Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture

被引:65
|
作者
Feng, Bingwen [1 ]
Lu, Wei [1 ]
Sun, Wei [2 ]
机构
[1] Sun Yat Sen Univ, Sch Informat Sci & Technol, Guangzhou 510275, Guangdong, Peoples R China
[2] Sun Yat Sen Univ, Sch Software, Guangzhou 510275, Guangdong, Peoples R China
关键词
Binary image; steganography; complement; rotation; and mirroring-invariant local texture pattern (crmiLTP); flipping distortion measurement; AUTHENTICATION; STEGANALYSIS;
D O I
10.1109/TIFS.2014.2368364
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Most state-of-the-art binary image steganographic techniques only consider the flipping distortion according to the human visual system, which will be not secure when they are attacked by steganalyzers. In this paper, a binary image steganographic scheme that aims to minimize the embedding distortion on the texture is presented. We extract the complement, rotation, and mirroring-invariant local texture patterns (crmiLTPs) from the binary image first. The weighted sum of crmiLTP changes when flipping one pixel is then employed to measure the flipping distortion corresponding to that pixel. By testing on both simple binary images and the constructed image data set, we show that the proposed measurement can well describe the distortions on both visual quality and statistics. Based on the proposed measurement, a practical steganographic scheme is developed. The steganographic scheme generates the cover vector by dividing the scrambled image into superpixels. Thereafter, the syndrome-trellis code is employed to minimize the designed embedding distortion. Experimental results have demonstrated that the proposed steganographic scheme can achieve statistical security without degrading the image quality or the embedding capacity.
引用
收藏
页码:243 / 255
页数:13
相关论文
共 50 条
  • [1] Secure Binary Image Steganography Based on Fused Distortion Measurement
    Lu, Wei
    He, Liyu
    Yeung, Yuileong
    Xue, Yingjie
    Liu, Hongmei
    Feng, Bingwen
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2019, 29 (06) : 1608 - 1618
  • [2] Secure Binary Image Steganography With Distortion Measurement Based on Prediction
    Yeung, Yuileong
    Lu, Wei
    Xue, Yingjie
    Huang, Jiwu
    Shi, Yun-Qing
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2020, 30 (05) : 1423 - 1434
  • [3] Secure binary image steganography based on LTP distortion minimization
    Yeung, Yuileong
    Lu, Wei
    Xue, Yingjie
    Chen, Junjia
    Li, Ruipeng
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (17) : 25079 - 25100
  • [4] Secure halftone image steganography with minimizing the distortion on pair swapping
    Liu, Wanteng
    Yin, Xiaolin
    Lu, Wei
    Zhang, Junhong
    Zeng, Jinhua
    Shi, Shaopei
    Mao, Mingzhi
    SIGNAL PROCESSING, 2020, 167 (167)
  • [5] Secure halftone image steganography based on density preserving and distortion fusion
    Yu, Mujian
    Yin, Xiaolin
    Liu, Wanteng
    Lu, Wei
    SIGNAL PROCESSING, 2021, 188
  • [6] Binary image steganography based on joint distortion measurement
    Zhang, Junhong
    Lu, Wei
    Yin, Xiaolin
    Liu, Wanteng
    Yeung, Yuileong
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2019, 58 : 600 - 605
  • [7] On minimizing distortion in secure data-hiding for binary images
    Park, Y
    Cho, Y
    ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2004, PT 1, PROCEEDINGS, 2004, 3331 : 572 - 577
  • [8] Binary image steganography based on permutation
    Juvet Karnel Sadié
    Stéphane Gael R. Ekodeck
    René Ndoundam
    Iran Journal of Computer Science, 2023, 6 (4) : 321 - 332
  • [9] Distortion Function for JPEG Steganography Based on Image Texture and Correlation in DCT Domain
    Wang, Zichi
    Yin, Zhaoxia
    Zhang, Xinpeng
    IETE TECHNICAL REVIEW, 2018, 35 (04) : 351 - 358
  • [10] Secure Halftone Image Steganography Based on Pixel Density Transition
    Lu, Wei
    Xue, Yingjie
    Yeung, Yuileong
    Liu, Hongmei
    Huang, Jiwu
    Shi, Yun
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1137 - 1149