Image Steganography for locked communication scheme

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2017 by IJCTT Journal
Volume-46 Number-1
Year of Publication : 2017
Authors : Anvesh. K, P. Madhuri, T. Navyasri
  10.14445/22312803/IJCTT-V46P107

MLA

Anvesh. K, P. Madhuri, T. Navyasri "Image Steganography for locked communication scheme". International Journal of Computer Trends and Technology (IJCTT) V46(1):32-36, April 2017. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
We propose a novel approach for steganography using a reversible texture synthesis. A texture synthesis process resamples a smaller texture image, which synthesizes a new texture image file, a new audio file, a new video file and a new text file with a similar local appearance and an size is directly proportional to the secret file which embedding by a texture image. We weave the texture synthesis process into steganography to conceal secret file. In contrast to using an existing cover image to hide secret file, our algorithm conceals the source texture image and embeds secret file through the process of texture synthesis. This allows us to extract the secret file and source texture from a stego synthetic texture. Our approach offers three distinct advantages. First, our scheme offers the compression capacity that is up to the size of the stego texture image. Second, our steganographic approach very different from existing approaches on steganography. Third, the quality output is one, which meets the requirements of the end user and presents the information clearly. Experimental results have verified that our proposed algorithm can provide various numbers of embedding capacities, produce a visually plausible texture images, and recover the source secret file.

References
[1]Kuo-Chen Wu and Chung-Ming Wang, “Steganography Using Reversible Texture Synthesis”, IEEE Trans., Image Processing, Vol 24, no. 1,pp.130-139,2015.
[2] N. F. Johnson and S. Jajodia, “Exploring steganography: Seeing the unseen,” Computer, vol. 31, no. 2, pp. 26-34, 1998.
[3] N. Provos and P. Honeyman, “Hide and seek: an introduction to steganography,” Security & Privacy, IEEE, vol. 1, no. 3, pp. 32-44, 2003.
[4] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding-a survey,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1062-1078, 1999.
[5] Y.-M. Cheng and C.-M. Wang, “A high-capacity steganographic approach for 3D polygonal meshes,” The Visual Computer, vol. 22, no. 9, pp. 845-855, 2006.
[6] S.-C. Liu and W.-H. Tsai, “Line-based cubism-like image—A new type of art image and its application to lossless data hiding,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 5, pp. 1448-1458, 2012.
[7] I.-C. Dragoi and D. Coltuc, “Local-prediction-based difference expansion reversible watermarking,” IEEE Trans. Image Process., vol. 23, no. 4, pp. 1779-1790, 2014.
[8] J. Fridrich, M. Goljan, and R. Du, “Detecting LSB steganography in color, and gray-scale images,” MultiMedia, IEEE, vol. 8, no. 4, pp. 22-28, 2001.
[9] Y. Guo, G. Zhao, Z. Zhou, and M. Pietikäinen, “Video texture synthesis with multi-frame LBP-TOP and diffeomorphic growth model,” IEEE Trans. Image Process., vol. 22, no. 10, pp. 3879-3891, 2013.
[10] L.-Y. Wei and M. Levoy, “Fast texture synthesis using tree-structured vector quantization,” in Proc. of the 27th Annual Conference on Computer Graphics and Interactive Techniques, 2000, pp. 479-488.
[11] A. A. Efros and T. K. Leung, “Texture synthesis by non-parametric sampling,” in Proc. of the Seventh IEEE International Conference on Computer Vision, 1999, pp. 1033-1038.
[12] C. Han, E. Risser, R. Ramamoorthi, and E. Grinspun, “Multiscale texture synthesis,” ACM Trans. Graph., vol. 27, no. 3, pp. 1-8, 2008.
[13] H. Otori and S. Kuriyama, “Data-embeddable texture synthesis,” in Proc. of the 8th International Symposium on Smart Graphics, Kyoto, Japan, 2007, pp. 146-157.
[14] H. Otori and S. Kuriyama, “Texture synthesis for mobile data communications,” IEEE Comput. Graph. Appl., vol. 29, no. 6, pp. 74-81, 2009.
[15] M. F. Cohen, J. Shade, S. Hiller, and O. Deussen, “Wang Tiles for image and texture generation,” ACM Trans. Graph., vol. 22, no. 3, pp. 287-294, 2003.
[16] K. Xu, D. Cohen-Or, T. Ju, L. Liu, H. Zhang, S. Zhou, and Y. Xiong, “Feature-aligned shape texturing,” ACM Trans. Graph., vol. 28, no. 5, pp. 1-7, 2009.

Keywords
Texture Synthesis, Plausible Texture Steganography.