Robust Steganography Using Texture Synthesis
- 900 Downloads
This paper proposes a robust steganography based on texture synthesis. Different from the traditional steganography by modifying an existing image, we hide secret messages during the process of synthesizing a texture image. The generated stego texture is similar to the sample image, preserving a good local appearance. Large embedding capacities can be achieved proportional to the size of the synthesized texture image. This algorithm also ensures that the hidden message can be exactly extracted from the stego image. Most importantly, the proposed steganography approach provides a capability of countering JPEG compression.
KeywordsSteganography information hiding texture synthesis
Unable to display preview. Download preview PDF.
- 1.J. Fridrich, Steganography in digital media: principles, algorithms and applications. Cambridge, U.K.: Cambridge Univ. Press, 2009.Google Scholar
- 2.H. Otori and S. Kuriyama, Data-embeddable texture synthesis, in Proc. of the 8th International Symposium on Smart Graphics, Kyoto, Japan, 2007, pp. 146-157.Google Scholar
- 3.H. Otori and S. Kuriyama, Texture synthesis for mobile data communications, IEEE Comput. Graph. Appl., vol. 29, no. 6, pp. 74-81, 2009.Google Scholar
- 4.K-C Wu and C-M Wang, Steganography using reversible texture synthesis, IEEE Trans. Image Process., 24(1): 130-139, 2015.Google Scholar
- 5.A. A. Efros and W. T. Freeman, Image quilting for texture synthesis and transfer, Proc. 28th Annu. Conf. Comput. Graph. Interact. Techn., pp. 341-346, 2001.Google Scholar
- 6.Brodatz Textures, Texture Image Database [Online]. Available: http://www.ux.uis.no/tranden/brodatz.html. 1997.Google Scholar
- 7.W. Zhang, X. Zhang, and S. Wang, Near-Optimal Codes for Information Embedding in Gray-Scale Signals, IEEE Trans. Information Theory, 56(3), pp. 1262–1270, 2010.Google Scholar
- 8.J. Fridrich and J. Kodovsky, Rich Models for Steganalysis of Digital Images, IEEE Trans. Information Forensics and Security, 7(3), pp. 868-882, 2012.Google Scholar
- 9.Y.-Q. Shi, C. Chen, and W. Chen, A Markov Process Based Approach to Effective Attacking JPEG Steganography, Proceedings of the 8th International Workshop of Lecture Notes in Computer Science, LNCS, 4437, pp. 249-264, 2007.Google Scholar