Abstract
This paper proposes an efficient steganography algorithm which modifies the original F5 algorithm to increase its data hiding capacity. The proposed algorithm uses morphing based technique to embed the message in the same cover image. It embeds message securely and achieves higher embedding efficiency in comparison to the F5 algorithm. The results show that for the test images under consideration, it results up to 80% more embedding capacity as compared to original algorithm for the same cover image.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, 2nd edn. Morgan Kaufmann (2008)
Gonzalez, R.C., Woods, R.E.: Digital Image Processing, 2nd edn. Prentice-Hall (2008)
Gutub, A.A.: Pixel Indicator Technique for RGB Image Steganography. Journal of Emerging in Web Intelligence 2(1), 56–64 (2010)
Bailey, K., Curran, K.: An evaluation of image based steganography methods. Multimedia Tools Appl. 30(1), 55–88 (2006)
Westfeld, A.: F5-A Steganographic Algorithm. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)
Provos, N., Honeyman, P.: Hide and seek: An introduction to steganography. IEEE Security & Privacy 1(3), 32–44 (2003)
Fridrich, J.J., Goljan, M., Hogea, D., Soukal, D.: Quantitative steganalysis of digital images: estimating the secret message length. Multimedia Systems 9(3), 288–302 (2003)
Westfeld, A., Pfitzmann, A.: Attacks on Steganographic Systems. -Breaking the Steganographic Utilities EzStego, Jsteg, Steganos, and S-Tools and Some Lessons Learned. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)
Provos, N.: Defending against statistical steganalysis. In: 10th USENIX Security Symposium, Washington D.C., pp. 323–335 (2001)
Potdar, V.M., Khan, M.A., Chang, E., Ulieru, M., Worthington, P.R.: e-Forensics steganography system for secret information retrieval. Advanced Engineering Informatics 19(3), 235–241 (2005)
Stanley, C.: Pairs of Values and the Chi-squared Attack. Master’s thesis, Department of Mathematics, Iowa State University (2005)
Vinther, M.: Smartmorph (2004), http://meesoft.logicnet.dk
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Islam, S., Khan, E., Gupta, P. (2012). Enhanced Steganographic Capacity Using Morphing Technique. In: Huang, DS., Gupta, P., Zhang, X., Premaratne, P. (eds) Emerging Intelligent Computing Technology and Applications. ICIC 2012. Communications in Computer and Information Science, vol 304. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31837-5_60
Download citation
DOI: https://doi.org/10.1007/978-3-642-31837-5_60
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31836-8
Online ISBN: 978-3-642-31837-5
eBook Packages: Computer ScienceComputer Science (R0)