Object Based Image Steganography with Pixel Polygon Tracing

The paper presents an object based image steganography technique which uses pixel polygonal area tracing in a cover image to select suitable pixels for embedding secret data. The polygon is generated using convex hull for specific selected image pixels and the distortion function is a hybrid between a high efficiency embedding scheme and LSB matching. The proposed technique is simple, yet effective. Experimental results show that the proposed method exhibits high fidelity of the stego-image and performs decently against well-known spatial domain steganalysis techniques for moderate payload capacity.

[1]  Ronald L. Rivest,et al.  Introduction to Algorithms , 1990 .

[2]  Kevin Curran,et al.  Biometric Inspired Digital Image Steganography , 2008, 15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ecbs 2008).

[3]  Lionel Fillatre Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images , 2012, IEEE Transactions on Signal Processing.

[4]  Bo Li,et al.  Preestimation-Based Array Interpolation Approach to Coherent Source Localization Using Multiple Sparse Subarrays , 2009, IEEE Signal Processing Letters.

[5]  Anjali A. Shejul,et al.  A Secure Skin Tone based Steganography Using Wavelet Transform , 2011 .

[6]  K. L. Shunmuganathan,et al.  Steganography using edge adaptive image , 2012, 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET).

[7]  Andrew D. Ker Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.

[8]  Andrew D. Ker A General Framework for Structural Steganalysis of LSB Replacement , 2005, Information Hiding.

[9]  Suvamoy Changder,et al.  Chaos based Edge Adaptive Image Steganography , 2013 .

[10]  Tieyong Zeng,et al.  A Generalization of LSB Matching , 2009, IEEE Signal Processing Letters.

[11]  Rainer Böhme,et al.  Revisiting weighted stego-image steganalysis , 2008, Electronic Imaging.

[12]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[13]  Nasir D. Memon,et al.  On steganalysis of random LSB embedding in continuous-tone images , 2002, Proceedings. International Conference on Image Processing.

[14]  Jiwu Huang,et al.  Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.

[15]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[16]  Jack Bresenham,et al.  Algorithm for computer control of a digital plotter , 1965, IBM Syst. J..