Skip to main content

Diffusion-Based Image Compression in Steganography

  • Conference paper
Advances in Visual Computing (ISVC 2012)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 7432))

Included in the following conference series:

Abstract

We demonstrate that one can adapt recent diffusion-based image compression techniques such that they become ideally suited for steganographic applications. Thus, the goal is to embed secret images within arbitrary cover images. We hide only a small number of characteristic points of the secret in the cover image, while the remainder is reconstructed with edge-enhancing anisotropic diffusion inpainting. Even when using significantly less than 1% of all pixels as characteristic points, sophisticated shapes of the secret can be clearly identified. Selecting more characteristic points results in improved image quality. In contrast to most existing approaches, this even allows to embed large colour images into small grayscale images. Moreover, our approach is well-suited for uncensoring applications. Our evaluation and a web demonstrator confirm these claims and show advantages over JPEG and JPEG 2000.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Galić, I., Weickert, J., Welk, M., Bruhn, A., Belyaev, A., Seidel, H.P.: Image compression with anisotropic diffusion. Journal of Mathematical Imaging and Vision 31, 255–269 (2008)

    Article  MathSciNet  Google Scholar 

  2. Schmaltz, C., Weickert, J., Bruhn, A.: Beating the Quality of JPEG 2000 with Anisotropic Diffusion. In: Denzler, J., Notni, G., Süße, H. (eds.) Pattern Recognition. LNCS, vol. 5748, pp. 452–461. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  3. Mainberger, M., Bruhn, A., Weickert, J., Forchhammer, S.: Edge-based image compression of cartoon-like images with homogeneous diffusion. Pattern Recognition 44, 1859–1873 (2011)

    Article  Google Scholar 

  4. Galić, I., Zovko-Cihlar, B., Snježana, R.D.: Computer image quality selection between JPEG, JPEG 2000 and PDE compression. In: Proc. 19th International Conference on Systems, Signals and Image Processing, pp. 437–441. IEEE Computer Society (2012)

    Google Scholar 

  5. Upham, D.: JSteg (1997), http://zooid.org/~paul/crypto/jsteg/

  6. Westfeld, A.: F5-A Steganographic Algorithm. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  7. Solanki, K., Sarkar, A., Manjunath, B.S.: YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 16–31. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  8. Westfeld, A., Pfitzmann, A.: Attacks on Steganographic Systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  9. Jókay, M., Moravcík, T.: Image-based JPEG steganography. Tatra Mountains Mathematical Publications, 65–74 (2010)

    Google Scholar 

  10. Su, P.C., Ku, C.C.J.: Steganography in JPEG 2000 compressed images. IEEE Transactions on Consumer Electronics 49, 824–832 (2003)

    Article  Google Scholar 

  11. Zhang, I., Wand, H., Wu, R.: A high-capacity steganography scheme for JPEG 2000 baseline system. IEEE Transactions on Image Processing 18, 1797–1803 (2009)

    Article  MathSciNet  Google Scholar 

  12. Chou, Y.-C., Chang, C.-C.: Restoring Objects for Digital Inpainting. In: Pan, J.-S., Huang, H.-C., Jain, L.C. (eds.) Information Hiding and Applications. SCI, vol. 227, pp. 47–61. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  13. Weickert, J.: Theoretical foundations of anisotropic diffusion in image processing. Computing Supplement 11, 221–236 (1996)

    Article  Google Scholar 

  14. Belhachmi, Z., Bucur, D., Burgeth, B., Weickert, J.: How to choose interpolation data in images. SIAM Journal on Applied Mathematics 70, 333–352 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  15. Crow, F.C.: Summed area tables for texture mapping. Computer Graphics 18, 207–212 (1984)

    Article  Google Scholar 

  16. Mahoney, M.: Data compression programs (2011), http://mattmahoney.net/dc/ (last visited July 22, 2011)

  17. Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Denning, D.E., Pyle, R., Ganesan, R., Sandhu, R.S., Ashby, V. (eds.) Proc. First ACM Conference on Computer and Communications Security, pp. 62–73 (1993)

    Google Scholar 

  18. Zhang, X., Wang, S.: Efficient steganographic embedding by exploiting modification direction. IEEE Communications Letters 10, 781–783 (2006)

    Article  Google Scholar 

  19. Sharp, T.: An Implementation of Key-Based Digital Signal Steganography. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 13–26. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mainberger, M., Schmaltz, C., Berg, M., Weickert, J., Backes, M. (2012). Diffusion-Based Image Compression in Steganography. In: Bebis, G., et al. Advances in Visual Computing. ISVC 2012. Lecture Notes in Computer Science, vol 7432. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33191-6_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33191-6_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33190-9

  • Online ISBN: 978-3-642-33191-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics