Abstract
This paper proposes a lossy compression tolerant steganography. Steganography hides the confidential data secretly. The unauthorized people are difficult to detect hidden data. It provides a secure channel to transmit confidential information. Nowadays, it is a very important technique when we are progressively going to computer network age. There are many researchers purposed steganographies, but most of their techniques cannot tolerate the destruction of lossy compression.In this paper, we propose a novel steganography based on the contrastive relation of the grayscale value of neighboring pixels. It is difficult for the human visual system to detect the difference between original image and one that embedded information based on our steganography. Besides, the embedded data can be extracted correctly from the decompressed stego-image. By our technique, the steog-image can be compressed by the lossy JPEG compression process before transmitting or storing it. This feature will speed up the transmission of the stego-image.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
The New Testament Revised Standard Version And Chinese Union Version: The Gospel According to Matthew Chapter3, pp. 5–7 (1985)..
E. Adelson (1990), “Digital Signal Encoding and Decoding Apparatus,” U.S. Patent, No.4939515.
W. Bender, D. Gruhl, N. Morimoto, and A. Lu (1996), “Techniques for Data Hiding,” IBM Systems Journal, Vol. 35,Nos 3 and 4, pp.313–336.
T.S. Chen, C.C. Chang, and M.S. Hwang (Oct.1998), “Virtual Image Cryptosystem Based upon Vector Quantization,” IEEE Transactions onf Image Processing, Vol. 7,No.10, pp. 1485–1488.
T.S. Chen, and Y.H. Hsu (1997), “Image Camouflage and Encryption Method Using Vector Quantization,” The Second Conference of Information Management and Its Application in Law Enforcement, Taipei, R.O.C., pp. 97–106.
I.J. Cox, J. Kilian, T. Leighton, and T. Shamoon (September 1996), “Secure Spread Spectrum Watermarking for Images, Audio and Video,” Proceedings of the IEEE International Conference on Image Processing, Lausanne, Switzerland,,pp.243–246.
N.F. Johnson and S. Jajodia (Feb. 1998), “Exploring Steganography: Seeing the Unseen,” IEEE Computer Magazine, Vol. 31,NO. 2, pp.26–34.
M.S. Liaw and L.H. Chen (Nov. 1997), “An Effective Data Hiding Method,” Proceeding of the Sixth National Conference on Science and Technology of National Defense, Vol. 2, Taoyuan, Taiwan, pp.534–540.
Lisa M. Marvel, Charles T. Retter and Charles G. Boncelet (1998), “Hiding Information in Images,” in Proceedings of ICIP.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hwang, RJ., Shih, T.K., Kao, CH., Chang, TM. (2001). Lossy Compression Tolerant Steganography. In: Kim, W., Ling, TW., Lee, YJ., Park, SS. (eds) The Human Society and the Internet Internet-Related Socio-Economic Issues. HSI 2001. Lecture Notes in Computer Science, vol 2105. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47749-7_34
Download citation
DOI: https://doi.org/10.1007/3-540-47749-7_34
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42313-3
Online ISBN: 978-3-540-47749-5
eBook Packages: Springer Book Archive