Abstract
A new steganography algorithm that supports transmission of huge information with minimal embedding is proposed. This approach uses the Newton’s Forward Difference (NFD) Technique for mapping the text file/s onto a low resolution image file. A polynomial function is derived to represent the mapping of the text bits with the bit positions on the host image file. This polynomial is represented as bits and is embedded in the image file that is transmitted. The bit replacements made in the host image file are negligible compared to those in the existing embedding techniques.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Wang, Y., Moulin, P.: Steganalysis of Block-Structured Stegotext. In: Proc. SPIE Conf., San Jose, CA, January 2004, vol. 5306 (2004)
Cannons, J.L., Moulin, P.: Design and Statistical Analysis of a Hash-Aided Image Wa-termarking System. In: IEEE Trans. on Image Processing (2004) (to appear)
Moulin, P., O’Sullivan, J.A.: Information-Theoretic Analysis of Information Hiding September 1999 (September 1999 postscript); revised (September 2002); IEEE Trans. on Information Theory 49(3), 563–593 (2003)
Moulin, P.: A Mathematical Approach to Watermarking and Data Hiding. In: ICASSP Tutorial, Orlando, FL, May 13 (2002)
Moulin, Delp, E.J.: A Mathematical Approach to Watermarking and Data Hiding. In: ICIP Tutorial, Thessaloniki, Greece, October 7 (2001)
O’Sullivan, J.A., Moulin, P.: Some Properties of Optimal Information Hiding and Information Attacks. In: Proc. 39th Allerton conference, Monticello, IL, October 3–5 (2001)
Johnson, N.F., Jajodia, S.: Steganalysis: The investigation of hidden information. In: Proceedings of the 1998 ieee information technology conference, Syracuse, New York, USA, September 1 - 3 (1998)
Johnson, N.F., Jajodia, S.: Steganalysis of images created using current steganography software. In: Proceedings of information hiding workshop, Portland, Oregon, USA (April 1998)
Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Attacks on copyright marking systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 219–239. Springer, Heidelberg (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sivanandam, S.N., Gokulnath, C.K., Prasanna, K., Rajeev, S. (2004). NFD Technique for Efficient and Secured Information Hiding in Low Resolution Images. In: Ghosh, R.K., Mohanty, H. (eds) Distributed Computing and Internet Technology. ICDCIT 2004. Lecture Notes in Computer Science, vol 3347. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30555-2_53
Download citation
DOI: https://doi.org/10.1007/978-3-540-30555-2_53
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24075-4
Online ISBN: 978-3-540-30555-2
eBook Packages: Computer ScienceComputer Science (R0)