Loading...

Secure steganography using Gabor filter and neural networks

Jamzad, M ; Sharif University of Technology | 2008

834 Viewed
  1. Type of Document: Article
  2. DOI: 10.1007/978-3-540-69019-1_3
  3. Publisher: 2008
  4. Abstract:
  5. The main concern of steganography (image hiding) methods is to embed a secret image into a host image in such a way that it causes minimum distortion to the host; to make it possible to extract a version of secret image from the host in such a way that the extracted version of secret image be as similar as possible to its original version (this should be possible even after usual attacks on the host image), and to provide ways of embedding secret images with larger size into a given host image. In this paper we propose a method that covers all above mentioned concerns by suggesting the idea of finding from an image data base, the most suitable host for a given secret image. In our method, the secret and host images are divided into blocks of size 4 ×4. Each block in secret image is taken as a texture pattern for which using Gabor filter, the most similar block is found among the blocks of host image candidates. Using this similarity criterion and Kohonen neural network, the most suitable host image is selected from an image database. Embedding is done by placing the blocks of secret image on their corresponding blocks in the selected host image. The location addresses of blocks in host that were replaced by blocks of secret image are saved. They are converted to a bit string that is embedded in DCT coefficients of the hybrid image. Our experimental results showed a high level of capacity, robustness and minimum distortion when using standard images as secret and host images. © 2008 Springer-Verlag Berlin Heidelberg
  6. Keywords:
  7. Artificial intelligence ; Computer networks ; Cryptography ; Electric fault location ; Image enhancement ; Metropolitan area networks ; Network protocols ; Standards ; Vegetation ; Wave filters ; (111) texture ; Bit strings ; Data-hiding ; Discrete cosine transform (DCT) coefficients ; Distortion (deformation) ; Experimental results ; Gabor filtering ; Heidelberg (CO) ; Host images ; Hybrid image ; Image databases ; Image hiding ; Kohonen neural networks ; Multimedia security ; Secret images ; Secure steganography ; similarity criterion ; Springer (CO) ; Standard images ; Steganography (stego) ; Neural networks
  8. Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 4920 LNCS , 2008 , Pages 33-49 ; 03029743 (ISSN); 3540690166 (ISBN); 9783540690160 (ISBN)
  9. URL: https://link.springer.com/chapter/10.1007%2F978-3-540-69019-1_3