A Second Order Derivatives based Approach for Steganography

Jean-François Couchot, Raphaël Couturier, Yousra Ahmed Fadil, Christophe Guyeux

2016

Abstract

Steganography schemes are designed with the objective of minimizing a defined distortion function. In most existing state of the art approaches, this distortion function is based on image feature preservation. Since smooth regions or clean edges define image core, even a small modification in these areas largely modifies image features and is thus easily detectable. On the contrary, textures, noisy or chaotic regions are so difficult to model that the features having been modified inside these areas are similar to the initial ones. These regions are characterized by disturbed level curves. This work presents a new distortion function for steganography that is based on second order derivatives, which are mathematical tools that usually evaluate level curves. Two methods are explained to compute these partial derivatives and have been completely implemented. The first experiments show that these approaches are promising.

Download


Paper Citation


in Harvard Style

Couchot J., Couturier R., Fadil Y. and Guyeux C. (2016). A Second Order Derivatives based Approach for Steganography . In Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016) ISBN 978-989-758-196-0, pages 424-431. DOI: 10.5220/0005966804240431

in Bibtex Style

@conference{secrypt16,
author={Jean-François Couchot and Raphaël Couturier and Yousra Ahmed Fadil and Christophe Guyeux},
title={A Second Order Derivatives based Approach for Steganography},
booktitle={Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016)},
year={2016},
pages={424-431},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005966804240431},
isbn={978-989-758-196-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016)
TI - A Second Order Derivatives based Approach for Steganography
SN - 978-989-758-196-0
AU - Couchot J.
AU - Couturier R.
AU - Fadil Y.
AU - Guyeux C.
PY - 2016
SP - 424
EP - 431
DO - 10.5220/0005966804240431