Skip to main content

Lossy Compression Tolerant Steganography

  • Conference paper
  • First Online:
The Human Society and the Internet Internet-Related Socio-Economic Issues (HSI 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2105))

Included in the following conference series:

Abstract

This paper proposes a lossy compression tolerant steganography. Steganography hides the confidential data secretly. The unauthorized people are difficult to detect hidden data. It provides a secure channel to transmit confidential information. Nowadays, it is a very important technique when we are progressively going to computer network age. There are many researchers purposed steganographies, but most of their techniques cannot tolerate the destruction of lossy compression.In this paper, we propose a novel steganography based on the contrastive relation of the grayscale value of neighboring pixels. It is difficult for the human visual system to detect the difference between original image and one that embedded information based on our steganography. Besides, the embedded data can be extracted correctly from the decompressed stego-image. By our technique, the steog-image can be compressed by the lossy JPEG compression process before transmitting or storing it. This feature will speed up the transmission of the stego-image.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. The New Testament Revised Standard Version And Chinese Union Version: The Gospel According to Matthew Chapter3, pp. 5–7 (1985)..

    Google Scholar 

  2. E. Adelson (1990), “Digital Signal Encoding and Decoding Apparatus,” U.S. Patent, No.4939515.

    Google Scholar 

  3. W. Bender, D. Gruhl, N. Morimoto, and A. Lu (1996), “Techniques for Data Hiding,” IBM Systems Journal, Vol. 35,Nos 3 and 4, pp.313–336.

    Article  Google Scholar 

  4. T.S. Chen, C.C. Chang, and M.S. Hwang (Oct.1998), “Virtual Image Cryptosystem Based upon Vector Quantization,” IEEE Transactions onf Image Processing, Vol. 7,No.10, pp. 1485–1488.

    Article  MATH  MathSciNet  Google Scholar 

  5. T.S. Chen, and Y.H. Hsu (1997), “Image Camouflage and Encryption Method Using Vector Quantization,” The Second Conference of Information Management and Its Application in Law Enforcement, Taipei, R.O.C., pp. 97–106.

    Google Scholar 

  6. I.J. Cox, J. Kilian, T. Leighton, and T. Shamoon (September 1996), “Secure Spread Spectrum Watermarking for Images, Audio and Video,” Proceedings of the IEEE International Conference on Image Processing, Lausanne, Switzerland,,pp.243–246.

    Google Scholar 

  7. N.F. Johnson and S. Jajodia (Feb. 1998), “Exploring Steganography: Seeing the Unseen,” IEEE Computer Magazine, Vol. 31,NO. 2, pp.26–34.

    Google Scholar 

  8. M.S. Liaw and L.H. Chen (Nov. 1997), “An Effective Data Hiding Method,” Proceeding of the Sixth National Conference on Science and Technology of National Defense, Vol. 2, Taoyuan, Taiwan, pp.534–540.

    Google Scholar 

  9. Lisa M. Marvel, Charles T. Retter and Charles G. Boncelet (1998), “Hiding Information in Images,” in Proceedings of ICIP.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hwang, RJ., Shih, T.K., Kao, CH., Chang, TM. (2001). Lossy Compression Tolerant Steganography. In: Kim, W., Ling, TW., Lee, YJ., Park, SS. (eds) The Human Society and the Internet Internet-Related Socio-Economic Issues. HSI 2001. Lecture Notes in Computer Science, vol 2105. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47749-7_34

Download citation

  • DOI: https://doi.org/10.1007/3-540-47749-7_34

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42313-3

  • Online ISBN: 978-3-540-47749-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics