Advertisement

Robust Steganography Using Texture Synthesis

  • Zhenxing QianEmail author
  • Hang Zhou
  • Weiming Zhang
  • Xinpeng Zhang
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 63)

Abstract

This paper proposes a robust steganography based on texture synthesis. Different from the traditional steganography by modifying an existing image, we hide secret messages during the process of synthesizing a texture image. The generated stego texture is similar to the sample image, preserving a good local appearance. Large embedding capacities can be achieved proportional to the size of the synthesized texture image. This algorithm also ensures that the hidden message can be exactly extracted from the stego image. Most importantly, the proposed steganography approach provides a capability of countering JPEG compression.

Keywords

Steganography information hiding texture synthesis 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    J. Fridrich, Steganography in digital media: principles, algorithms and applications. Cambridge, U.K.: Cambridge Univ. Press, 2009.Google Scholar
  2. 2.
    H. Otori and S. Kuriyama, Data-embeddable texture synthesis, in Proc. of the 8th International Symposium on Smart Graphics, Kyoto, Japan, 2007, pp. 146-157.Google Scholar
  3. 3.
    H. Otori and S. Kuriyama, Texture synthesis for mobile data communications, IEEE Comput. Graph. Appl., vol. 29, no. 6, pp. 74-81, 2009.Google Scholar
  4. 4.
    K-C Wu and C-M Wang, Steganography using reversible texture synthesis, IEEE Trans. Image Process., 24(1): 130-139, 2015.Google Scholar
  5. 5.
    A. A. Efros and W. T. Freeman, Image quilting for texture synthesis and transfer, Proc. 28th Annu. Conf. Comput. Graph. Interact. Techn., pp. 341-346, 2001.Google Scholar
  6. 6.
    Brodatz Textures, Texture Image Database [Online]. Available: http://www.ux.uis.no/tranden/brodatz.html. 1997.Google Scholar
  7. 7.
    W. Zhang, X. Zhang, and S. Wang, Near-Optimal Codes for Information Embedding in Gray-Scale Signals, IEEE Trans. Information Theory, 56(3), pp. 1262–1270, 2010.Google Scholar
  8. 8.
    J. Fridrich and J. Kodovsky, Rich Models for Steganalysis of Digital Images, IEEE Trans. Information Forensics and Security, 7(3), pp. 868-882, 2012.Google Scholar
  9. 9.
    Y.-Q. Shi, C. Chen, and W. Chen, A Markov Process Based Approach to Effective Attacking JPEG Steganography, Proceedings of the 8th International Workshop of Lecture Notes in Computer Science, LNCS, 4437, pp. 249-264, 2007.Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Zhenxing Qian
    • 1
    Email author
  • Hang Zhou
    • 2
  • Weiming Zhang
    • 2
  • Xinpeng Zhang
    • 1
  1. 1.School of Communication and Information EngineeringShanghai UniversityShanghaiChina
  2. 2.School of Information Science and TechnologyUniversity of Science and Technology of ChinaHefeiChina

Personalised recommendations