The typical model of steganography has led the prisoners' problem, in which two persons attempt to communicate covertly without alerting the warden. The general way to achieve this task is to embed the message in an innocuous-looking medium. In this paper, an object-based geometric embedding technique is proposed for solving the prisoners' problem. The main idea is to embed secret data through distorting a given object and the distorted object still looks natural. In the embedding process, the secret message is first converted into coefficients of an affine transformation. Then, the coordinates of each pixel of a selected object in the cover-image are recomputed by this affine transformation. Since these coefficients are restricted in a specific range, the transformed object looks natural. In the extracting process, a coarse-to-fine iterative search is proposed to accelerate the object location and the message extraction. Experimental results show that all transformed objects can be located precisely and the whole hidden message can be extracted correctly even if the stego-image is stored in various compression formats and rates. Furthermore, the embedded message is robust enough when the stego-image format is converted from GIF to JPEG, and vice versa.
[1]
Dale K. Pace,et al.
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
,
1998
.
[2]
Eckhard Koch,et al.
Towards Robust and Hidden Image Copyright Labeling
,
1995
.
[3]
Lisa M. Marvel,et al.
Spread spectrum image steganography
,
1999,
IEEE Trans. Image Process..
[4]
Jian Zhao,et al.
Embedding Robust Labels into Images for Copyright Protection
,
1995,
KnowRight.
[5]
F Gillette,et al.
Hide & seek.
,
1982,
The Journal of nursing care.
[6]
Ross Anderson,et al.
Information hiding terminology
,
1996
.
[7]
Jiri Fridrich.
A New Steganographic Method for Palette-Based Images
,
1999,
PICS.
[8]
Sushil Jajodia,et al.
Exploring steganography: Seeing the unseen
,
1998
.
[9]
D. Kahn.
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
,
1967
.
[10]
O. Roeva,et al.
Information Hiding: Techniques for Steganography and Digital Watermarking
,
2000
.