Skip to main content

A Novel Steganographic Technique Based on Image Morphing

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4159))

Abstract

Steganography is the technology of hiding messages in such a way that no one except the authorized recipient knows the existence of the messages. In steganography, a message is hidden in some cover message. The larger the cover message is relative to the hidden message, the easier it is to hide the latter. When the hidden message is an image, it is difficult to hide the message into another image unless the size (in number of bits) of the hidden image is much smaller than that of the cover image. To solve this problem, this paper proposes a novel steganographic technique based on image morphing. The basic idea is to transform the hidden image into a morphing image, and use the morphing image as the stego message. The authorized recipient can recover the hidden image from the morphing image through demorphing. The morphing image can also be used directly for certain purposes.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   139.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding: A Survey. Proc. of the IEEE 87(7), 1062–1078 (1999)

    Article  Google Scholar 

  2. Venkatraman, S., Abraham, A., Paprzycki, M.: Significance of steganography on data security. In: Proc. IEEE International Conference on Information Technology: Coding and Computing (2004)

    Google Scholar 

  3. Ogihara, T., Koide, S., Kaneda, Y.: Data embedding into bilevel images using the error diffusion method. Electronics and Communications in Japan (Part III: Fundamental Electronics Science) 85(11), 36–44 (2002)

    Article  Google Scholar 

  4. Niimi, M., Noda, H., Kawaguchi, E.: An image embedding in image by a complexity based region segmentation method. In: Proc. International Conference on Image Processing, pp. 74–77 (1997)

    Google Scholar 

  5. Wolberg, G.: Image Morphing: A Survey. Visual Computer 14, 360–372 (1998)

    Article  Google Scholar 

  6. Wolber, G.: Digital Image Warping. IEEE Computer Society, Los Alamitos (1990)

    Google Scholar 

  7. Beier, T., Neely, S.: Feature-Based Image Metamorphosis. Computer Graphics (Proc. SIGGRAPH) 26(2), 35–42 (1992)

    Article  Google Scholar 

  8. IPA (Information-Technology Promotion Agency, Japan): Technology survey of Information Hiding, http://www.ipa.go.jp/security/fy10/contents/crypto/report/Information-Hiding.htm

  9. Makino, K.: Social Aspects of Information Hiding. Journal of Information Processing Society of Japan, Special Issue on Information Hiding 44(3), 260–264 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kondo, S., Zhao, Q. (2006). A Novel Steganographic Technique Based on Image Morphing. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.JP. (eds) Ubiquitous Intelligence and Computing. UIC 2006. Lecture Notes in Computer Science, vol 4159. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11833529_82

Download citation

  • DOI: https://doi.org/10.1007/11833529_82

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-38091-7

  • Online ISBN: 978-3-540-38092-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics