DOI QR코드

DOI QR Code

Constructive Steganography by Tangles

  • Qian, Zhenxing (Shanghai Institute for Advanced Communication and Data Science, School of Communication and Information Engineering, Shanghai University) ;
  • Pan, Lin (Shanghai Institute for Advanced Communication and Data Science, School of Communication and Information Engineering, Shanghai University) ;
  • Huang, Nannan (Shanghai Institute for Advanced Communication and Data Science, School of Communication and Information Engineering, Shanghai University) ;
  • Zhang, Xinpeng (Shanghai Institute for Advanced Communication and Data Science, School of Communication and Information Engineering, Shanghai University)
  • Received : 2017.05.03
  • Accepted : 2018.02.13
  • Published : 2018.08.31

Abstract

This paper proposes a novel steganography method to hide secret data during the generation of tangle patterns. Different from the traditional steganography based on modifying natural images, we propose to construct stego images according to the secret messages. We first create a model to group a selected image contour, and define some basic operations to generate various pattern cells. During data hiding, we create a cell library to establish the relationships between cells and secret data. By painting the cell inside the image contour, we create a dense tangle pattern to carry secret data. With the proposed method, a recipient can extract the secret data correctly. Experimental results show that the proposed method has a flexible embedding capacity. The constructed stego tangle image has good visual effects, and is secure against adversaries. Meanwhile, the stego tangle pattern is also robust to JPEG compression.

Keywords

References

  1. H. Wang and S. Wang, "Cyber Warfare: Steganography vs. Steganalysis," Communication of ACM, 47(10), pp. 76-82, 2004. https://doi.org/10.1145/1022594.1022597
  2. J. Fridrich and M. Goljan, "Practical Steganalysis of Digital Images - State of the Art," Security and Watermarking of Multimedia Contents IV, Proceedings of SPIE, 4675, pp. 1-13, 2002.
  3. J. Fridrich, M. Goljan, P. Lisonek, and D. Soukal, "Writing on Wet Paper," IEEE Transactions on Signal Processing, vol.53, no.10, pp.3923-3935, 2005. https://doi.org/10.1109/TSP.2005.855393
  4. A.Westfeld, "F5-A Steganographic Algorithm High Capacity Despite Better Steganalysis," in Proc. of The Second International Workshop on Digital-forensics and Watermarking, Seoul, Korea, October, pp.154-167, 2003.
  5. W. Zhang, X. Zhang, and S. Wang, "Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes," in Proc. of 10th International Workshop on Information Hiding, Santa Barbara, CA, USA, May, pp.60-71, 2008.
  6. T. Filler, J. Judas, and J. Fridrich, "Minimizing Additive Distortion in Steganography using Syndrome-Trellis Codes," IEEE Transactions on Information Forensics and Security, Vol.6, no.3, pp.920-935, 2011. https://doi.org/10.1109/TIFS.2011.2134094
  7. H. Otori and S. Kuriyama, "Data-embeddable texture synthesis," in Proc. of the 8th International Symposium on Smart Graphics, Kyoto, Japan, pp. 146-157, 2007.
  8. H. Otori and S. Kuriyama, "Texture synthesis for mobile data communications," IEEE Comput. Graph, Appl., vol. 29, no. 6, pp. 74-81, 2009. https://doi.org/10.1109/MCG.2009.127
  9. K. Wu and C. Wang, "Steganography using reversible texture synthesis," IEEE Trans. Image Process, vol. 24, no. 1, pp. 130-139, Jan. 2015. https://doi.org/10.1109/TIP.2014.2371246
  10. H. Zhou, K. Chen, W. Zhang, and N. Yu, "Comments on "Steganography Using Reversible Texture Synthesis," IEEE Trans. Image Process, vol. 26, no. 4, 2017.
  11. Z. Qian, H. Zhou, W. Zhang, and X. Zhang, "Robust steganography using texture synthesis," in Proc. of Twelfth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2016, 25-33, Kaohsiung, Taiwan, Nov. 21-23, 2016.
  12. C. Santoni, F. Pellacini, "gTangle: a Grammar for the Procedural Generation of Tangle Patterns," in Proc. of ACM Transactions on Graphics (TOG) - Proceedings of ACM SIGGRAPH Asia 2016, Volume 35 Issue 6, 2016.
  13. Z. Zhou, H. Sun, R. Harit, X. Chen, and X. Sun, "Coverless image steganography without embedding," in Proc. of International Conference on Cloud Computing and Security, Springer, pp. 123-132, August, 2015.
  14. J. Hayes, G. Danezis, "ste-GAN-ography: Generating Steganographic Images via Adversarial Training," 2017.

Cited by

  1. Coverless information hiding based on the generation of anime characters vol.2020, pp.None, 2020, https://doi.org/10.1186/s13640-020-00524-4