Chung-Ming WANG Peng-Cheng WANG
We present a novel scheme for digital steganography of point-sampled geometry in the spatial domain. Our algorithm is inspired by the concepts proposed by Cayre and Macq for 3D polygonal models. It employs a principal component analysis (PCA), resulting in a blind approach. We validate our scheme with various model complexities in terms of capacity, complexity, visibility, and security. This scheme is robust against translation, rotation, and scaling operations. It is fast and can achieve high data capacity with insignificant visual distortion in the stego models.
Motoi IWATA Kyosuke MIYAKE Akira SHIOZAKI
This paper proposes a new steganographic method utilizing features of JPEG compression. The method embeds secret information using the number of zeroes in a block of quantized DCT coefficients in minimum coding units (MCU) of JPEG images. In the method, we can embed secret information into JPEG images with degradation like that by JPEG compression. Furthermore, the method causes little change of the histogram of quantized DCT coefficients, so it is hard to perceive secret information embedded by the method. The method mainly modifies boundaries between zero and non-zero DCT coefficients, so we can use the low frequency side of DCT coefficients for another steganographic method.
Noriko KOMAKI Naofumi AOKI Tsuyoshi YAMAMOTO
Speech quality of VoIP (Voice over Internet Protocol) may potentially be degraded by transmission errors such as packet loss and delay that are basically inevitable in best-effort communications. This study newly proposes an error concealment technique for such degradation by taking account of both sender-based and receiver-based techniques. In the proposed technique, sender-based side information, which is required by the receiver-based technique, is transmitted by using steganography, so that its datagram is completely compatible with the conventional format of VoIP. From experimental results of objective evaluation, it is indicated that the proposed technique may potentially be useful for improvement of speech quality, compared with the conventional technique.
Daisuke INOUE Masataka SUZUKI Tsutomu MATSUMOTO
Steganography is a technique that conceals the very existence of communication by means of hiding secret messages in innocuous cover objects. We previously developed a steganographic method that uses standard MIDI files (SMFs) as cover objects. Our method could conceal the secret messages in SMFs without changing their sound. We also investigated the effectiveness of our method against steganalysis. This steganalytic research revealed that files embedded using our method are vulnerable to detection, because stego SMFs lose the imprints borne by sequencers. In this study, we describe two improved methods of steganography that enable even stego SMFs to keep the sequencer's imprint. As a result, we improved the resistance of SMFs against steganalysis but there was a slight reduction in the embedding rate.
Michiharu NIIMI Richard O. EASON Hideki NODA Eiji KAWAGUCHI
In previous work we have proposed a steganographic technique for gray scale images called BPCS-Steganography. We also apply this technique to full color images by decomposing the image into its three color component images and treating each as a gray scale image. This paper proposes a method to apply BPCS-Steganography to palette-based images. In palette-based images, the image data can be decomposed into color component images similar to those of full color images. We can then embed into one or more of the color component images. However, even if only one of the color component images is used for embedding, the number of colors in the palette after embedding can be over the maximum number allowed. In order to represent the image data in palette-based format, color quantization is therefore needed. We cannot change the pixel values of the color component image that contains the embedded information, but can only change the pixel values of the other color component images. We assume that the degrading of the color component2 image with information embedded is smaller than that of the color component images that are used for color reduction. We therefore embed secret information into the G component image, because the human visual system is more sensitive to changes the luminance of a color, and G has the largest contribution to luminance of the three color components. In order to reduce the number of colors, the R and B component images are then changed in a way that minimizes the square error.
Masataka SUZUKI Tsutomu MATSUMOTO
We describe a scheme of secret communication over the Internet utilizing the potentiality of the TCP/IP protocol suite in a non-standard way. Except for the sender and the receiver of the secret communication it does not need any entities installed with special software. Moreover it does not require them to share any key beforehand. Such features of the scheme stem from the use of IP datagrams with spoofed source addresses and their related error messages for the Internet Control Message Protocol (ICMP) induced by artificial faults. Countermeasures against IP spoofing are deployed in various places since it is often used together with attacks such as distributed denial of service (DDoS) and SPAM mailing. Thus we examine the environment where the scheme works as an intention and also clarify the conditions to obsolete the scheme. Furthermore we estimate the amount of secretly communicated data by the scheme and storage requirements for the receivers and those for the observers who monitor the traffic to detect the very existence of such a secret communication. We also discuss various issues including the sender anonymity achieved by the scheme.
Shuichi TAKANO Kiyoshi TANAKA Tatsuo SUGIMURA
This paper presents a new data hiding scheme via steganographic image transformation, which is different from conventional data hiding techniques. The transformation is achieved in the frequency domain and the concept of Fourier filtering method is used. An input image is transformed into a fractal image, which can be used in Computer Graphic (CG) applications. One of the main advantages of this scheme is the amount of data to be hidden (embedded) is equal to that of the host signal (generated fractal image) while it is in general limited in the conventional data hiding schemes. Also both the opened fractal image and the hidden original one can be properly used depending on the situation. Unauthorized users will not notice the "secret" original image behind the fractal image, but even if they know that there is a hidden image it will be difficult for them to estimate the original image from the transformed image. Only authorized users who know the proper keys can regenerate the original image. The proposed method is applicable not only as a security tool for multimedia contents on web pages but also as a steganographic secret communication method through fractal images.