A High-Imperceptibility and Histogram-Shifting Data Hiding Scheme for JPEG Images

被引:37
作者
Li, Yuanzhang [1 ]
Yao, Shangjun [1 ]
Yang, Kai [1 ]
Tan, Yu-An [1 ]
Zhang, Quanxin [1 ]
机构
[1] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing 100081, Peoples R China
来源
IEEE ACCESS | 2019年 / 7卷
基金
中国国家自然科学基金;
关键词
Data hiding; JPEG images; DCT coefficient; histogram shift; COVERT TIMING CHANNELS; PREDICTION; DIFFERENCE;
D O I
10.1109/ACCESS.2019.2920178
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data hiding technology plays an important role in many areas related to people's life, such as military and medical images. However, it is difficult to obtain high embedding capacity in compressed images, and it may cause obvious image distortion. Also, the target image's file size should be controlled, as a significant increase in file size may cause the interceptor's attention. In the field of data hiding, many people have proposed feasible solutions. However, considering the visual quality and embedding rate of images, more improvements are needed. In this paper, the histogram shift is used to realize data hiding of JPEG images. The secret message bits are embedded in the high-frequency coefficients to ensure a higher embedding rate, and the high-frequency coefficients are obtained by histogram distribution. The optimal threshold is used to select a discrete cosine transform (DCT) coefficient sub-block that is suitable to embed the secret message and further improve the visual quality of the target image. The experiments show that our solution is significantly better than the most advanced technology in terms of embedding rate and visual quality.
引用
收藏
页码:73573 / 73582
页数:10
相关论文
共 36 条
  • [31] Xie X.-Z., 2018, MULTIMED TOOLS APPL, P1
  • [32] High Capacity Reversible Image Authentication Based on Difference Image Watermarking
    Yan, Yixin
    Cao, Wei
    Li, Shengming
    [J]. IST: 2009 IEEE INTERNATIONAL WORKSHOP ON IMAGING SYSTEMS AND TECHNIQUES, 2009, : 179 - 182
  • [33] Improving stego image quality in image interpolation based data hiding
    Yang, Chin-Nung
    Hsu, Shen-Chieh
    Kim, Cheonshik
    [J]. COMPUTER STANDARDS & INTERFACES, 2017, 50 : 209 - 215
  • [34] Yin ZX, 2016, INT CONF ACOUST SPEE, P2129, DOI 10.1109/ICASSP.2016.7472053
  • [35] A Self-certified Cross-Cluster Asymmetric Group Key Agreement for Wireless Sensor Networks
    Zhang Qikun
    Li Yongjiao
    Zhang Quanxin
    Yuan Junling
    Wang Ruifang
    Gan Yong
    Tan Yu'an
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2019, 28 (02) : 280 - 287
  • [36] Building covert timing channels by packet rearrangement over mobile networks
    Zhang, Xiaosong
    Liang, Chen
    Zhang, Quanxin
    Li, Yuanzhang
    Zheng, Jun
    Tan, Yu-an
    [J]. INFORMATION SCIENCES, 2018, 445 : 66 - 78