A Steganographic Framework for Reference Colour Based Encoding and Cover Image Selection

  • René Rosenbaum
  • Heidrun Schumann
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1975)


Steganography is a method of communication which hides the existence of the communication from a third party.The employment of steganographic techniques depends on various demands, which will be derived and considered. This paper regards different aspects of digital images. These are representation, storage and as a result also suitability for their use in steganography. Based upon this, some criteria for the choice of suitable cover images are pointed out. A new technical steganographic system, which uses reference colours as starting point for embedding and extraction of information has been developed and will be described. This system can be adapted flexibly to different requirements and considers the human visual system as well as the derived statements for potential cover images. Results are described which justify the new approach.


Channel Capacity Human Visual System Image Format Cover Image JPEG Compression 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [AP98]
    A.J. Anderson and F.A.P. Petitcolas. On the limits of steganography. IEEE Journal of Selected Areas in Communication, (16(4)):474–481, 1998.CrossRefGoogle Scholar
  2. [Bro97]
    A. Brown. S-tools for windows, version 4., 1997.
  3. [CKLS96]
    I. Cox, J. Kilian, T. Leighton, and T. Shamoon. A secure robust watermark for multimedia. In Lecture Notes in Computer Science, number vol1174. SpringerVerlag, 1996.Google Scholar
  4. [FM97]
    B. Fortner and T.E. Meyer. Number by Colors. Springer Verlag, 1997.Google Scholar
  5. [JJ98]
    N.F. Johnson and S. Jajodia. Exploring steganography: Seeing the unseen. IEEE Computer, 1998.Google Scholar
  6. [Mac97]
    R. Machado. EzStego. 1997.
  7. [Mal98]
    H.A. Mallot. Sehen und die Verarbeitung visueller Informationen. Vieweg, 1998.Google Scholar
  8. [PAK99]
    F. A. P. Petitcolas, R. J. Anderson, and M. Kuhn. Information hiding-a survey. In IEEE special issue on protection of multimedia content, 1999.Google Scholar
  9. [Pol99]
    C. Polynton. Color science for Film, Video and CGI. Siggraph’99, 1999.Google Scholar
  10. [Rep00]
  11. [Ros00]
    R. Rosenbaum. Computer based steganography in digital images. Master’s thesis, University of Rostock, 2000. In German.Google Scholar
  12. [Say96]
    K. Sayood. Introduction to Data Compression. Morgan Kaufmann Publishers, 1996.Google Scholar
  13. [Sim83]
    G.J. Simmons. The prisoners’ problem and the subliminal channel. InAdvances in Cryptography: Proceedings of CRYPTO, 1983.Google Scholar
  14. [SZA96]
    M.D. Swanson, B. Zhu, and Tewfik A.H. Robust data hiding for images. In Digital Image Processing Workshop, number DSP96. IEEE, 1996.Google Scholar
  15. [SZT96]
    M.D. Swanson, B. Zhu, and A.H. Tewfik. Transparent robust image watermarking. In Int. Conf. on Image Processing. IEEE, 1996.Google Scholar
  16. [WP99]
    A. Westerfeld and A. Pfitzmann. Attacks on steganographic systems. In Lecture Notes in Computer Science, volume vol1768. Springer Verlag, 1999.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2000

Authors and Affiliations

  • René Rosenbaum
    • 1
  • Heidrun Schumann
    • 1
  1. 1.Department of Computer Science,Institute for Computer GraphicsUniversity of RostockRostockGermany

Personalised recommendations