Secure Halftone Image Steganography Based on Feature Space and Layer Embedding

被引:7
作者
Lu, Wei [1 ]
Chen, Junjia [1 ]
Zhang, Junhong [1 ]
Huang, Jiwu [2 ,3 ]
Weng, Jian [4 ,5 ]
Zhou, Yicong [6 ]
机构
[1] Sun Yat Sen Univ, Sch Data & Comp Sci, Guangdong Prov Key Lab Informat Secur Technol, Key Lab Machine Intelligence & Adv Comp,Minist Ed, Guangzhou 510006, Peoples R China
[2] Shenzhen Univ, Guangdong Key Lab Intelligent Informat Proc, Shenzhen Key Lab Media Secur, Guangdong Lab Artificial Intelligence & Digital E, Shenzhen 518060, Peoples R China
[3] Shenzhen Univ, Shenzhen Inst Artificial Intelligence & Robot Soc, Shenzhen 518060, Peoples R China
[4] Jinan Univ, Coll Informat Sci & Technol, Guangzhou 510632, Peoples R China
[5] Jinan Univ, Coll Cyber Secur, Guangzhou 510632, Peoples R China
[6] Univ Macau, Dept Comp & Informat Sci, Macau, Peoples R China
基金
中国国家自然科学基金;
关键词
Data hiding; feature space; halftone image; steganography; syndrome-trellis codes (STCs); DISTORTION; ALGORITHM;
D O I
10.1109/TCYB.2020.3026047
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Syndrome-trellis codes (STCs) are commonly used in image steganographic schemes, which aim at minimizing the embedding distortion, but most distortion models cannot capture the mutual interaction of embedding modifications (MIEMs). In this article, a secure halftone image steganographic scheme based on a feature space and layer embedding is proposed. First, a feature space is constructed by a characterization method that is designed based on the statistics of 4 x 4 pixel blocks in halftone images. Upon the feature space, a generalized steganalyzer with good classification ability is proposed, which is used to measure the embedding distortion. As a result, a distortion model based on a hybrid feature space is constructed, which outperforms some state-of-the-art models. Then, as the distortion model is established on the statistics of local regions, a layer embedding strategy is proposed to reduce MIEM. It divides the host image into multiple layers according to their relative positions in 4 x 4 blocks, and the embedding procedure is executed layer by layer. In each layer, any two pixels are located at different 4 x 4 blocks in the original image, and the distortion model makes sure that the calculation of pixel distortions is independent. Between layers, the pixel distortions of the current layer are updated according to the previous embedding modifications, thus reducing the total embedding distortion. Comparisons with prior schemes demonstrate that the proposed steganographic scheme achieves high statistical security when resisting the state-of-the-art steganalysis.
引用
收藏
页码:5001 / 5014
页数:14
相关论文
共 38 条
[1]  
ANALOUI M, 1992, P SOC PHOTO-OPT INS, V1666, P96, DOI 10.1117/12.135959
[2]  
[Anonymous], 2011, ACM T INTEL SYST TEC, DOI DOI 10.1145/1961189.1961199
[3]  
Bas Patrick, 2011, Information Hiding. 13th International Conference, IH 2011. Revised Selected Papers, P59, DOI 10.1007/978-3-642-24178-9_5
[4]  
Bayer B. E., 1973, IEEE International Conference on Communications. Vol.I, p26/11
[5]   High Capacity Reversible Data Hiding in Encrypted Images by Patch-Level Sparse Representation [J].
Cao, Xiaochun ;
Du, Ling ;
Wei, Xingxing ;
Meng, Dan ;
Guo, Xiaojie .
IEEE TRANSACTIONS ON CYBERNETICS, 2016, 46 (05) :1132-1143
[6]   Binary image steganalysis based on local texture pattern [J].
Chen, Jialiang ;
Lu, Wei ;
Fang, Yanmei ;
Liu, Xianjin ;
Yeung, Yuileong ;
Xue, Yingjie .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2018, 55 :149-156
[7]   Binary Image Steganalysis Based on Distortion Level Co-Occurrence Matrix [J].
Chen, Junjia ;
Lu, Wei ;
Yeung, Yuileong ;
Xue, Yingjie ;
Liu, Xianjin ;
Lin, Cong ;
Zhang, Yue .
CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 55 (02) :201-211
[8]  
Chiew KL, 2010, LECT NOTES COMPUT SC, V6047, P341, DOI 10.1007/978-3-642-12827-1_25
[9]   Estimating Hidden Message Length in Binary Image Embedded by Using Boundary Pixels Steganography [J].
Chiew, Kang Leng ;
Pieprzyk, Josef .
FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, :683-688
[10]   Blind Steganalysis: A Countermeasure for Binary Image Steganography [J].
Chiew, Kang Leng ;
Pieprzyk, Josef .
FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, :653-658