Abstract
We demonstrate that one can adapt recent diffusion-based image compression techniques such that they become ideally suited for steganographic applications. Thus, the goal is to embed secret images within arbitrary cover images. We hide only a small number of characteristic points of the secret in the cover image, while the remainder is reconstructed with edge-enhancing anisotropic diffusion inpainting. Even when using significantly less than 1% of all pixels as characteristic points, sophisticated shapes of the secret can be clearly identified. Selecting more characteristic points results in improved image quality. In contrast to most existing approaches, this even allows to embed large colour images into small grayscale images. Moreover, our approach is well-suited for uncensoring applications. Our evaluation and a web demonstrator confirm these claims and show advantages over JPEG and JPEG 2000.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Galić, I., Weickert, J., Welk, M., Bruhn, A., Belyaev, A., Seidel, H.P.: Image compression with anisotropic diffusion. Journal of Mathematical Imaging and Vision 31, 255–269 (2008)
Schmaltz, C., Weickert, J., Bruhn, A.: Beating the Quality of JPEG 2000 with Anisotropic Diffusion. In: Denzler, J., Notni, G., Süße, H. (eds.) Pattern Recognition. LNCS, vol. 5748, pp. 452–461. Springer, Heidelberg (2009)
Mainberger, M., Bruhn, A., Weickert, J., Forchhammer, S.: Edge-based image compression of cartoon-like images with homogeneous diffusion. Pattern Recognition 44, 1859–1873 (2011)
Galić, I., Zovko-Cihlar, B., Snježana, R.D.: Computer image quality selection between JPEG, JPEG 2000 and PDE compression. In: Proc. 19th International Conference on Systems, Signals and Image Processing, pp. 437–441. IEEE Computer Society (2012)
Upham, D.: JSteg (1997), http://zooid.org/~paul/crypto/jsteg/
Westfeld, A.: F5-A Steganographic Algorithm. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)
Solanki, K., Sarkar, A., Manjunath, B.S.: YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 16–31. Springer, Heidelberg (2008)
Westfeld, A., Pfitzmann, A.: Attacks on Steganographic Systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)
Jókay, M., Moravcík, T.: Image-based JPEG steganography. Tatra Mountains Mathematical Publications, 65–74 (2010)
Su, P.C., Ku, C.C.J.: Steganography in JPEG 2000 compressed images. IEEE Transactions on Consumer Electronics 49, 824–832 (2003)
Zhang, I., Wand, H., Wu, R.: A high-capacity steganography scheme for JPEG 2000 baseline system. IEEE Transactions on Image Processing 18, 1797–1803 (2009)
Chou, Y.-C., Chang, C.-C.: Restoring Objects for Digital Inpainting. In: Pan, J.-S., Huang, H.-C., Jain, L.C. (eds.) Information Hiding and Applications. SCI, vol. 227, pp. 47–61. Springer, Heidelberg (2009)
Weickert, J.: Theoretical foundations of anisotropic diffusion in image processing. Computing Supplement 11, 221–236 (1996)
Belhachmi, Z., Bucur, D., Burgeth, B., Weickert, J.: How to choose interpolation data in images. SIAM Journal on Applied Mathematics 70, 333–352 (2009)
Crow, F.C.: Summed area tables for texture mapping. Computer Graphics 18, 207–212 (1984)
Mahoney, M.: Data compression programs (2011), http://mattmahoney.net/dc/ (last visited July 22, 2011)
Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Denning, D.E., Pyle, R., Ganesan, R., Sandhu, R.S., Ashby, V. (eds.) Proc. First ACM Conference on Computer and Communications Security, pp. 62–73 (1993)
Zhang, X., Wang, S.: Efficient steganographic embedding by exploiting modification direction. IEEE Communications Letters 10, 781–783 (2006)
Sharp, T.: An Implementation of Key-Based Digital Signal Steganography. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 13–26. Springer, Heidelberg (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mainberger, M., Schmaltz, C., Berg, M., Weickert, J., Backes, M. (2012). Diffusion-Based Image Compression in Steganography. In: Bebis, G., et al. Advances in Visual Computing. ISVC 2012. Lecture Notes in Computer Science, vol 7432. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33191-6_22
Download citation
DOI: https://doi.org/10.1007/978-3-642-33191-6_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33190-9
Online ISBN: 978-3-642-33191-6
eBook Packages: Computer ScienceComputer Science (R0)