A Novel Steganography Method for Halftone Images

被引:0
作者
Ciftci, Efe [1 ]
Sumer, Emre [2 ]
机构
[1] Cankaya Univ, Bilgisayar Muhendisligi Bolumu, Ankara, Turkey
[2] Baskent Univ, Bilgisayar Muhendisligi Bolumu, Ankara, Turkey
来源
2022 30TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE, SIU | 2022年
关键词
steganography; halftone image; image processing;
D O I
10.1109/SIU55565.2022.9864763
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Steganography is the common name of methods that aim secret communication. In this conference proceeding, a novel steganography algorithm that hides plaintext payload in halftone images and a payload extraction algorithm that is suitable for messages hidden using this steganography method is presented. Our steganography algorithm uses a modified pattern-based halftone image generation procedure and distributes the payload into multiple output images. The proposed method has proven to be secure and able to hide large payloads. According to the objective and subjective evaluations made, it was seen that the proposed method produces promising results.
引用
收藏
页数:4
相关论文
共 16 条
[1]  
ANALOUI M, 1992, P SOC PHOTO-OPT INS, V1666, P96, DOI 10.1117/12.135959
[2]   Digital image steganography: Survey and analysis of current methods [J].
Cheddad, Abbas ;
Condell, Joan ;
Curran, Kevin ;
Mc Kevitt, Paul .
SIGNAL PROCESSING, 2010, 90 (03) :727-752
[3]  
Ciftci E., 2022, Erisim tarihi2 Subat
[4]   Steganography in halftone images: conjugate error diffusion [J].
Fu, MS ;
Au, OC .
SIGNAL PROCESSING, 2003, 83 (10) :2171-2178
[5]   Halftone image data hiding with intensity selection and connection selection [J].
Fu, MS ;
Au, OC .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2001, 16 (10) :909-930
[6]  
Fu WS, 2001, INT CONF ACOUST SPEE, P1965, DOI 10.1109/ICASSP.2001.941332
[7]  
Juneja Mamta, 2014, International Journal of Network Security, V16, P452
[8]  
Lu W., 2020, IEEE Transactions on Cybernetics
[9]   Secure Halftone Image Steganography Based on Pixel Density Transition [J].
Lu, Wei ;
Xue, Yingjie ;
Yeung, Yuileong ;
Liu, Hongmei ;
Huang, Jiwu ;
Shi, Yun .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) :1137-1149
[10]  
Naor M., 1994, ADV CRYPTOLOGY EUROC, V13, P1