Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture

被引:65
作者
Feng, Bingwen [1 ]
Lu, Wei [1 ]
Sun, Wei [2 ]
机构
[1] Sun Yat Sen Univ, Sch Informat Sci & Technol, Guangzhou 510275, Guangdong, Peoples R China
[2] Sun Yat Sen Univ, Sch Software, Guangzhou 510275, Guangdong, Peoples R China
关键词
Binary image; steganography; complement; rotation; and mirroring-invariant local texture pattern (crmiLTP); flipping distortion measurement; AUTHENTICATION; STEGANALYSIS;
D O I
10.1109/TIFS.2014.2368364
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Most state-of-the-art binary image steganographic techniques only consider the flipping distortion according to the human visual system, which will be not secure when they are attacked by steganalyzers. In this paper, a binary image steganographic scheme that aims to minimize the embedding distortion on the texture is presented. We extract the complement, rotation, and mirroring-invariant local texture patterns (crmiLTPs) from the binary image first. The weighted sum of crmiLTP changes when flipping one pixel is then employed to measure the flipping distortion corresponding to that pixel. By testing on both simple binary images and the constructed image data set, we show that the proposed measurement can well describe the distortions on both visual quality and statistics. Based on the proposed measurement, a practical steganographic scheme is developed. The steganographic scheme generates the cover vector by dividing the scrambled image into superpixels. Thereafter, the syndrome-trellis code is employed to minimize the designed embedding distortion. Experimental results have demonstrated that the proposed steganographic scheme can achieve statistical security without degrading the image quality or the embedding capacity.
引用
收藏
页码:243 / 255
页数:13
相关论文
共 50 条
  • [21] Secure RGB image steganography based on modified LSB substitution
    Almazaydeh, Laiali
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2020, 12 (04) : 453 - 457
  • [22] Triple-A: Secure RGB Image Steganography Based on Randomization
    Gutub, Adnan
    Al-Qahtani, Ayed
    Tabakh, Abdulaziz
    2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, : 400 - 403
  • [23] Secure steganography based on embedding capacity
    Hedieh Sajedi
    Mansour Jamzad
    International Journal of Information Security, 2009, 8 : 433 - 445
  • [24] Provably Secure Robust Image Steganography
    Yang, Zijin
    Chen, Kejiang
    Zeng, Kai
    Zhang, Weiming
    Yu, Nenghai
    IEEE TRANSACTIONS ON MULTIMEDIA, 2024, 26 : 5040 - 5053
  • [25] Secure steganography based on embedding capacity
    Sajedi, Hedieh
    Jamzad, Mansour
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 8 (06) : 433 - 445
  • [26] A secure image sharing scheme with high quality stego-images based on steganography
    He, Junhui
    Lan, Weiqiang
    Tang, Shaohua
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (06) : 7677 - 7698
  • [27] Distortion Function for Spatial Image Steganography Based on the Polarity of Embedding Change
    Wang, Zichi
    Lv, Jinpeng
    Wei, Qingde
    Zhang, Xinpeng
    DIGITAL FORENSICS AND WATERMARKING, IWDW 2016, 2017, 10082 : 487 - 493
  • [28] Adaptive Steganography Based on Image Edge Enhancement and Automatic Distortion Learning
    Li, Enlu
    Fu, Zhangjie
    Chen, Junfu
    IMAGE AND GRAPHICS (ICIG 2021), PT III, 2021, 12890 : 155 - 167
  • [29] Zero Distortion Technique: An Approach to Image Steganography Using Strength of Indexed Based Chaotic Sequence
    Sharma, Shivani
    Yadav, Virendra Kumar
    Batham, Saumya
    SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 407 - 416
  • [30] Secure AAC steganography scheme based on multi-view statistical distortion (SofMvD)*
    Ren, Yanzhen
    Cai, Se
    Wang, Lina
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 59