Abstract
This article presents a method of palette-based image steganography that minimizes the RMS error between an original image and its stego-image. The proposed method is based on a palette modification scheme, which can iteratively embed one message bit into each pixel in a palette-based image. In each iteration, both the cost of removing a entry color in a palette and the benefit of generating a new one to replace it are calculated. If the maximal benefit exceeds the minimal cost, an entry color is replaced. Experimental results show that the proposed method can remarkably reduce the distortion of the carrier images (stego-images) to other palette-based methods.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Fridrich, J.: Applications of Data Hiding in Digital Images. In: Tutorial for The ISSPA 1999, Brisbane, Australia (August 1999)
Chen, T.S., Chang, C.-C., Hwang, M.-S.: A Virtual Image Cryptosystem Based upon Vector Quantization. IEEE Trans. Image Processing 7(10), 1485–1488 (1998)
Sandford, M.T., Bradley, J.N., Handel, T.G.: The Data Embedding Method. In: SPIE Photonics East Conference (1995)
Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for Data Hiding. IBM System Journal 35(3&4), 313–336 (1996)
Hsu, C.-T., Wu, J.-L.: Hidden Signatures in Images. In: Proceedings of ICIP, pp. 223–226 (1996)
Marvel, L.M., Boncelet, C.G., Retter, C.T.: Spread Spectrum Image Steganography. IEEE Trans. On Image Processing 8(8), 1075–1083 (1999)
Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Trans. On Image Processing 6, 1673–1687 (1997)
Solachidis, V., Pitas, I.: Circularly Symmetric Watermark Embedding in 2-D DFT Domain. IEEE Trans. On Image Processing 10(11), 1741–1753 (2001)
Inoue, H., Miyazaki, A., Yamamoto, A., Katsura, T.: A Digital Watermark Based on Wavelet Transform and Its Robustness on Image Processing. In: Proc. of ICIP, vol. 2, pp. 391–395 (1998)
Bas, P., Chassery, J.-M., Davoine, F.: Using the Fractal Code to Watermark Images. In: Proc. of ICIP, vol. 1, pp. 469–473 (1998)
Solachidis, V., Boland, F.M.: Phase Watermarking of Digital Images. In: Proc. of ICIP, vol. 3, pp. 239–242 (1996)
Bas, P., Chassery, J.-M., Macq, B.: Geometrically Invariant Watermarking Using Feature Points. IEEE Trans. On Image Processing 11(9), 1014–1028 (2002)
Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgran Kaufmann Publishers, San Francisco (2002)
Johnson, N.F., Jajodia, S.: Exploring steganography: Seeing the Unseen. IEEE Computer, 26–34 (February 1998)
Lee, Y.-K., Chen, L.-H.: High Capacity Image Steganographic Model. In: IEE Proceedings Vision, Image and Signal Processing, vol. 147(3), pp. 288–294 (2000)
Wu, D.C., Tsai, W.H.: A Steganographic Method for Images by Pixel-Value Differencing. Pattern Recognition Letters 24, 1613–1626 (2003)
Steganography software for Widows, http://www.jjtc.com/stegoarchive/stego/software.html
Machado, R., Stego, E.Z.: http://www.stego.com
Fridrich, J.: A New Steganographic Method for Palette-Based Images. In: IS&T PICS, Savannah, Georgia, April 25-28, pp. 285–289 (1999)
Fridrich, J., Du, R.: Secure Steganographic Methods for Palette Images. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 47–60. Springer, Heidelberg (2000)
Westfeld, A., Pfitzmann, A.: Attacks on Steganographic Systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–75. Springer, Heidelberg (2000)
Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG images: Breaking the F5 algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 310–323. Springer, Heidelberg (2003)
Johnson, N.F., Duric, Z., Jajodia, S.: Information Hiding: Steganography and Watermarking-Attacks and Countermeasures. Kluwer Academic Publishers, Boston (2000)
Johnson, N.F., Jajodia, S.: Steganalysis of Images Created Using Current Steganography Software. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 273–289. Springer, Heidelberg (1998)
Provos, N., Honeyman, P.: Detecting Steganographic Content on the Internet, CITI Technical Report 01–11 (2001), http://www.citi.umich.edu/techreports/reports/citi-tr-01-11.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wu, MY., Ho, YK., Lee, JH. (2004). A Method to Improve the Stego-Image Quality for Palette-Based Image Steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds) Digital Watermarking. IWDW 2003. Lecture Notes in Computer Science, vol 2939. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24624-4_39
Download citation
DOI: https://doi.org/10.1007/978-3-540-24624-4_39
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-21061-0
Online ISBN: 978-3-540-24624-4
eBook Packages: Springer Book Archive