Abstract
This work describes a framework for image hiding that exploits spatial domain color properties of natural images combined with spectral properties of the Fourier magnitude and phase of these images. The theory is that as long as the Fourier phase of an image is maintained intact, the overall appearance of an image remains specious if the Fourier magnitude of the image is slightly modified. This hypothesis leads to a data hiding technique that promises high fidelity, double the capacity of previous methods, higher security, and robustness to tampering. Experimental results are presented throughout the paper which demonstrate the effectiveness of this novel approach.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Castleman, K.: Digital Image Processing. Prentice-Hall, Upper Saddle (1996)
Chan, C.K., Cheng, L.: Hiding data in images by simple LSB substitution. Pattern Recognition 37, 469–474 (2004)
Chen, B., Wornell, G.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Information Theory 47(4), 1423–1443 (2001)
Curran, K., Bailey, K.: An evaluation of image based steganography methods. International Journal of Digital Evidence 2(2), 1–40 (2003)
Forssen, P.-E., Granlund, G., Wikiund, J.: Channel representation of colour images (Tech. Rep. LiTH-ISYR-2418), Computer Vision Laboratory, Department of Electrical Engineering, Linkoping University, SE-581 83 Linkoping, Sweden (2002)
Guerchi, D., Harmain, H., Rabie, T., Mohamed, E.: Speech Secrecy: An FFT-based Approach, Special Issue on Evolving Computer Science Applications. International Journal of Mathematics and Computer Science, Lebanon 3(2), 1–19 (2008)
Guerchi, D., Rabie, T.: Narrowband CELP Hiding by Wideband Speech. In: The Ninth IASTED International Conference on Signal and Image Processing (SIP 2007), Honolulu, Hawaii, USA (2007)
Honsinger, C.: Data embedding using phase dispersion. In: IEE Seminar on Secure Images and Image Authentication (Ref. No. 2000/039), London, UK, pp. 5/1–5/7. Eastman Kodak Co., Rochester (2000)
Huang, T., Burnett, J., Deczky, A.: The importance of phase in image processing filters. IEEE Trans. on ASSP 23(6), 529–542 (1975)
Jain, A., Uludag, U., Hsu, R.: Hiding a face in a fingerprint image. In: Proc. International Conference on Pattern Recognition (ICPR), Quebec City, Canada (2002)
Dan, M.: Photoshop Lab Color: The Canyon Conundrum and Other Adventures in the Most Powerful Colorspace. Pearson Education, Berkeley, Calif. (2006) ISBN 0321356780
Marvel, L.M., Charles, G., Boncelet, J., Retter, C.T.: Spread spectrum image steganography. IEEE Trans. Image Processing 8(8), 1075–1083 (1999)
Nozaki, K., Niimi, M., Eason, R.O., Kawaguchi, E.: A Large Capacity Steganography Using Colour Bmp Images. In: Chin, R., Pong, T.-C. (eds.) ACCV 1998. LNCS, vol. 1351, pp. 112–119. Springer, Heidelberg (1997)
Oppenheim, A., Lim, J.: The importance of phase in signals. Proc. IEEE 69(5), 529–541 (1981)
Oppenheim, A., Lim, J., Curtis, S.: Signal synthesis and reconstruction from partial Fourier-domain information. Journal of the Optical Society of America 73(11), 1413–1420 (1983)
O’Ruanaidh, J., Dowling, W., Boland, F.: Phase watermarking of digital images. In: Proc. IEEE International Conference on Image Processing (ICIP), Lausanne, Switzerland, September 16–19, vol. 3, pp. 239–242 (1996)
Provos, N., Honeyman, P.: Hide and seek: an introduction to steganography. In: IEEE Security and Privacy Magazine, pp. 32–44. IEEE Computer Society (2003)
Rabie, T.: Data Secrecy: An FFT Approach. In: Advanced Techniques in Multimedia Watermarking: Image, Video and Audio Applications, ch. 2. IGI Global (April 2010)
Rabie, T., Guerchi, D.: Magnitude Spectrum Speech Hiding. In: IEEE International Conference on Signal Processing and Communication (ICSPC 2007), Dubai, UAE, November 24-27 (2007)
Rabie, T.: Frequency-domain data hiding based on the Matryoshka principle. Int. J. Advanced Media and Communication 1(3), 298–312 (2007)
Rabie, T.: A Novel Compression Technique for Super Resolution Color Photography. In: Proceedings of the IEEE International Conference on Innovations in Information Technology (IIT 2006), November 19-21, pp. 1–5. Jumeirah Beach Hotel, Dubai (2006)
Rabie, T.: Adaptive hybrid mean and median filtering of high-ISO long-exposure sensor noise for digital photography. SPIE Journal of Electronic Imaging 13(2), 264–277 (2004)
Ramkumar, M., Akansu, A., Alatan, A.: A robust data hiding scheme for images using DFT. In: Proc. IEEE International Conference on Image Processing (ICIP), pp. 1–5 (1999)
Schanda, J.: Colorimetry, p. 61. Wiley-Interscience (2007) ISBN 9780470049044
Solanki, K., Jacobsen, N., Madhow, U., Manjunath, B.S., Chandrasekaran, S.: Robust image-adaptive data hiding using erasure and error correction. IEEE Trans. Image Processing 13(12), 1627–1639 (2004)
Tan, C.: Image Camou-Flaging using Phase Randomization(2002), http://pachome2.paci.c.net.sg/chewkeong/ImgCamou.pdf
Watson, A.: Perceptual-components architecture for digital video. Journal of the Optical Society of America A 7(10), 1943–1954 (1990)
Westfeld, A., Pfitzmann, A.: Attacks on Steganographic Systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)
Wu, M., Liu, B.: Data hiding in image and video: part I – fundamental issues and solutions. IEEE Trans. Image Processing 12(6), 685–695 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Rabie, T. (2012). Digital Image Steganography: An FFT Approach. In: Benlamri, R. (eds) Networked Digital Technologies. NDT 2012. Communications in Computer and Information Science, vol 294. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30567-2_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-30567-2_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30566-5
Online ISBN: 978-3-642-30567-2
eBook Packages: Computer ScienceComputer Science (R0)