Steganography using image histogram specification

被引:0
|
作者
Zhang Guicang [1 ]
Yang Jun [1 ]
Chen Wanghu [1 ]
Yang Xiaodong [1 ]
机构
[1] NW Normal Univ, Dept Informat & Comp Sci, Lanzhou 730070, Peoples R China
关键词
digital watermarking; histogram specification; steganography; security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Based on exact histogram specification, this paper investigates the use of image histograms to hide information and proposes a new digital steganography scheme. The image is partitioned into blocks, and the data bits are embedded into the sub-histograms. The scheme uses the sub-histograms of image and keeps the original image histogram. With the new scheme we could greatly increase the payload of hidden information. The keys are introduced so that the security of the steganography system is greatly improved. Our steganography scheme is both visually and statistically imperceptible.
引用
收藏
页码:226 / 231
页数:6
相关论文
共 50 条
  • [31] REMOTE SENSING IMAGE ENHANCEMENT BASED ON WAVELET ANALYSIS AND HISTOGRAM SPECIFICATION
    Xie, Liang
    Wang, Guoyin
    Zhang, Xuerui
    Xiao, Bin
    Zhou, Botian
    Zhang, Fan
    2014 IEEE 3RD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (CCIS), 2014, : 55 - 59
  • [32] Order-encoded quantum image model and parallel histogram specification
    Guanlei Xu
    Xiaogang Xu
    Xun Wang
    Xiaotong Wang
    Quantum Information Processing, 2019, 18
  • [33] Image De-hazing Based on Optimal Compression and Histogram Specification
    Liu, Shilong
    Rahman, M. A.
    Wong, C. Y.
    Jiang, G.
    Lin, S. C. F.
    Kwok, Ngaiming
    2015 8TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING (CISP), 2015, : 281 - 286
  • [34] A histogram preserving watermarking scheme by histogram specification
    Zhang Guicang
    Wang Rangding
    Li Xiyan
    Li Rui
    WMSCI 2005: 9TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL 5, 2005, : 314 - 319
  • [35] Using the Chaotic Map in Image Steganography
    Enayatifar, Rasul
    Mahmoudi, Fariborz
    Mirzaei, Khadije
    2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND ENGINEERING, PROCEEDINGS, 2009, : 491 - +
  • [36] Using image steganography for decryptor distribution
    Morkel, T.
    Eloff, J. H. P.
    Olivier, M. S.
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: OTM 2006 WORKSHOPS, PT 1, PROCEEDINGS, 2006, 4277 : 322 - +
  • [37] Using the Chaotic Map in Image Steganography
    Enayatifar, Rasul
    Faridnia, Saed
    Sadeghi, Hossein
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING SYSTEMS, 2009, : 754 - +
  • [38] An image steganography using pixel characteristics
    Park, YR
    Kang, HH
    Shin, SU
    Kwon, KR
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 581 - 588
  • [39] Steganography of Data Embedding in Multimedia Images Using Interpolation and Histogram Shifting
    Wang, Wei-Jen
    Zhang, Yu-Hong
    Huang, Cheng-Ta
    Wang, Shiuh-Jeng
    2013 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2013), 2013, : 387 - 390
  • [40] Reference-free Detection of LSB Steganography Using Histogram Analysis
    Abdali, Natiq M.
    Hussain, Zahir M.
    2020 30TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2020, : 106 - 112