Reversible Texture Synthesis in Steganography

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2016 by IJCTT Journal
Volume-33 Number-1
Year of Publication : 2016
Authors : Mr. P. R. Gdekar, Mr.N.M.Maske, Mr. R. S. Jamgekar
  10.14445/22312803/IJCTT-V33P103

MLA

Mr. P. R. Gdekar, Mr.N.M.Maske, Mr. R. S. Jamgekar "Reversible Texture Synthesis in Steganography". International Journal of Computer Trends and Technology (IJCTT) V33(1):14-19, March 2016. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
A steganography is an art of hiding confidential data into digital media such as image, audio, video etc. Here we are going to combine the work of steganography along with image processing. To do this a texture synthesis process is used which re-samples input texture image to create a new texture synthesis image.Existing steganography process is much expensive and not so robust because if the size of the secret message increases it results into distortion of the image. A texture synthesis process provides embedding capacity so that to hide the large message. With the texture synthesis process the blank image is constructed from input image and the input image is divided into no. of different patches. These patches are given a patch ID and randomly pasted on the blank image. To do this , the index table is constructed which provides an entry for each patch. The index table is constructed by using a secret key so that the person having a secret key can only access the index table. Index table tells where to paste the patch on the blank image. The message is divided into byte and stored into byte array. Each of the byte is then selected and stored into selected patch and is pasted onto blank image.

References
[1] Kuo-Chen Wu and Chung-Ming Wang „Steganography Using Reversible Texture Synthesis„ IEEE Transactions on image processingvol: 24 no: 1 year 2015
[2] S.-C. Liu and W.-H.Tsai, “Line-based cubism-like image—A new type of art image and its application to lossless data hiding,” IEEE Trans. Inf.Forensics Security, vol. 7, no. 5, pp. 1448-1458, 2012.
[3] H. Otori and S. Kuriyama, “Texture synthesis for mobile data communications,” IEEE Comput.Graph. Appl., vol. 29, no. 6, pp. 74-81,2009.
[4] H. Otori and S. Kuriyama, “Data-embeddable texture synthesis,” in Proc.of the 8th International Symposium on Smart Graphics, Kyoto, Japan,2007, pp. 146-157.
[5] Y.-M. Cheng and C.-M.Wang, “A high-capacity steganographicapproachfor 3D polygonal meshes,” The VisualComputer, vol. 22, no. 9, pp.845-855, 2006.
[6] Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354-362, 2006.
[7] N. Provos and P. Honeyman, “Hide and seek: an introduction to steganography,” Security & Privacy, IEEE, vol. 1, no. 3, pp. 32-44, 2003.
[8] L.-Y. Wei and M. Levoy, “Fast texture synthesis using treestructured vector quantization,” in Proc. of the 27th Annual Conference on Computer Graphics and Interactive Techniques,2000, pp. 479-488.
[9] A Efros and T. K. Leung, “Texture synthesis by nonparametric sampling,” in Proc. of the Seventh IEEE International Conference on Computer Vision, 1999, pp. 1033-1038.

Keywords
Data embedding, example-based approach, reversible, steganography, texture synthesis.