Paper
1 October 2011 SCOPES: steganography with compression using permutation search
Sahar Boorboor, Behrouz Zolfaghari, Saadat Pour Mozafari
Author Affiliations +
Proceedings Volume 8285, International Conference on Graphic and Image Processing (ICGIP 2011); 82855N (2011) https://doi.org/10.1117/12.913431
Event: 2011 International Conference on Graphic and Image Processing, 2011, Cairo, Egypt
Abstract
LSB (Least Significant Bit) is a widely used method for image steganography, which hides the secret message as a bit stream in LSBs of pixel bytes in the cover image. This paper proposes a variant of LSB named SCOPES that encodes and compresses the secret message while being hidden through storing addresses instead of message bytes. Reducing the length of the stored message improves the storage capacity and makes the stego image visually less suspicious to the third party. The main idea behind the SCOPES approach is dividing the message into 3-character segments, seeking each segment in the cover image and storing the address of the position containing the segment instead of the segment itself. In this approach, every permutation of the 3 bytes (if found) can be stored along with some extra bits indicating the permutation. In some rare cases the segment may not be found in the image and this can cause the message to be expanded by some overhead bits2 instead of being compressed. But experimental results show that SCOPES performs overlay better than traditional LSB even in the worst cases.
© (2011) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Sahar Boorboor, Behrouz Zolfaghari, and Saadat Pour Mozafari "SCOPES: steganography with compression using permutation search", Proc. SPIE 8285, International Conference on Graphic and Image Processing (ICGIP 2011), 82855N (1 October 2011); https://doi.org/10.1117/12.913431
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Image segmentation

Steganography

Image compression

Visualization

Receivers

Computer engineering

Computer security

RELATED CONTENT


Back to Top