SlideShare a Scribd company logo
STEGANOGRAPHY USING REVERSIBLE TEXTURE SYNTHESIS
ABSTRACT
We propose a novel approach for Steganography using a reversible texture synthesis. A
texture synthesis process resample’s a smaller texture image, which synthesizes a new texture
image with a similar local appearance and an arbitrary size. We weave the texture synthesis
process into Steganography to conceal secret messages. In contrast to using an existing cover
image to hide messages, our algorithm conceals the source texture image and embeds secret
messages through the process of texture synthesis. This allows us to extract the secret messages
and source texture from a steno synthetic texture. Our approach offers three distinct advantages.
First, our scheme offers the embedding capacity that is proportional to the size of the stego
texture image. Second, a steganalytic algorithm is not likely to defeat our Steganography
approach. Third, the reversible capability inherited from our scheme provides functionality,
which allows recovery of the source texture. Experimental results have verified that our proposed
algorithm can provide various numbers of embedding capacities, produce a visually plausible
texture images, and recover the source texture.

More Related Content

PPTX
Texture Synthesis
DOCX
Steganography using reversible texture synthesis
DOC
Steganography using reversible texture synthesis
DOCX
Context-Aware Patch-Based Image Inpainting Using Markov Random Field Modeling
PDF
Steganography Using Reversible Texture Synthesis
PDF
Lsb steganography with improved
PDF
M ESH S IMPLIFICATION V IA A V OLUME C OST M EASURE
PDF
Robust foreground modelling to segment and detect multiple moving objects in ...
Texture Synthesis
Steganography using reversible texture synthesis
Steganography using reversible texture synthesis
Context-Aware Patch-Based Image Inpainting Using Markov Random Field Modeling
Steganography Using Reversible Texture Synthesis
Lsb steganography with improved
M ESH S IMPLIFICATION V IA A V OLUME C OST M EASURE
Robust foreground modelling to segment and detect multiple moving objects in ...

What's hot (16)

DOCX
Image forgery detection using adaptive over segmentation and feature point ma...
PDF
A Framework of Secured and Bio-Inspired Image Steganography Using Chaotic Enc...
PPTX
Multiscale computing in 15 minutes
PDF
A1804010105
PPTX
Scene Text Detection on Images using Cellular Automata
PDF
Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region
PPTX
Dimension Reduction And Visualization Of Large High Dimensional Data Via Inte...
PDF
A Survey of Image Based Steganography
PDF
Steganalysis of LSB Embedded Images Using Gray Level Co-Occurrence Matrix
PDF
The Gaussian Process Latent Variable Model (GPLVM)
PDF
A novel secure image steganography method based on chaos theory in spatial do...
PDF
PDF
A0360109
PPT
Cristopher M. Bishop's tutorial on graphical models
PDF
Synthetic aperture radar images
PDF
Multiple Style-Transfer in Real-Time
Image forgery detection using adaptive over segmentation and feature point ma...
A Framework of Secured and Bio-Inspired Image Steganography Using Chaotic Enc...
Multiscale computing in 15 minutes
A1804010105
Scene Text Detection on Images using Cellular Automata
Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region
Dimension Reduction And Visualization Of Large High Dimensional Data Via Inte...
A Survey of Image Based Steganography
Steganalysis of LSB Embedded Images Using Gray Level Co-Occurrence Matrix
The Gaussian Process Latent Variable Model (GPLVM)
A novel secure image steganography method based on chaos theory in spatial do...
A0360109
Cristopher M. Bishop's tutorial on graphical models
Synthetic aperture radar images
Multiple Style-Transfer in Real-Time
Ad

Viewers also liked (8)

PPTX
PPT steganography
PPTX
Steganography and watermarking
PPTX
Steganography
PDF
An Image Steganography Algorithm Using Huffman and Interpixel Difference Enco...
DOC
Steganography ProjectReport
PPTX
“Multimedia Steganography with Cipher Text and Compression ppt.
PPT
Image Steganography
PPTX
Steganography Project
PPT steganography
Steganography and watermarking
Steganography
An Image Steganography Algorithm Using Huffman and Interpixel Difference Enco...
Steganography ProjectReport
“Multimedia Steganography with Cipher Text and Compression ppt.
Image Steganography
Steganography Project
Ad

More from Shakas Technologies (20)

DOCX
A Review on Deep-Learning-Based Cyberbullying Detection
DOCX
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
DOCX
A Novel Framework for Credit Card.
DOCX
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
DOCX
NS2 Final Year Project Titles 2023- 2024
DOCX
MATLAB Final Year IEEE Project Titles 2023-2024
DOCX
Latest Python IEEE Project Titles 2023-2024
DOCX
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
DOCX
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
DOCX
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
DOCX
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
DOCX
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
DOCX
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
DOCX
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
DOCX
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
DOCX
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
DOCX
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
DOCX
Fighting Money Laundering With Statistics and Machine Learning.docx
DOCX
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
DOCX
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
A Review on Deep-Learning-Based Cyberbullying Detection
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Novel Framework for Credit Card.
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
NS2 Final Year Project Titles 2023- 2024
MATLAB Final Year IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Fighting Money Laundering With Statistics and Machine Learning.docx
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...

Recently uploaded (20)

PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
RMMM.pdf make it easy to upload and study
PPTX
master seminar digital applications in india
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Basic Mud Logging Guide for educational purpose
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Cell Types and Its function , kingdom of life
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
O7-L3 Supply Chain Operations - ICLT Program
O5-L3 Freight Transport Ops (International) V1.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
RMMM.pdf make it easy to upload and study
master seminar digital applications in india
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Microbial diseases, their pathogenesis and prophylaxis
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Anesthesia in Laparoscopic Surgery in India
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
TR - Agricultural Crops Production NC III.pdf
Basic Mud Logging Guide for educational purpose
PPH.pptx obstetrics and gynecology in nursing
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Cell Types and Its function , kingdom of life
school management -TNTEU- B.Ed., Semester II Unit 1.pptx

Steganography using reversible texture synthesis

  • 1. STEGANOGRAPHY USING REVERSIBLE TEXTURE SYNTHESIS ABSTRACT We propose a novel approach for Steganography using a reversible texture synthesis. A texture synthesis process resample’s a smaller texture image, which synthesizes a new texture image with a similar local appearance and an arbitrary size. We weave the texture synthesis process into Steganography to conceal secret messages. In contrast to using an existing cover image to hide messages, our algorithm conceals the source texture image and embeds secret messages through the process of texture synthesis. This allows us to extract the secret messages and source texture from a steno synthetic texture. Our approach offers three distinct advantages. First, our scheme offers the embedding capacity that is proportional to the size of the stego texture image. Second, a steganalytic algorithm is not likely to defeat our Steganography approach. Third, the reversible capability inherited from our scheme provides functionality, which allows recovery of the source texture. Experimental results have verified that our proposed algorithm can provide various numbers of embedding capacities, produce a visually plausible texture images, and recover the source texture.