Biometric Inspired Digital Image Steganography

Steganography is defined as the science of hiding or embedding ";data"; in a transmission medium. Its ultimate objectives, which are undetectability, robustness (i.e., against image processing and other attacks) and capacity of the hidden data (i.e., how much data we can hide in the carrier file), are the main factors that distinguish it from other "; sisters-in science"; techniques, namely watermarking and Cryptography. This paper provides an overview of well known Steganography methods. It identifies current research problems in this area and discusses how our current research approach could solve some of these problems. We propose using human skin tone detection in colour images to form an adaptive context for an edge operator which will provide an excellent secure location for data hiding.

[1]  Yonggwan Won,et al.  Efficient and Automatic Faces Detection Based on Skin-Tone and Neural Network Model , 2002, IEA/AIE.

[2]  Lisa M. Marvel,et al.  A methodology for data hiding using images , 1998, IEEE Military Communications Conference. Proceedings. MILCOM 98 (Cat. No.98CH36201).

[3]  Alexandros Eleftheriadis,et al.  MPEG‐4: An object‐based multimedia coding standard supporting mobile applications , 1998, Mob. Networks Appl..

[4]  Peter Wayner,et al.  Disappearing Cryptography: Information Hiding: Steganography and Watermarking (2nd Edition) , 2002 .

[5]  Nasir D. Memon,et al.  Image Steganalysis with Binary Similarity Measures , 2002, Proceedings. International Conference on Image Processing.

[6]  J C Judge,et al.  Steganography: Past, Present, Future , 2001 .

[7]  Edward J. Delp,et al.  A Review of Data Hiding in Digital Images , 1999, PICS.

[8]  Chin-Chen Chang,et al.  A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..

[9]  M.-R. Akbarzadeh-T,et al.  A New Genetic Algorithm Approach for Secure JPEG Steganography , 2006, 2006 IEEE International Conference on Engineering of Intelligent Systems.

[10]  Stephan Katzenbeisser,et al.  Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .

[11]  K.B. Raja,et al.  A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images , 2005, 2005 3rd International Conference on Intelligent Sensing and Information Processing.

[12]  Chin-Chen Chang,et al.  An Adaptive Steganography for Index-Based Images Using Codeword Grouping , 2004, PCM.

[13]  Xingang You,et al.  Steganalysis of Palette Images: Attack Optimal Parity Assignment Algorithm , 2005, 2005 5th International Conference on Information Communications & Signal Processing.

[14]  Wen-Yuan Chen,et al.  Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation , 2007, Appl. Math. Comput..

[15]  Zheng Zhang,et al.  Detection of block DCT-based steganography in gray-scale images , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..

[16]  S. Han,et al.  Fingerprinted secret sharing steganography for robustness against image cropping attacks , 2005, INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005..

[17]  Ioannis Pitas,et al.  Extraction of facial regions and features using color and shape information , 1996, Proceedings of 13th International Conference on Pattern Recognition.

[18]  T. Thomas Al Qaeda and the Internet: The Danger of “Cyberplanning” , 2003, Parameters.

[19]  Pierre Moulin,et al.  Data-Hiding Codes , 2005, Proceedings of the IEEE.

[20]  Stanislaw Osowski,et al.  Higher order statistics and neural network for tremor recognition , 2002, IEEE Transactions on Biomedical Engineering.

[21]  Jessica J. Fridrich,et al.  Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.

[22]  Ioannis Pitas,et al.  Face localization and facial feature extraction based on shape and color information , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[23]  K. R. Rao,et al.  Exploring steganography for low bit rate wavelet based coder in image retrieval system , 2000, 2000 TENCON Proceedings. Intelligent Systems and Technologies for the New Millennium (Cat. No.00CH37119).

[24]  Mohammad Hassan Shirali-Shahreza,et al.  A New Approach to Persian/Arabic Text Steganography , 2006, 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICIS-COMSAR'06).

[25]  N. K. Abdulaziz,et al.  Robust data hiding for images , 2000, WCC 2000 - ICCT 2000. 2000 International Conference on Communication Technology Proceedings (Cat. No.00EX420).

[26]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[27]  S.B. Sadkhan Cryptography : current status and future trends , 2004, Proceedings. 2004 International Conference on Information and Communication Technologies: From Theory to Applications, 2004..

[28]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[29]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[30]  Anil K. Jain,et al.  Face Detection in Color Images , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[31]  Paul Alvarez,et al.  Using Extended File Information (EXIF) File Headers in Digital Evidence Analysis , 2004, Int. J. Digit. EVid..

[32]  Juan E. Tapiador,et al.  Steganography in games: A general methodology and its application to the game of Go , 2006, Comput. Secur..

[33]  Jianjun Wang,et al.  A steganographic method based upon JPEG and particle swarm optimization algorithm , 2007, Inf. Sci..

[34]  A.I. Hashad,et al.  A robust steganography technique using discrete cosine transform insertion , 2005, 2005 International Conference on Information and Communication Technology.

[35]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[36]  Jessica J. Fridrich,et al.  Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.

[37]  Hany Farid,et al.  Statistical Tools for Digital Forensics , 2004, Information Hiding.

[38]  Kevin Curran,et al.  A Comparative Analysis of Steganographic Tools. , 2007 .

[39]  Walter Bender,et al.  Applications for data hiding , 2000, IBM Syst. J..

[40]  John McHugh,et al.  A cautionary note on image downgrading , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.

[41]  M. Jamzad,et al.  A robust steganography algorithm based on texture similarity using Gabor filter , 2005, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..