Steganography Using Reversible Texture Synthesis

0
674
Steganography Using Reversible Texture Synthesis

Steganography Using Reversible Texture Synthesis

Abstract of  Steganography Using Reversible Texture Synthesis

Steganography Using Reversible Texture Synthesis.We propose a novel approach for steganography using a reversible texture synthesis. A texture synthesis process resamples a smaller texture image, which synthesizes a new texture image with a similar local appearance and an arbitrary size.
 
We weave the texture synthesis process into steganography to conceal secret messages. In contrast to using an existing cover image to hide messages, our algorithm conceals the source texture image
embeds secret messages through the process of texture synthesis.
 
This allows us to extract the secret messages and source texture from a stego synthetic texture.
 
Our approach offers three distinct advantages. First, our scheme offers the embedding capacity that is proportional to the size of the stego texture image. Second, a steganalytic algorithm is not likely to defeat our steganographic approach.Third, the reversible capability inherited from our scheme provides functionality, which allows recovery of the source texture.

 

Conclusion 

This Steganography Using Reversible Texture Synthesis paper proposes a reversible steganographic algorithm using texture synthesis. Given an original source texture, our scheme can produce a large stego synthetic texture concealing secret messages. To the best of our knowledge, we are the first that can exquisitely weave the steganography into a conventional patch-based texture synthesis. 

Our method is novel and provides reversibility to retrieve the original source texture from the stego synthetic textures, making possible a second round of texture synthesis if needed. 

With the two techniques we have introduced, our algorithm can produce visually plausible stego synthetic textures even if the secret messages consisting of bit “0” or “1” have an uneven appearance of probabilities. 

The presented algorithm is secure and robust against an RS steganalysis attack. We believe our proposed scheme offers substantial benefits and provides an opportunity to extend steganographic applications.