Skip to main content
Log in

Voicing of animated GIF by data hiding

A technique to add sound to the GIF format

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

GIF animations are silent image sequences widely used on the web thanks to their wide support and portability. In this work, we propose an original technique based on data hiding, to add sound tracks in GIF animations. Data hiding is usually used to embed security codes in a host medium to prevent from illegal copying or to protect copyrights (watermarking) or to send secret messages to a dedicated receiver (steganography). We propose to use host GIF images as a “transmission channel” to convey “hidden” sound bits with lowest perceptual image distortion and without altering the wide portability of the GIF format, by means of data hiding. The inserted bits are neither secret nor intended for security issues. They are intended to be played by an audio player synchronously with the GIF player to add sound to the GIF animation. The embedding process is a low complexity, luminance based steganography algorithm, that slightly modifies the pixels colors of the GIF images to insert the sound bits. The extraction of the inserted audio is completely blind: the audio is directly extracted from the pixels of each cover image. The proposed GIF voicing was tested with different GIF sequences (cartoons and real scenes) and no audio degradation was reported while a slight, most imperceptible, color modification was noticed in case of an important amount of inserted data. The cover images have undergone objective quality criteria and informal subjective evaluation and has proved to be of good quality.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Notes

  1. LZW: Lempel-Ziv-Welch, lossless data compression algorithm.

  2. PSNR: Peak Signal to Noise Ratio

  3. CD: Compact Disc

  4. kbps: kilo bit per second.

  5. kbps: kilo bits per second.

  6. TELNET is a Tunisian group of companies specialized in innovation and high technology consulting (http://www.groupe-telnet.net)

  7. Lame encoder: Available from http://lame.sourceforge.net/index.php

References

  1. Cazenave F, Quint V, Roisin C (2011) Timesheets. js: when SMIL meets HTML5 and CSS3. In: 11th ACM symposium on Document engineering, New York

  2. Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: survey and analysis of current methods. Signal Proc 90(3):727–752

    Article  MATH  Google Scholar 

  3. Cox IJ, Miller ML, McKellips AL (1999) Watermarking as communications with side information. Proc. IEEE 87(7):1127–1141

    Article  Google Scholar 

  4. Djaziri-Larbi S, Mahé G, Marrakchi I, Turki M, Jaïdane M (2011) Doping and witness watermarking for audio processing. In: 7th Int. Workshop on Systems, Signal Process. and their Applications, Algeria

  5. Fridrich J (1999) A new steganographic method for palette-based images. In: IS&T PICS conference

  6. Fridrich J, Rui D (2000) Secure steganographic methods for palette images

  7. Johnson S, et al (2010) Adobe Illustrator CS5 on Demand. Que Publishing

  8. Katzenbeisser S, Petitcolas FAP (eds) (2000) Information hiding techniques for steganography and digital watermarking. Artech House, Norwood

  9. Kim S-M, Cheng Z, Yoo K-Y (2009) A new steganography scheme based on an index-color image. In: 6 th Int. Conf. on Information Technology, Las Vegas

  10. Kohler E Gifsicle 1.7. Available from http://www.lcdf.org/gifsicle

  11. Krasner J (2004) Motion graphics design and fine art animation: principles and practice. Elsevier, New York

    Google Scholar 

  12. Kwan M (2010) GIFshuffle 2.0. Available from http://www.darkside.com.au/gifshuffle/

  13. Machado R, Stego E (1997). Available from http://www.stego.com

  14. Mantiuk RK, Tomaszewska A, Mantiuk R Comparison of four subjective methods for image quality assessment

  15. Morkel T, Eloff JHP, Olivier MS (2005) An overview of image steganography. In: Information Systems Security International Conference (ISSA), pp 1–11

  16. Mukherjee D, Chae JJ, Mitra SK (1998) A source and channel coding approach to data hiding with application to hiding speech in video. In: Proceedings International Conference on Image Processing, vol 1. IEEE, pp 348–352

  17. Niederst J, Robbins J (2001) Web design in a nutshell: A desktop quick reference. vol 2. O’Reilly Media, Inc.

  18. Sagi A, Malah D (2007) Bandwith extension of telephone speech aided by data embedding. Eurasip J Appl Signal Process

  19. Tzeng CH, Yang ZF, Tsai WH (2004) Adaptive data hiding in palette images by color ordering and mapping with security protection. IEEE Trans on Commun 52(5)

  20. Wang X, Yao T, Li C-T (2005) A palette-based image steganographic method using colour quantisation. In: IEEE Int. Conf. on Image Process.

  21. Wang Z, Bovik AC, Sheikh HR, Simoncelli E P (2004) Image quality assessment: From error visibility to structural similarity. IEEE Trans Image Proc 13(4)

  22. Wu H, Wang H (2013) Multibit color-mapping steganography using depth-first search. In: International Symposium on Biometrics and Security Technologies, pp 224–229. IEEE

  23. Wu H, Wang H, Zhao Hg, Yu X (2014) Multi-layer assignment steganography using graph-theoretic approach. Multi Tools Appl:1–26

  24. Wu MY, Ho YK, Lee JH (2004) An iterative method of palette-based image steganography. Pattern Recogn Lett 25(3)

  25. Zhang D, Zhang R, Niu Xn, Yang Y (2010) A digital watermarking algorithm for high capacity index image robust to format transformation. In: 3rd International Conference on Computer Science and Information Technology, vol 3, pp 216–220

  26. Zhang X, Wang S, Zhou Z (2008) Multibit assignment steganography in palette images. Signal Processing Lett 15:553–556

    Article  Google Scholar 

Download references

Acknowledgments

The authors would like to thank Rabaa Youssef, CEA-LinkLab, for her very useful advices on HTML5 as well as the Company Telnet Innovation Labs for financial and technology support of this project.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sonia Djaziri-Larbi.

Appendix: Pseudo codes

Appendix: Pseudo codes

This Appendix gives basic pseudo codes of the voicing algorithm: the main code and the Function of Fridrich steganography method in the case where a bit is embedded in each pixel of the image. Note that only the voicing of a single GIF frame is described.

figure d
figure e

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Djaziri-Larbi, S., Zaien, A. & Sevestre-Ghalila, S. Voicing of animated GIF by data hiding. Multimed Tools Appl 75, 4559–4575 (2016). https://doi.org/10.1007/s11042-015-2491-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-2491-y

Keywords

Navigation