Skip to main content
Top

2018 | OriginalPaper | Chapter

Steganography by Constructing Marbling Texture

Authors : Zhenxing Qian, Lin Pan, Sheng Li, Xinpeng Zhang

Published in: Cloud Computing and Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper proposes a novel steganographic method to hide secret data during the generation of marbling patterns. We select some points on white paper to represent secret information. These points are connected with lines to construct an original pattern. With a series of deformation operations, the original pattern is transformed to generate a marbling pattern. During the process of data hiding, we construct a unit library containing different deforming operations. The library records the parameters of each deformation, and defines the mapping between the binary data and the deformation type. The unit library is shared with the recipient so that the deformation parameters can be recovered correctly. After using reverse deformations, the recipient identifies the location of the inflection points and extracts the secret data. Experimental results show that the proposed method performs high security and flexible embedding capacity. Meanwhile, the marbling images have a good visual effect. Furthermore, the proposed steganography provides a capability of countering JPEG compression.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Wang, H., Wang, S.: Cyber warfare: steganography vs steganalysis. Commun. ACM 47(10), 76–82 (2004)CrossRef Wang, H., Wang, S.: Cyber warfare: steganography vs steganalysis. Commun. ACM 47(10), 76–82 (2004)CrossRef
2.
go back to reference Chan, C., Cheng, L.: Hinding data in images by simple LSB substitution. Pattern Recogn. 37, 469–474 (2004)CrossRef Chan, C., Cheng, L.: Hinding data in images by simple LSB substitution. Pattern Recogn. 37, 469–474 (2004)CrossRef
3.
go back to reference Fridrich, J., Goljan, M.: Practical steganalysis of digital images - state of the art. In: Proceedings of SPIE Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 1–13 (2002) Fridrich, J., Goljan, M.: Practical steganalysis of digital images - state of the art. In: Proceedings of SPIE Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 1–13 (2002)
4.
go back to reference Fridrich, J., Goljan, M., Lisoněk, P., Soukal, D.: Writing on wet paper. IEEE Trans. Signal Process. 53(10), 3923–3935 (2005)MathSciNetCrossRef Fridrich, J., Goljan, M., Lisoněk, P., Soukal, D.: Writing on wet paper. IEEE Trans. Signal Process. 53(10), 3923–3935 (2005)MathSciNetCrossRef
5.
go back to reference Westfeld, A.: F5—a steganographic algorithm high capacity despite better steganalysis. In: Proceedings of the Second International Workshop on Digital-Forensics and Watermarking, Seoul, Korea, pp. 154–167 (2003) Westfeld, A.: F5—a steganographic algorithm high capacity despite better steganalysis. In: Proceedings of the Second International Workshop on Digital-Forensics and Watermarking, Seoul, Korea, pp. 154–167 (2003)
7.
go back to reference Filler, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Forensics Secur. 6(3), 920–935 (2011)CrossRef Filler, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Forensics Secur. 6(3), 920–935 (2011)CrossRef
8.
go back to reference Otori, H., and Kuriyama, S.: Data-embeddable texture synthesis. In: Proceedings of the 8th International Symposium on Smart Graphics, Kyoto, Japan, pp. 146–157 (2007). Otori, H., and Kuriyama, S.: Data-embeddable texture synthesis. In: Proceedings of the 8th International Symposium on Smart Graphics, Kyoto, Japan, pp. 146–157 (2007).
9.
go back to reference Otori, H., Kuriyama, S.: Texture synthesis for mobile data communications. IEEE Comput. Graph. Appl. 29(6), 74–81 (2009)CrossRef Otori, H., Kuriyama, S.: Texture synthesis for mobile data communications. IEEE Comput. Graph. Appl. 29(6), 74–81 (2009)CrossRef
10.
go back to reference Wu, K., Wang, C.: Steganography using reversible texture synthesis. IEEE Trans. Image Process. 24(1), 130–139 (2015)MathSciNetCrossRef Wu, K., Wang, C.: Steganography using reversible texture synthesis. IEEE Trans. Image Process. 24(1), 130–139 (2015)MathSciNetCrossRef
11.
go back to reference Zhou, H., Chen, K., Zhang, W., Yu, N.: Comments on steganography using reversible texture synthesis. IEEE Trans. Image Process. 26(4) (2017) Zhou, H., Chen, K., Zhang, W., Yu, N.: Comments on steganography using reversible texture synthesis. IEEE Trans. Image Process. 26(4) (2017)
14.
go back to reference Lu, S., Jaffer, A., Jin, X., Zhao, H., Mao, X.: Mathematical marbling. IEEE Comput. Graph. Appl. 32(6), 26–35 (2012)CrossRef Lu, S., Jaffer, A., Jin, X., Zhao, H., Mao, X.: Mathematical marbling. IEEE Comput. Graph. Appl. 32(6), 26–35 (2012)CrossRef
15.
go back to reference Xu, J., et al.: Hidden message in a deformation-based texture. Vis Comput. 31, 1653–1669 (2015)CrossRef Xu, J., et al.: Hidden message in a deformation-based texture. Vis Comput. 31, 1653–1669 (2015)CrossRef
Metadata
Title
Steganography by Constructing Marbling Texture
Authors
Zhenxing Qian
Lin Pan
Sheng Li
Xinpeng Zhang
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-030-00015-8_37

Premium Partner