net/publication/232656816
CITATIONS READS
13 145
3 authors, including:
Claudia Feregrino
Instituto Nacional de Astrofísica, Óptica y Electrónica (INAOE)
132 PUBLICATIONS 514 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Claudia Feregrino on 02 June 2014.
Steganography is an old method that has been used • Know cover: when a steganogram is
since the ancient Romans, mainly because it represent a intercepted and the attacker knows the
secure mechanism of communication during wars. original cover image.
Nowadays, due to the boom of informatics,
steganography uses digital media such as text, audio and • Chosen stego: when the attacker has the
video to hide information. Digital images are the most stego-image and knows the steganographic
used way through the last years. method used.
Steganalisys is the art and science of breaking the • Chosen message: in this method the attacker
security of a steganographic system i.e. detecting the generates the stego-image with a know
existence of a hidden message in a know medium. Most message in order to find signs to detect other
of the successful attacks have detected strong changes in stego-images.
the original medium caused by the presence of a hidden
message. For this reason than adaptive steganography
propose hiding information considering the features of the The methods that we will present are mainly used against
cover medium to identify the best regions to hide the data. visual attacks. The visual attack method belongs to
A good place to hide data in digital images is a region passive only-stego attacks and it is used to get the position
with high contrast, several textures and many variations and length of a message to extract it. Then, we will
in its gray levels; because those regions generally are very describe the main idea of this attack.
noisy, and noise added for hiding a message is difficult to
detect. In this work we present an algorithm which uses
4. Used Algorithms
In this section three steganographic methods are
Figure 1. Possible Steganographic Systems using image described, these algorithms analyze the image features
before embedding to determinate feasible regions to hide
The algorithms presented in this work used the second the data. The first two algorithms where proposed in [1]
scheme. The dithering process is used in the first two were called ConDith and ConDithSpread respectively.
algorithms and texture detection is used in the third one.
In this algorithm a region is selected if it contains a • Select the central pixel if the four sub-blocks
high degree of randomness in its grayscale distribution are good before and after embedding.
considering the local contrast as dithering criteria.
In Figure 2 an example of this process are showed.
Therefore the algorithm calculates the difference
between a pixel and its neighbors. If the difference
exceeds a minimum threshold Cmin then pixel can be used
to embed a message bit and its corresponding pixel in the
dithering image is marked with 255, otherwise it is b) c)
marked with 0.
⎧⎪ (n + 1)
0 : diff > C min , rnd [x, y ] <
Pixel [x, y ] = ⎨ 2
⎪⎩ 255 : otherwise
a) b)
a) b)
c)
Figure 6 Bytes selected to insert information a) Original image.
b)Pixels selected by Dithering c) Pixels selected by Context
c)
Figure 7 Bytes selected to insert information a) Original image.
b)Pixels selected by Dithering c) Pixels selected by Context e) f)