A novel steganographic technique based on image morphing

被引:0
|
作者
Kondo, Satoshi [1 ]
Zhao, Qiangfu [1 ]
机构
[1] Univ Aizu, Fukushima 9658580, Japan
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Steganography is the technology of hiding messages in such a way that no one except the authorized recipient knows the existence of the messages. In steganography, a message is hidden in some cover message. The larger the cover message is relative to the hidden message, the easier it is to hide the latter. When the hidden message is an image, it is difficult to hide the message into another image unless the size (in number of bits) of the hidden image is much smaller than that of the cover image. To solve this problem, this paper proposes a novel steganographic technique based on image morphing. The basic idea is to transform the hidden image into a morphing image, and use the morphing image as the stego message. The authorized recipient can recover the hidden image from the morphing image through demorphing. The morphing image can also be used directly for certain purposes.
引用
收藏
页码:806 / 815
页数:10
相关论文
共 50 条
  • [21] Steganography Based on Image Morphing
    Zhao, Qiangfu
    Kunii, Tosiyasu L.
    [J]. 2013 INTERNATIONAL JOINT CONFERENCE ON AWARENESS SCIENCE AND TECHNOLOGY & UBI-MEDIA COMPUTING (ICAST-UMEDIA), 2013, : 157 - +
  • [22] An image steganographic algorithm based on spatial desynchronization
    Arijit Sur
    Devadeep Shyam
    Piyush Goel
    Jayanta Mukherjee
    [J]. Multimedia Tools and Applications, 2014, 71 : 1105 - 1127
  • [23] An image steganographic algorithm based on spatial desynchronization
    Sur, Arijit
    Shyam, Devadeep
    Goel, Piyush
    Mukherjee, Jayanta
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 71 (03) : 1105 - 1127
  • [24] A Novel Image Steganographic Method based on Integer Wavelet Transformation and Particle Swarm Optimization
    Muhuri, Pranab K.
    Ashraf, Zubair
    Goel, Swati
    [J]. APPLIED SOFT COMPUTING, 2020, 92
  • [25] Steganography by synthesis - Can commonplace image manipulations like face morphing create plausible steganographic channels?
    Kraetzer, Christian
    Dittmann, Jana
    [J]. 13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [26] Optimal Steganographic Method Based on Image Encryption
    Al-Bdour, Nashat
    Mansour, Ayman M.
    [J]. PRZEGLAD ELEKTROTECHNICZNY, 2021, 97 (06): : 10 - 14
  • [27] Novel Scheme for Storage and Transmission of Medical Images with Patient Information Using Elliptic Curve Based Image Encryption Schemes with LSB Based Steganographic Technique
    Sathyanarayana, S. V.
    Bhat, K. N. Hari
    [J]. JOURNAL OF MEDICAL IMAGING AND HEALTH INFORMATICS, 2012, 2 (01) : 15 - 24
  • [28] Information Hiding Based on Image Morphing
    Nakamura, Hiroyuki
    Zhao, Qiangfu
    [J]. 2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 1585 - 1590
  • [29] An improved steganographic technique using LSB replacement on a scanned path image
    Karthikeyan, B.
    Ramakrishnan, S.
    Vaithiyanathan, V.
    Sruti, S.
    Gomathymeenakshi, M.
    [J]. International Journal of Network Security, 2014, 16 (01) : 14 - 18
  • [30] Secure blind image steganographic technique using discrete Fourier transformation
    Alturki, F
    Mersereau, R
    [J]. 2001 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL II, PROCEEDINGS, 2001, : 542 - 545