Medical JPEG image steganography based on preserving inter-block dependencies

被引:105
作者
Liao, Xin [1 ]
Yin, Jiaojiao [1 ]
Guo, Sujing [1 ]
Li, Xiong [2 ]
Sangaiah, Arun Kumar [3 ]
机构
[1] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Hunan, Peoples R China
[2] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[3] VIT Univ, Sch Comp Sci & Engn, Vellore 632014, Tamil Nadu, India
基金
中国国家自然科学基金;
关键词
Medical JPEG image; Image steganography; DCT Coefficients; Inter-block dependencies; SMART CARD; SCHEME; PRIVACY;
D O I
10.1016/j.compeleceng.2017.08.020
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of computer and biomedical technologies, medical JPEG images contain the patients' personal information and the security of the private information attracts great attention. Steganography is utilized to conceal the private information, so as to provide privacy protection of medical images. Most of existing JPEG steganographic schemes embed messages by modifying discrete cosine transform (DCT) coefficients, but the dependencies among DCT coefficients would be disrupted. In this paper, we propose a new medical JPEG image steganographic scheme based on the dependencies of inter-block coefficients. The basic strategy is to preserve the differences among DCT coefficients at the same position in adjacent DCT blocks as much as possible. The cost values are allocated dynamically according to the modifications of inter-block neighbors in the embedding process. Experimental results show that the proposed scheme can cluster the inter-block embedding changes and perform better than the state-of-the-art steganographic method. (C) 2017 Elsevier Ltd. All rights reserved.
引用
收藏
页码:320 / 329
页数:10
相关论文
共 25 条
[1]  
[Anonymous], 2001, PROC INFORM HIDING
[2]  
[Anonymous], ELECT IMAG
[3]  
[Anonymous], 2013, 1 ACM INF HIDING MUL
[4]  
[Anonymous], 2013, P 1 ACM WORKSH INF H, DOI DOI 10.1145/2482513.2482514
[5]  
Bas Patrick, 2011, Information Hiding. 13th International Conference, IH 2011. Revised Selected Papers, P59, DOI 10.1007/978-3-642-24178-9_5
[6]  
Bremnavas I., 2011, Proceedings of the 3rd International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom 2011), P229, DOI 10.1049/ic.2011.0086
[7]   Digital image steganography: Survey and analysis of current methods [J].
Cheddad, Abbas ;
Condell, Joan ;
Curran, Kevin ;
Mc Kevitt, Paul .
SIGNAL PROCESSING, 2010, 90 (03) :727-752
[8]   Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes [J].
Filler, Tomas ;
Judas, Jan ;
Fridrich, Jessica .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :920-935
[9]  
Fridrich J, 2007, MM&SEC'07: PROCEEDINGS OF THE MULTIMEDIA & SECURITY WORKSHOP 2007, P3
[10]  
Guo LJ, 2012, IEEE INT WORKS INFOR, P169, DOI 10.1109/WIFS.2012.6412644