Abstract
In this paper, a novel steganographic scheme is proposed, where embedding is done adaptively in image regions with high level of high frequency component. The steganalytic detection performance becomes poorer as these high frequency components mask the steganographic embedding noise. The security of the proposed scheme is further increased by separating the embedding domain from the steganalytic domain. This separation is done by randomizing the embedding domain using a new concept called randomized cropping. State of the art spatial domain steganalyzers are considered to evaluate the security of the proposed scheme. The LSB matching algorithm is used for steganographic embedding. It is shown experimentally that the LSB matching algorithm wrapped with proposed scheme performs comparatively better than simple LSB matching scheme, against the steganalytic attacks under consideration.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Chandramouli, R., Kharrazi, M., Memon, N.D.: Image steganography and steganalysis: Concepts and practice. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 35–49. Springer, Heidelberg (2004)
Goljan, M., Fridrich, J., Holotyak, T.: New blind steganalysis and its implications. In: Proceedings of SPIE. Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072, pp. 1–13 (January 2006)
Wang, Y., Moulin, P.: Optimized feature extraction for learning-based image steganalysis. IEEE Transactions On Information Forensics and Security 2(1), 31–45 (2007)
Zhang, J., Cox, I.J., Doerr, G.: Steganalysis for LSB Matching in Images with High-frequency Noise. In: Proc. IEEE 9th Workshop on Multimedia Signal Processing, MMSP 2007, pp. 385–388 (2007)
Huang, F., Li, B., Huang, J.: Attack LSB Matching Steganography by Counting Alteration Rate of the Number of Neighbourhood Gray Levels. In: Proc. IEEE International Conference on Image Processing, ICIP 2007, vol. 1, pp. I401–I404 (2007)
Solanki, K., Sarkar, A., Manjunath, B.S.: YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 16–31. Springer, Heidelberg (2008)
Schaefer, G., Stich, M.: UCID - An Uncompressed Colour Image Database. In: Proc. SPIE, Storage and Retrieval Methods and Applications for Multimedia, vol. 5307, pp. 472–480 (2004)
Dewitte, S., Cornelis, J.: Lossless integer wavelet transform. IEEE Signal Processing Letters 4(6), 158–160 (1997)
Sweldens, W.: The Lifting Scheme: a Construction of Second Generation of Wavelets. SIAM J. Math. Anal. 29(2), 511–546 (1998)
Chen, B., Wornell, G.W.: Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding. IEEE Transactions on Information Theory 47(4), 1423–1443 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sur, A., Ramanathan, V., Mukherjee, J. (2012). Secure Steganography Using Randomized Cropping. In: Shi, Y.Q. (eds) Transactions on Data Hiding and Multimedia Security VII. Lecture Notes in Computer Science, vol 7110. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28693-3_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-28693-3_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-28692-6
Online ISBN: 978-3-642-28693-3
eBook Packages: Computer ScienceComputer Science (R0)