A graph–theoretic approach to steganography

  • Authors:
  • Stefan Hetzl;Petra Mutzel

  • Affiliations:
  • Institute of Computer Languages (E185), Vienna University of Technology, Vienna, Austria;Institute of Algorithm Engineering, LS11, University of Dortmund, Dortmund, Germany

  • Venue:
  • CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

We suggest a graph-theoretic approach to steganography based on the idea of exchanging rather than overwriting pixels. We construct a graph from the cover data and the secret message. Pixels that need to be modified are represented as vertices and possible partners of an exchange are connected by edges. An embedding is constructed by solving the combinatorial problem of calculating a maximum cardinality matching. The secret message is then embedded by exchanging those samples given by the matched edges. This embedding preserves first-order statistics. Additionally, the visual changes can be minimized by introducing edge weights. We have implemented an algorithm based on this approach with support for several types of image and audio files and we have conducted computational studies to evaluate the performance of the algorithm.