LSB Matching Steganography Preserving Pixel Difference Histogram

被引:0
作者
Liu, Jin [1 ]
Zeng, Xian-wu [1 ]
Zhong, Min [1 ]
Wu, Jin [1 ]
Li, Juan [1 ]
机构
[1] Wuhan Univ Sci & Technol, Coll Informat Sci & Engn, Wuhan, Peoples R China
来源
2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ARTIFICIAL INTELLIGENCE (ICCSAI 2013) | 2013年
关键词
steganography; pixel difference histogram; cost function; steganalysis; STEGANALYSIS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The pixel difference distributions steganalysis utilizes the abnormality of pixel difference histogram to detect the LSB (least significant bit) matching steganography. In order to resist this steganalysis, a novel LSB matching steganography is proposed by preserving the pixel difference histogram of stego-image. In this steganographic method, we constructed the cost function related to the variation of pixel difference histogram and the number of zero difference values. If the secret bit equals the LSB of pixel, the pixel value remained unchanged; if not, the pixel value was increased or decreased by 1 according to the cost function value. The simulation results have demonstrated that the LSB matching steganography preserving pixel difference histogram is immune to the pixel difference distributions steganalysis at the expense of a little payload.
引用
收藏
页码:297 / 301
页数:5
相关论文
共 18 条
[1]   Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes [J].
Filler, Tomas ;
Judas, Jan ;
Fridrich, Jessica .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :920-935
[2]   Detecting LSB steganography in color and gray-scale images [J].
Fridrich, J. ;
Goljan, M. ;
Du, R. .
IEEE Multimedia, 2001, 8 (04) :22-28
[3]   Effect of Cover Quantization on Steganographic Fisher Information [J].
Fridrich, Jessica .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (02) :361-373
[4]   Steganalysis of additive noise modelable information hiding [J].
Harmsen, JJ ;
Pearlman, WA .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS V, 2003, 5020 :131-142
[5]  
Holotyak T, 2005, LECT NOTES COMPUT SC, V3677, P273
[6]   Steganalysis of JPEG steganography with complementary embedding strategy [J].
Huang, F. ;
Luo, W. ;
Huang, J. .
IET INFORMATION SECURITY, 2011, 5 (01) :10-18
[7]   Exploring steganography: Seeing the unseen [J].
Johnson, NF ;
Jajodia, S .
COMPUTER, 1998, 31 (02) :26-+
[8]   Steganalysis of LSB matching in grayscale images [J].
Ker, AD .
IEEE SIGNAL PROCESSING LETTERS, 2005, 12 (06) :441-444
[9]   Image complexity and feature mining for steganalysis of least significant bit matching steganography [J].
Liu, Qingzhong ;
Sung, Andrew H. ;
Ribeiro, Bernardete ;
Wei, Mingzhen ;
Chen, Zhongxue ;
Xu, Jianyun .
INFORMATION SCIENCES, 2008, 178 (01) :21-36
[10]   Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images [J].
Liu, Qingzhong ;
Sung, Andrew H. ;
Chen, Zhongxue ;
Xu, Jianyun .
PATTERN RECOGNITION, 2008, 41 (01) :56-66