Abstract
Steganography is the field of hiding messages in apparently innocuous media (e.g. images). Hiding messages in the pixel intensities of images is a popular approach in spatial domain steganography. However, since most schemes do not consider the image content when choosing the message carrying pixels, they are readily defeated by visual and statistical attacks. We show how to distribute the message in selective parts of an image, particularly in the places where a large change in the color/intensity occurs, using a variety of embedding schemes. Our definition of energetic pixels captures this notion of ‘busy’ area in an image and our embedding techniques keep the energy function invariant between the cover and the stego images for lossless data recovery, without the necessity of sharing a key or a pass-phrase between the sender and the receiver. We show that our approach provides minimum visual disturbance and can overcome popular first order statistical tests.
This work was done in part while the first author was visiting RWTH Aachen, Germany as an Alexander von Humboldt Fellow.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P.: Digital image steganography: survey and analysis of current methods. Signal Processing 90(3), 727–752 (2010)
Cipra, B.: An Introduction to the Ising Model. American Mathematical Monthly 94(10), 937–959 (1987)
Coremen, T., Leiserson, C., Rivest, R., Stein, C.: Introduction to Algorithm, 2nd edn. McGraw Hill (2001)
Dumitrescu, S., Wu, X., Memon, N.: On Steganalysis of Random LSB Embedding in Continuous-tone Images. In: IEEE ICIP 2002, New York, USA, vol. III, pp. 641–644 (September 2002)
Fridrich, J., Goljan, M., Dui, R.: Reliable Detection of LSB Steganography in Color and Grayscale Images. In: Proceedings of the ACM Workshop on Multimedia and Security, Ottawa, CA, October 5, pp. 27–30 (2001)
Fridrich, J., Pevny, T., Kodovsky, J.: Statistically undetectable jpeg steganography: dead ends challenges, and opportunities. In: Proc. MM & Sec 2007, pp. 3–14 (2007)
The Gifshuffle Home Page, http://www.darkside.com.au/gifshuffle
Jain, A.K.: Fundamentals of digital image processing. Prentice Hall (1989)
Johnson, N.F., Jajodia, S.: Steganalysis: The Investigation of Hidden Information. In: IEEE Conference on Information Technology, pp. 113–116 (1998)
Johnson, N.F., Jajodia, S.: Steganalysis of Images Created Using Current Steganography Software. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 273–289. Springer, Heidelberg (1998)
Lyu, S., Farid, H.: Steganalysis Using Higher-Order Image Statistics. IEEE Transactions on Information Forensics and Security 1(1), 111–119 (2006)
Luo, W., Huang, F., Huang, J.: Edge Adaptive Image Steganography Based on LSB Matching Revisited. IEEE Transactions on Information Forensics and Security 5(2), 201–214 (2010)
Nakatani, H.: Boundary value problem of image modification. Opt. Eng. 31, 280–286 (1992)
Oskoei, M.A., Hu, H.: A Survey on Edge Detection Methods. Technical Report: CES-506, School of Computer Science & Electronic Engineering, University of Essex, U.K. (February 2010)
Provos, N.: Defending against Statistical Steganalysis. In: Tenth USENIX Security Symposium, pp. 325–335 (2001)
Steganography Software Archive, http://www.jjtc.com/Steganography/tools.html
Tanaka, H., Tamura, S., Tanaka, S.: On assembling subimages into a mosaic image. IEEE Trans. on Systems, Man, and Cybernetics SMC-7, 42–48 (1977)
Westfield, A., Pfitzmann, A.: Attacks on Steganographic Systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Paul, G., Davidson, I., Mukherjee, I., Ravi, S.S. (2012). Keyless Steganography in Spatial Domain Using Energetic Pixels. In: Venkatakrishnan, V., Goswami, D. (eds) Information Systems Security. ICISS 2012. Lecture Notes in Computer Science, vol 7671. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35130-3_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-35130-3_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35129-7
Online ISBN: 978-3-642-35130-3
eBook Packages: Computer ScienceComputer Science (R0)