Combining Visual Saliency and Pattern Masking for Image Steganography

被引:2
作者
Cao, Lihui [1 ]
Jung, Cheolkon [1 ]
机构
[1] Xidian Univ, Sch Elect Engn, Xian 710071, Peoples R China
来源
2015 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY | 2015年
关键词
Image steganography; visual saliency; pattern masking; image quality; visual attack; statistical attack;
D O I
10.1109/CyberC.2015.95
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent image steganographic approaches considers perceptual characteristics of the human visual system (HVS), and often use edge detection to express them. In practice, there exist perceptually salient regions for HVS in an image according to visual attention. Moreover, HVS has different sensitivities to luminance contrast and structure of the image, i.e. pattern masking. To enhance the security of data embedding, we propose an image steganographic method in this paper which combines visual saliency and pattern masking effects. First, we perform saliency estimation and sensitivity detection from the input image. Then, we select proper thresholds and regions to embed secret data. Finally, we use least-significant-bit matching revisited (LSBMR) to embed the data, and obtain the stego image. Experimental results demonstrate that the proposed method successfully improves both image quality and embedding capacity, and is robust against visual and statistical attacks.
引用
收藏
页码:320 / 323
页数:4
相关论文
共 10 条
[1]  
Fouroozesh Z, 2014, 2014 THIRD INTERNATIONAL CONFERENCE ON E-TECHNOLOGIES AND NETWORKS FOR DEVELOPMENT (ICEND), P141, DOI 10.1109/ICeND.2014.6991368
[2]   Detecting LSB steganography in color and gray-scale images [J].
Fridrich, J. ;
Goljan, M. ;
Du, R. .
IEEE Multimedia, 2001, 8 (04) :22-28
[3]  
Harel J., 2006, Graph-Based Visual Saliency, V19, DOI DOI 10.7551/MITPRESS/7503.003.0073
[4]   A model of saliency-based visual attention for rapid scene analysis [J].
Itti, L ;
Koch, C ;
Niebur, E .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1998, 20 (11) :1254-1259
[5]   Edge Adaptive Image Steganography Based on LSB Matching Revisited [J].
Luo, Weiqi ;
Huang, Fangjun ;
Huang, Jiwu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (02) :201-214
[6]   LSB matching revisited [J].
Mielikainen, J .
IEEE SIGNAL PROCESSING LETTERS, 2006, 13 (05) :285-287
[7]   UCID - An uncompressed colour image database [J].
Schaefer, G ;
Stich, M .
STORAGE AND RETRIEVAL METHODS AND APPLICATIONS FOR MULTIMEDIA 2004, 2004, 5307 :472-480
[8]  
Sharp Toby, 2001, LNCS, P13, DOI [10.1007/3-540-45496-9_2, DOI 10.1007/3-540-45496-9_2]
[9]   Pattern Masking Estimation in Image With Structural Uncertainty [J].
Wu, Jinjian ;
Lin, Weisi ;
Shi, Guangming ;
Wang, Xiaotian ;
Li, Fu .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2013, 22 (12) :4892-4904
[10]   Steganography using multiple-base notational system and human vision sensitivity [J].
Zhang, XP ;
Wang, SZ .
IEEE SIGNAL PROCESSING LETTERS, 2005, 12 (01) :67-70