An embedding strategy on fusing multiple image features for data hiding in multiple images

被引:11
作者
Yang, Junxue [1 ]
Liao, Xin [1 ,2 ]
机构
[1] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Peoples R China
[2] Chinese Acad Sci, State Key Lab Informat Secur, Inst Informat Engn, Beijing 100093, Peoples R China
基金
中国国家自然科学基金;
关键词
Multiple images steganography; Embedding strategy; Multiple image features; Image complexity; Steganographic capacity; STEGANOGRAPHY; STEGANALYSIS;
D O I
10.1016/j.jvcir.2020.102822
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data hiding in multiple images has been a significant research direction in information security. How to reasonably design the embedding strategy to spread the payload among multiple images is still an open issue. In this paper, we propose an embedding strategy on fusing multiple features. We utilize the typical characteristic parameters of gray level co-occurrence matrix, the image entropy and the shape parameter to describe image complexity. Furthermore, we combine with the number of cover images, the number of cover images assigned to steganographer and the size of cover image to estimate the steganographic capacity of each image. The strategy is implemented together with some state-of-the-art single image steganographic algorithms. Experimental results demonstrate that the security performance of the proposed strategy is higher than that of the state-of-the-art embedding strategy against the blind universal pooled steganalysis. (c) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页数:6
相关论文
共 29 条
  • [1] On the limits of steganography
    Anderson, RJ
    Petitcolas, FAP
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) : 474 - 481
  • [2] A high payload steganography mechanism based on wavelet packet transformation and neutrosophic set
    Atta, Randa
    Ghanbari, Mohammad
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2018, 53 : 42 - 54
  • [3] Bas P., 2011, P 13 INF HID C PRAG, V6958, DOI 10.1007/978-3-642- 24178-9_5
  • [4] LOF: Identifying density-based local outliers
    Breunig, MM
    Kriegel, HP
    Ng, RT
    Sander, J
    [J]. SIGMOD RECORD, 2000, 29 (02) : 93 - 104
  • [5] Adaptive wavelet thresholding for image denoising and compression
    Chang, SG
    Yu, B
    Vetterli, M
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2000, 9 (09) : 1532 - 1546
  • [6] A Local Contrast Method for Small Infrared Target Detection
    Chen, C. L. Philip
    Li, Hong
    Wei, Yantao
    Xia, Tian
    Tang, Yuan Yan
    [J]. IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, 2014, 52 (01): : 574 - 581
  • [7] Cogranne R, 2017, INT CONF ACOUST SPEE, P2122, DOI 10.1109/ICASSP.2017.7952531
  • [8] Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes
    Filler, Tomas
    Judas, Jan
    Fridrich, Jessica
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) : 920 - 935
  • [9] Rich Models for Steganalysis of Digital Images
    Fridrich, Jessica
    Kodovsky, Jan
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) : 868 - 882
  • [10] Gretton A., 2007, ADV NEURAL INFORM PR, V19, P513, DOI DOI 10.7551/MITPRESS/7503.003.0069