Varied PVD+LSB evading detection programs to spatial domain in data embedding systems

被引:56
作者
Yang, Cheng-Hsing [2 ]
Weng, Chi-Yao [3 ]
Wang, Shiuh-Jeng [1 ]
Sun, Hung-Min [3 ]
机构
[1] Cent Police Univ, Dept Informat Management, Tao Yuan 333, Taiwan
[2] Natl Pingtung Univ Educ, Dept Comp Sci, Pingtung 900, Taiwan
[3] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 300, Taiwan
关键词
Pixel-value differencing; LSB; Steganography; Detection analysis; STEGANOGRAPHIC METHOD; HIDING DATA; IMAGES; STEGANALYSIS;
D O I
10.1016/j.jss.2010.03.081
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Image steganographic schemes based on the least-significant-bit (LSB) replacement method own the character of high capacity and good quality, but they are detected easily by some programs. Pixel-value differencing (PVD) approaches are one kind of methods to pass some program detections, but PVD approaches usually provide lower capacities and larger distortion. Accordingly, the combined method of PVD and LSB replacement was proposed to raise the capacity and the quality of PVD approaches over the past literatures. In this paper, not only we contribute a new exploration in spatial domain to benefiting both the capacity and the fidelity on the basis of varied LSB + PVD approaches, but also the risk of the RS-steganalysis detection program is evaded. Furthermore, proof works are conducted to proclaim the correctness of the general LSB + PVD method. Following up, the varied LSB + PVD approach is therefore applied to our scheme. (C) 2010 Elsevier Inc. All rights reserved.
引用
收藏
页码:1635 / 1643
页数:9
相关论文
共 19 条
[1]   Digital steganography: Hiding data within data [J].
Artz, D .
IEEE INTERNET COMPUTING, 2001, 5 (03) :75-80
[2]   Hiding data in images by simple LSB substitution [J].
Chan, CK ;
Cheng, LM .
PATTERN RECOGNITION, 2004, 37 (03) :469-474
[3]   A steganographic method based upon JPEG and quantization table modification [J].
Chang, CC ;
Chen, TS ;
Chung, LZ .
INFORMATION SCIENCES, 2002, 141 (1-2) :123-138
[4]   A steganographic method for digital images using side match [J].
Chang, CC ;
Tseng, HW .
PATTERN RECOGNITION LETTERS, 2004, 25 (12) :1431-1437
[5]   Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy [J].
Chang, CC ;
Hsiao, JY ;
Chan, CS .
PATTERN RECOGNITION, 2003, 36 (07) :1583-1595
[6]  
Fridrich J., 2001, P ACM INT MULT C EXH, P27, DOI [10.1145/1232454.1232466, DOI 10.1145/1232454.1232466]
[7]  
Katzenbeisser S, 2000, DIGITAL WATERMARKING, P2
[8]   Steganalysis of LSB matching in grayscale images [J].
Ker, AD .
IEEE SIGNAL PROCESSING LETTERS, 2005, 12 (06) :441-444
[9]   Steganalysis of embedding in two least-significant bits [J].
Ker, Andrew D. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2007, 2 (01) :46-54
[10]   High capacity image steganographic model [J].
Lee, YK ;
Chen, LH .
IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING, 2000, 147 (03) :288-294