A more secure steganography based on adaptive pixel-value differencing scheme

被引:55
作者
Luo, Weiqi [1 ,2 ]
Huang, Fangjun [1 ]
Huang, Jiwu [1 ]
机构
[1] Sun Yat Sen Univ, Sch Informat Sci & Technol, Guangzhou 510275, Guangdong, Peoples R China
[2] Fujian Normal Univ, Key Lab Network Secur & Cryptol, Fuzhou 350007, Peoples R China
基金
中国博士后科学基金;
关键词
Adaptive data hiding; Pixel-value differencing (PVD); Security; IMAGES;
D O I
10.1007/s11042-009-0440-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Pixel-value differencing (PVD) based steganography is one of popular approaches for secret data hiding in the spatial domain. However, based on extensive experiments, we find that some statistical artifacts will be inevitably introduced even with a low embedding capacity in most existing PVD-based algorithms. In this paper, we first analyze the common limitations of the original PVD and its modified versions, and then propose a more secure steganography based on a content adaptive scheme. In our method, a cover image is first partitioned into small squares. Each square is then rotated by a random degree of 0, 90, 180 or 270. The resulting image is then divided into non-overlapping embedding units with three consecutive pixels, and the middle one is used for data embedding. The number of embedded bits is dependent on the differences among the three pixels. To preserve the local statistical features, the sort order of the three pixel values will remain the same after data hiding. Furthermore, the new method can first use sharper edge regions for data hiding adaptively, while preserving other smoother regions by adjusting a parameter. The experimental results evaluated on a large image database show that our method achieves much better security compared with the previous PVD-based methods.
引用
收藏
页码:407 / 430
页数:24
相关论文
共 26 条
  • [1] [Anonymous], 2001, Information hiding, DOI 10.1007/3-540-
  • [2] [Anonymous], P 10 C USENIX SEC S
  • [3] [Anonymous], IEEE INT C MULT EXP
  • [4] Hiding data in images by simple LSB substitution
    Chan, CK
    Cheng, LM
    [J]. PATTERN RECOGNITION, 2004, 37 (03) : 469 - 474
  • [5] Farid H, 2002, 2002 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL II, PROCEEDINGS, P905
  • [6] Huang FJ, 2007, IEEE IMAGE PROC, P401
  • [7] Steganalysis of LSB matching in grayscale images
    Ker, AD
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2005, 12 (06) : 441 - 444
  • [8] High capacity image steganographic model
    Lee, YK
    Chen, LH
    [J]. IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING, 2000, 147 (03): : 288 - 294
  • [9] Textural features based universal steganalysis
    Li, Bin
    Huang, Jiwu
    Shi, Yun Q.
    [J]. SECURITY, FORENSICS, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS X, 2008, 6819
  • [10] Li XL, 2008, MM&SEC'08: PROCEEDINGS OF THE MULTIMEDIA & SECURITY WORKSHOP 2008, P133