Skip to main content

Digital Image Steganography: An FFT Approach

  • Conference paper
Networked Digital Technologies (NDT 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 294))

Included in the following conference series:

Abstract

This work describes a framework for image hiding that exploits spatial domain color properties of natural images combined with spectral properties of the Fourier magnitude and phase of these images. The theory is that as long as the Fourier phase of an image is maintained intact, the overall appearance of an image remains specious if the Fourier magnitude of the image is slightly modified. This hypothesis leads to a data hiding technique that promises high fidelity, double the capacity of previous methods, higher security, and robustness to tampering. Experimental results are presented throughout the paper which demonstrate the effectiveness of this novel approach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Castleman, K.: Digital Image Processing. Prentice-Hall, Upper Saddle (1996)

    Google Scholar 

  2. Chan, C.K., Cheng, L.: Hiding data in images by simple LSB substitution. Pattern Recognition 37, 469–474 (2004)

    Article  MATH  Google Scholar 

  3. Chen, B., Wornell, G.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Information Theory 47(4), 1423–1443 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  4. Curran, K., Bailey, K.: An evaluation of image based steganography methods. International Journal of Digital Evidence 2(2), 1–40 (2003)

    Google Scholar 

  5. Forssen, P.-E., Granlund, G., Wikiund, J.: Channel representation of colour images (Tech. Rep. LiTH-ISYR-2418), Computer Vision Laboratory, Department of Electrical Engineering, Linkoping University, SE-581 83 Linkoping, Sweden (2002)

    Google Scholar 

  6. Guerchi, D., Harmain, H., Rabie, T., Mohamed, E.: Speech Secrecy: An FFT-based Approach, Special Issue on Evolving Computer Science Applications. International Journal of Mathematics and Computer Science, Lebanon 3(2), 1–19 (2008)

    MathSciNet  Google Scholar 

  7. Guerchi, D., Rabie, T.: Narrowband CELP Hiding by Wideband Speech. In: The Ninth IASTED International Conference on Signal and Image Processing (SIP 2007), Honolulu, Hawaii, USA (2007)

    Google Scholar 

  8. Honsinger, C.: Data embedding using phase dispersion. In: IEE Seminar on Secure Images and Image Authentication (Ref. No. 2000/039), London, UK, pp. 5/1–5/7. Eastman Kodak Co., Rochester (2000)

    Google Scholar 

  9. Huang, T., Burnett, J., Deczky, A.: The importance of phase in image processing filters. IEEE Trans. on ASSP 23(6), 529–542 (1975)

    Article  Google Scholar 

  10. Jain, A., Uludag, U., Hsu, R.: Hiding a face in a fingerprint image. In: Proc. International Conference on Pattern Recognition (ICPR), Quebec City, Canada (2002)

    Google Scholar 

  11. Dan, M.: Photoshop Lab Color: The Canyon Conundrum and Other Adventures in the Most Powerful Colorspace. Pearson Education, Berkeley, Calif. (2006) ISBN 0321356780

    Google Scholar 

  12. Marvel, L.M., Charles, G., Boncelet, J., Retter, C.T.: Spread spectrum image steganography. IEEE Trans. Image Processing 8(8), 1075–1083 (1999)

    Article  Google Scholar 

  13. Nozaki, K., Niimi, M., Eason, R.O., Kawaguchi, E.: A Large Capacity Steganography Using Colour Bmp Images. In: Chin, R., Pong, T.-C. (eds.) ACCV 1998. LNCS, vol. 1351, pp. 112–119. Springer, Heidelberg (1997)

    Google Scholar 

  14. Oppenheim, A., Lim, J.: The importance of phase in signals. Proc. IEEE 69(5), 529–541 (1981)

    Article  Google Scholar 

  15. Oppenheim, A., Lim, J., Curtis, S.: Signal synthesis and reconstruction from partial Fourier-domain information. Journal of the Optical Society of America 73(11), 1413–1420 (1983)

    Article  Google Scholar 

  16. O’Ruanaidh, J., Dowling, W., Boland, F.: Phase watermarking of digital images. In: Proc. IEEE International Conference on Image Processing (ICIP), Lausanne, Switzerland, September 16–19, vol. 3, pp. 239–242 (1996)

    Google Scholar 

  17. Provos, N., Honeyman, P.: Hide and seek: an introduction to steganography. In: IEEE Security and Privacy Magazine, pp. 32–44. IEEE Computer Society (2003)

    Google Scholar 

  18. Rabie, T.: Data Secrecy: An FFT Approach. In: Advanced Techniques in Multimedia Watermarking: Image, Video and Audio Applications, ch. 2. IGI Global (April 2010)

    Google Scholar 

  19. Rabie, T., Guerchi, D.: Magnitude Spectrum Speech Hiding. In: IEEE International Conference on Signal Processing and Communication (ICSPC 2007), Dubai, UAE, November 24-27 (2007)

    Google Scholar 

  20. Rabie, T.: Frequency-domain data hiding based on the Matryoshka principle. Int. J. Advanced Media and Communication 1(3), 298–312 (2007)

    Article  Google Scholar 

  21. Rabie, T.: A Novel Compression Technique for Super Resolution Color Photography. In: Proceedings of the IEEE International Conference on Innovations in Information Technology (IIT 2006), November 19-21, pp. 1–5. Jumeirah Beach Hotel, Dubai (2006)

    Google Scholar 

  22. Rabie, T.: Adaptive hybrid mean and median filtering of high-ISO long-exposure sensor noise for digital photography. SPIE Journal of Electronic Imaging 13(2), 264–277 (2004)

    Article  Google Scholar 

  23. Ramkumar, M., Akansu, A., Alatan, A.: A robust data hiding scheme for images using DFT. In: Proc. IEEE International Conference on Image Processing (ICIP), pp. 1–5 (1999)

    Google Scholar 

  24. Schanda, J.: Colorimetry, p. 61. Wiley-Interscience (2007) ISBN 9780470049044

    Google Scholar 

  25. Solanki, K., Jacobsen, N., Madhow, U., Manjunath, B.S., Chandrasekaran, S.: Robust image-adaptive data hiding using erasure and error correction. IEEE Trans. Image Processing 13(12), 1627–1639 (2004)

    Article  Google Scholar 

  26. Tan, C.: Image Camou-Flaging using Phase Randomization(2002), http://pachome2.paci.c.net.sg/chewkeong/ImgCamou.pdf

  27. Watson, A.: Perceptual-components architecture for digital video. Journal of the Optical Society of America A 7(10), 1943–1954 (1990)

    Article  Google Scholar 

  28. Westfeld, A., Pfitzmann, A.: Attacks on Steganographic Systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  29. Wu, M., Liu, B.: Data hiding in image and video: part I – fundamental issues and solutions. IEEE Trans. Image Processing 12(6), 685–695 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rabie, T. (2012). Digital Image Steganography: An FFT Approach. In: Benlamri, R. (eds) Networked Digital Technologies. NDT 2012. Communications in Computer and Information Science, vol 294. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30567-2_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30567-2_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30566-5

  • Online ISBN: 978-3-642-30567-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics