the easier it is to hide the latter. When the hidden message is an image, it is difficult to hide the message into another image unless the size (in number of bits) of the hidden image is much smaller than that of the cover image. To solve this problem, this paper proposes a novel steganographic technique based on image morphing. The basic idea is to transform the hidden image into a morphing image, and use the morphing image as the stego message. The authorized recipient can recover the hidden image from the morphing image through demorphing. The morphing image can also be used directly for certain purposes.


Feature Vector Face Image Source Image Cover Data Cover Image 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding: A Survey. Proc. of the IEEE 87(7), 1062–1078 (1999)CrossRefGoogle Scholar
  2. 2.
    Venkatraman, S., Abraham, A., Paprzycki, M.: Significance of steganography on data security. In: Proc. IEEE International Conference on Information Technology: Coding and Computing (2004)Google Scholar
  3. 3.
    Ogihara, T., Koide, S., Kaneda, Y.: Data embedding into bilevel images using the error diffusion method. Electronics and Communications in Japan (Part III: Fundamental Electronics Science) 85(11), 36–44 (2002)CrossRefGoogle Scholar
  4. 4.
    Niimi, M., Noda, H., Kawaguchi, E.: An image embedding in image by a complexity based region segmentation method. In: Proc. International Conference on Image Processing, pp. 74–77 (1997)Google Scholar
  5. 5.
    Wolberg, G.: Image Morphing: A Survey. Visual Computer 14, 360–372 (1998)CrossRefGoogle Scholar
  6. 6.
    Wolber, G.: Digital Image Warping. IEEE Computer Society, Los Alamitos (1990)Google Scholar
  7. 7.
    Beier, T., Neely, S.: Feature-Based Image Metamorphosis. Computer Graphics (Proc. SIGGRAPH) 26(2), 35–42 (1992)CrossRefGoogle Scholar
  8. 8.
    IPA (Information-Technology Promotion Agency, Japan): Technology survey of Information Hiding, http://www.ipa.go.jp/security/fy10/contents/crypto/report/Information-Hiding.htm
  9. 9.
    Makino, K.: Social Aspects of Information Hiding. Journal of Information Processing Society of Japan, Special Issue on Information Hiding 44(3), 260–264 (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Satoshi Kondo
    • 1
  • Qiangfu Zhao
    • 1
  1. 1.The University of AizuFukushimaJapan

Personalised recommendations