Advertisement

A Novel Method for Secure Image Steganography

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 324)

Abstract

Steganography is the science that involves communicating secret data in an appropriate multimedia carrier. The secret message is hidden in such a way that no significant degradation can be detected in the quality of the original image. In this paper, a new technique for embedding messages inside images is proposed. The pixels for message embedding are chosen such that the distortion introduced after embedding will be minimum. A distortion function is designed to calculate the cost of embedding for each pixel. The function evaluates the cost of changing an image element from directional residuals obtained using a wavelet filter bank. The intuition is to limit the embedding changes only to those parts of the cover that are difficult to model in multiple directions, avoiding smooth regions and clean edges. A technique that introduces less distortion to the carrier image will generally cause changes that are more difficult to detect, therefore providing more security.

Keywords

Steganography Steganalysis Wavelets Filter banks 

References

  1. 1.
    R. Bobme, Advanced Statistical Steganalysis (Springer, Berlin, 2010)Google Scholar
  2. 2.
    A. Westfield, A. Pfitzmann, Attacks on Steganographic Systems (Dresden University Of Technology, 1999)Google Scholar
  3. 3.
    T. Filler, J. Fridrich, Design of adaptive steganographic schemes for digital images. In Information Hiding, 9th International Workshop (2007)Google Scholar
  4. 4.
    M. Siffuzzman, M.R. Islam, M.S. Ali, Wavelet transform and its advantages compared to fourier transform. Recent trends and developments. J. Phys. Sci. 13 (2009)Google Scholar
  5. 5.
    J. Fridrich, V. Holub, Digital image steganography using universal distortion (2013)Google Scholar
  6. 6.
    J. Fridrich, V. Holub, Designing steganographic distortion using directional filters. Air force Office of Scientific Research (2013)Google Scholar
  7. 7.
    M. Vetterli, Wavelets and filter banks: theory and design. IEEE Trans. Sig. Proces. 40 (1992)Google Scholar
  8. 8.
    T. Filler, T. Penvy, T. Bass, Break our steganography systems: the ins and outs of organizing BOSS. In Information Hiding, pp. 59–70 (2010)Google Scholar
  9. 9.
    J. Fridrich, M. Goljan, Practical steganalysis of digital images-state of the art. In Proceedings of SPIE, vol. 4675, pp. 1–13 (2002)Google Scholar
  10. 10.
    J. Fridrich, M. Goljan, R. Du, Reliable detection of LSB steganography in color and gray scale images. IEEE Multimedia 8 (2001)Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  1. 1.TIFAC CORE in Cyber SecurityAmrita Vishwa VidyapeethamCoimbatoreIndia

Personalised recommendations