Generating facial images for steganography based on IGA and image morphing

In our earlier study, we proposed an image morphing based method for information hiding. The basic idea is to hide a secrete image into a morphed image which is obtained from the secrete image and another reference image. To make this method practically useful, it is necessary to produce natural morphed images. This is a necessary condition conceal the existence of the secret image. To produce natural morphed images, we should choose a proper feature point set (FPS) for morphing. This is a tedious work if we do it manually, because the number of possible FPSs is very large. To solve the problem more efficiently, we adopted interactive genetic algorithm (IGA) in this study and conducted experiments for generating facial images. Results show that, if we provide a relatively good initial FPS, IGA can finetune the FPS, and produce more natural facial images with limited number of evaluations.

[1]  Peter Wayner,et al.  Disappearing Cryptography: Information Hiding: Steganography and Watermarking , 2008 .

[2]  Cheng-Hsiung Hsieh,et al.  A new protocol for user awareness in card based shopping , 2010, 2010 2nd International Symposium on Aware Computing.

[3]  Cheng-Hsiung Hsieh,et al.  Card user awareness based on linear sub-space representation , 2011, 2011 IEEE International Conference on Systems, Man, and Cybernetics.

[4]  O. Roeva,et al.  Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .

[5]  Cheng-Hsiung Hsieh,et al.  Card user authentication based on generalized image morphing , 2011, 2011 3rd International Conference on Awareness Science and Technology (iCAST).

[6]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[7]  Christopher D. Watkins,et al.  Modern image processing - warping, morphing, and classical techniques , 1993 .

[8]  M Steyvers,et al.  Morphing techniques for manipulating face images , 1999, Behavior research methods, instruments, & computers : a journal of the Psychonomic Society, Inc.

[9]  Satoshi Kondo,et al.  A Novel Steganographic Technique Based on Image Morphing , 2006, UIC.

[10]  R. Storn,et al.  Differential Evolution: A Practical Approach to Global Optimization (Natural Computing Series) , 2005 .