Abstract
This article presents a novel secure steganographic method on wavelet domain of GIF images. Secret information is usually embedded in palettes or indices of GIF images directly by formerly presented steganographic methods. These methods may introduce visible noise and detectable changes of parameters in images. The new method based on integer wavelet transform dispels noise introduced by data-hidding into adjacent pixels. Matrix encoding is also applied in embedding. Both scattering noise and matrix encoding improve the quality of the stego-images and the security of secret communication. Experimental results show the fine security of the proposed method in resisting attacks by χ 2 detecting method and Fridrich’s detecting method.
This paper is supported by the project of National Nature Science Foundational of China (Grant No. 60372083).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Kwan, M.: Gifshuffle 2.0. IEEE Trans (2003), Available from http://www.darkside.com.au/gifshuffle/
Westfeld, A., Pfitzmann, A.: Attacks on Steganographic Systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)
Brown, A.: S-Tools for Windows, Shareware (1994), http://www.jjct.com/steganography/toolmatrix.htm
Moroney, C.: Available from http://www.jjct.com/steganography/toolmatrix.htm
Machado, R.: EZ Stego, Stego Online, Stego (1997), Available from http://www.stego.com
Fridrich, J.: Applications of data hiding in digital images. In: Tutorial for The ISSPA 1999, Brisbane, Australia (1999)
Fridrich, J.: A new steganographic method for palette-based images. IS&T PICS, Savannah, Georgia, 25-28, 285–289 (1999)
Fridrich, J., Du, J.: Secure steganographic methods for palette images. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 47–60. Springer, Heidelberg (2000)
Fridrich, J., Goljan, M., Soukal, D.: Higher-order statistical steganalysis of palette images. In: Proc. EI SPIE Santa Clara, CA, January 2003, pp. 178–190 (2003)
Chu, R., You, X., Kong, X., Ba, X.: A DCT-based Image Steganographic Method Resisting Statistical Attacks. In: The 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing, IEEE ICASSP 2004 (2004)
Calderbank, A.R., Daubechies, I., Sweldens, W., et al.: Wavelet transforms that map integers to integers. Department of Mathematics. Princeton University, Princeton (1996)
Crandall, R.: Some Notes on Steganography. Posted on Steganography Mailing List (1998), http://os.inf.tu-dresden.de/.westfeld/crandall.pdf
Westfeld, A.: F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)
http://www.petitcolas.net/fabien/watermarking/image_database
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ding, W., Kong, XW., You, XG., Wang, ZR. (2004). A Secure Steganographic Method on Wavelet Domain of Palette-Based Images. In: Aizawa, K., Nakamura, Y., Satoh, S. (eds) Advances in Multimedia Information Processing - PCM 2004. PCM 2004. Lecture Notes in Computer Science, vol 3333. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30543-9_54
Download citation
DOI: https://doi.org/10.1007/978-3-540-30543-9_54
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-23985-7
Online ISBN: 978-3-540-30543-9
eBook Packages: Computer ScienceComputer Science (R0)