Object Based Image Steganography with Pixel Polygon Tracing

Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 31)

Abstract

The paper presents an object based image steganography technique which uses pixel polygonal area tracing in a cover image to select suitable pixels for embedding secret data. The polygon is generated using convex hull for specific selected image pixels and the distortion function is a hybrid between a high efficiency embedding scheme and LSB matching. The proposed technique is simple, yet effective. Experimental results show that the proposed method exhibits high fidelity of the stego-image and performs decently against well-known spatial domain steganalysis techniques for moderate payload capacity.

Keywords

Image steganography Region of interest Convex hull Polygon edge detection High efficiency embedding 

References

  1. 1.
    Kelly, G., McKenzie, B.: Security, privacy and confidentiality issues on the internet, http://www.ncbi.nlm.nih.gov/pmc/articles/PMC1761937/ (2014). Last accessed June 2014
  2. 2.
    Simmons, G.J.: The prisoners’ problem and the subliminal channel. In: CRYPTO, pp. 51–67. Springer, Berlin (1983)Google Scholar
  3. 3.
    Kerckhoff, A.: La cryptographie militaire. J. des Sci. Mil. 9, 161–191 (1883)Google Scholar
  4. 4.
    Katzenbeisser, S., Petitcolas, F.A. (eds.): Information Hiding Techniques for Steganography and Digital Watermarking, 1st edn. Artech House Inc, Norwood (2000)Google Scholar
  5. 5.
    Brute Force Attacks, http://codex.wordpress.org/Brute_Force_Attacks (2014). Last accessed July 2014
  6. 6.
    Shejul, A.A., Kulkarni, U.L.: A secure skin tone based steganography using wavelet transform. Int. J. Comput. Theor. Eng. 3(1), 16–22 (2011)CrossRefGoogle Scholar
  7. 7.
    Cheddad, A., Condell, J., Curran, K., McKevitt, P.: Biometric inspired digital image steganography. In: Proceedings of 15th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (ECBS ’08), pp. 159–168 (2008)Google Scholar
  8. 8.
    Roy, R., Changder, S., Sarkar, A.: SKINHIDE: A biometric inspired high delity steganography technique. In: 3rd International Conference on Advanced Computing and Communications, pp. 41–46 (2013)Google Scholar
  9. 9.
    Roy, R., Sarkar, A., Changder, S.: Chaos based edge adaptive image steganography. In: Procedia Technology, 1st International Conference on Computational Intelligence: Modeling Techniques and Applications (CIMTA), pp. 138–146 (2013)Google Scholar
  10. 10.
    Seivi, G.K., Mariadhasan, L., Shunmuganathan, K.L.: Steganography using edge adaptive image. In: Proceedings of the International Conference on Computing, Electronics and Electrical Technologies, pp. 1023–1027 (2012)Google Scholar
  11. 11.
    Luo, W., Huang, F., Huang, J.: Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inf. Forensics Secur. 5(2), 201–214 (2010)CrossRefMathSciNetGoogle Scholar
  12. 12.
    Cormen, T.H., Stein, C., Rivest, R.L., Leiserson, C.E.: Introduction to Algorithms, 2nd edn. McGraw-Hill Higher Education, New York (2001)Google Scholar
  13. 13.
    Bresenham, J.E.: Algorithm for computer control of a digital plotter. IBM Syst. J. 4(1), 25–30 (1965). doi: 10.1147/sj.41.0025 CrossRefGoogle Scholar
  14. 14.
  15. 15.
    Li, X., Yang, B., Cheng, D., Zeng, T.: A generalization of LSB matching. IEEE Signal Process. Lett. 16(2), 69–72 (2009)CrossRefGoogle Scholar
  16. 16.
    Westfeld, A.: F5-a steganographic algorithm: High capacity despite better steganalysis. In: 4th International Workshop on Information Hiding, pp. 289–302. Springer, Berlin (2001)Google Scholar
  17. 17.
    Dumitrescu, S., Wu, X., Memon, N.D.: On steganalysis of random LSB embedding in continuous-tone images. In: Proceedings of ICIP, pp. 641–644 (2002)Google Scholar
  18. 18.
    Ker, A.D., Böhme, R.: Revisiting weighted stego-image steganalysis. In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, Proceedings of SPIE Electronic Imaging, vol. 6819, pp. 0501–0517 (2008)Google Scholar
  19. 19.
    Ker, A.D.: A general framework for the structural steganalysis of LSB replacement. In: Proceedings 7th Information Hiding Workshop, vol. 3727, pp. 296–311 (2005)Google Scholar
  20. 20.
    Fillatre, L.: Adaptive steganalysis of least significant bit replacement in grayscale natural images. IEEE Trans. Signal Process. 60(2), 556–569 (2012)CrossRefMathSciNetGoogle Scholar
  21. 21.
    Ker, A.D.: Steganalysis of LSB matching in grayscale images. IEEE Signal Process. Lett. 12(6), 441–444 (2005)CrossRefGoogle Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  1. 1.Department of Computer ApplicationsNational Institute of TechnologyDurgapurIndia

Personalised recommendations