Abstract
The small size of a color palette is utilized to include hidden information in the true-color image. Adaptive vector quantization is performed to define color palette, which is used for purposes to extract the hidden information. The resulting Voronoi tessellation is approximated by 3D cubes to define regions centered in the prototype vectors that are used to code hidden information. The regions are partitioned into cells the identity of which encode the hidden information in each pixel.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Currie, D.L., Irvine, C. E.: Surmounting the Effects of Lossy Compression of Steganography. Proceedings of the 19th National Information System Security Conference (1996) 194–201
Fridrich, J.: A New Steganographic Method for Palette-Based Images. IS&T PICS Conference, Savannah (1999)
Kutter, M., Jordan, F., Bossen, F.: Digital Signature of Color Images Using Amplitude Modulation. SPIE-EI97 (1997)
Piva, A., Bartolini, F., Cappellini, V., Barni, M.: Exploiting the Cross-Correlation of RGBChannels for Robust Watermarking of Color Images. ICIP 99, Proceedings, Volume. 1, (1999) 306–310
Fleet, D.J., Heeger, D.J.: Embedding Invisible Information in Color Images. ICIP 97, Proceedings, Volume. 1 (1997) 532-535
Chae, J.J., Mukherjee, D., Manjunath, B.S.: Color Image Embedding using Multidimensional Lattice Structures. ICIP 98, Proceedings, Chicago (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Seppänen, T., Mäkelä, K., Keskinarkaus, A. (2000). Hiding Information in Color Images Using Small Color Palettes. In: Goos, G., Hartmanis, J., van Leeuwen, J., Pieprzyk, J., Seberry, J., Okamoto, E. (eds) Information Security. ISW 2000. Lecture Notes in Computer Science, vol 1975. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44456-4_6
Download citation
DOI: https://doi.org/10.1007/3-540-44456-4_6
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-41416-2
Online ISBN: 978-3-540-44456-5
eBook Packages: Springer Book Archive