Abstract
A secure steganographic paradigm of binary image, which is fulfilled by simulating normal scanning process, is suggested in the paper. The indeterministic parts of scanning can be calculated by checking the differences between repeated scans. The information hiding is realized with reference to this indeterminism. We also provide a novel scheme to put this secure paradigm into practice by using the error control embedding technique. A more efficient practical method is presented based on morphological theory and the Matrix encoding strategy is utilized to improve the embedding performance.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Mittelholzer, T.: An information-Theoretic Approach to Stanganography and Watermarking. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 1–16. Springer, Heidelberg (2000)
Chen, M., Wong, E.K., Memon, N., Adams, S.: Recent developments in document image watermarking and data hiding. In: Proceedings of SPIE Multimedia Systems and Application, August 2001, vol. 4518, pp. 166–176 (2001)
Franz, E., Pfitzmann, A.: Steganography secure against cover-stego-attacks. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 29–46. Springer, Heidelberg (2000)
Chen, Y.-y., Pan, H.-k., Tseng, Y.-C.: A secure data-hiding scheme for two-color images. IEEE Transactions on communications 50(8), 750–755 (2002)
Crandall, R.: Some notes on steganography. Posted on steganography mailing list (1998), http://os.inf.tu-dresden.de/~westfeld/crandall.pdf
Tseng, Y.-c., Pan, H.-k.: Data hiding in 2-color images. IEEE Transactions on computers 51(7), 263–277 (2002)
Tanaka, K., Matsui, K.: Video-Steganography: How to Secretly Embed a Signature in a Picture. In: Proc. IMA Intellectual Property Project, vol. 1(1), pp. 187–205 (1994)
Cheng, F., Venetsanopoulos, A.N.: An adaptive morphological filter for image processing. IEEE Trans. Image Processing 1(4), 533–539 (1992)
Regazzoni, C.S., Venetsanopoulos, A.N., Foresti, G.L., Vernazza, G.: Statistical Morphological Filters for Binary Image Processing. In: Proc. Int Conf. Acoustics Speech and Signal Processing ICASSP 1994, Adelaide, Australia, pp. 77–80 (1994)
Zöllner, J., Federath, H., Klimant, H., Pfitamann, A., Piotraschke, R., Westfeld, A., Wicke, G., Wolf, G.: Modeling the security of steganographic system. In: Second international workshop Preproceedings, April 1998, pp. 15–17 (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Guo, Y., Lin, D., Niu, X., Hu, L., Zhou, L. (2005). A Secure Steganographic Scheme in Binary Image. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3683. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11553939_153
Download citation
DOI: https://doi.org/10.1007/11553939_153
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28896-1
Online ISBN: 978-3-540-31990-0
eBook Packages: Computer ScienceComputer Science (R0)