Algorithm of error-free information embedding into the DCT domain of digital images based on the QIM method using adaptive masking of distortions

被引:9
作者
Evsutin, Oleg [1 ,3 ]
Melman, Anna [2 ]
Meshcheryakov, Roman [3 ]
机构
[1] Natl Res Univ Higher Sch Econ, 20 Myasnitskaya Ulitsa, Moscow 101000, Russia
[2] Tomsk State Univ Control Syst & Radioelect, 40 Lenina Prospect, Tomsk 634050, Russia
[3] Russian Acad Sci, VA Trapeznikov Inst Control Sci, 65 Profsoyuznaya Ulitsa, Moscow 117997, Russia
基金
俄罗斯科学基金会;
关键词
Information security; Data hiding; Image steganography; Frequency-domain image embedding; QIM; Error-free embedding; ENCRYPTED IMAGES; STEGANOGRAPHY; STRATEGY; BLOCK;
D O I
10.1016/j.sigpro.2020.107811
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proposes a new algorithm for hiding data in the frequency domain of digital images using the discrete cosine transform. This algorithm uses quantization index modulation (QIM) as the basic embedding operation. Frequency embedding is characterized by the problem of error appearance in a secret message arising directly at the embedding stage. The embedded message is distorted due to the loss of information when restoring integer pixel values from the frequency domain. This problem is significant if the integrity of the transmitted information is critical. For example, an insignificant distortion of an encrypted message leads to the impossibility of decrypting and, consequently, to the loss of all encrypted information. The proposed algorithm solves this problem via an iterative embedding procedure, which corrects the arising errors. Another distinctive feature of this algorithm is the adaptive correction of distortions of the frequency coefficients' histogram. For this purpose, the embedding procedure adapts to the features of the image and masks the arising distortions. Computing experiments and comparison with the state-of-the-art demonstrate the effectiveness of our algorithm. (C) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页数:19
相关论文
共 31 条
[1]   Mix column transform based on irreducible polynomial mathematics for color image steganography: A novel approach [J].
Abduallah, Wafaa Mustafa ;
Rahma, Abdul Monem S. ;
Pathan, Al-Sakib Khan .
COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (04) :1390-1404
[2]   JPEG steganography detection with Benford's Law [J].
Andriotis, Panagiotis ;
Oikonomou, George ;
Tryfonas, Theo .
DIGITAL INVESTIGATION, 2013, 9 (3-4) :246-257
[3]   Difference operators and generalized discrete fractional transforms in signal and image processing [J].
Annaby, M. H. ;
Ayad, H. A. ;
Rushdi, M. A. ;
Nehary, E. A. .
SIGNAL PROCESSING, 2018, 151 :1-18
[4]   SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images [J].
Arunkumar, S. ;
Subramaniyaswamy, V ;
Vijayakumar, V. ;
Chilamkurti, Naveen ;
Logesh, R. .
MEASUREMENT, 2019, 139 :426-437
[5]   High capacity reversible data hiding and content protection for radiographic images [J].
Cavagnino, Davide ;
Lucenteforte, Maurizio ;
Grangetto, Marco .
SIGNAL PROCESSING, 2015, 117 :258-269
[6]   Quantization index modulation: A class of provably good methods for digital watermarking and information embedding [J].
Chen, B ;
Wornell, GW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (04) :1423-1443
[7]   Optimization-based image watermarking with integrated quantization embedding in the wavelet-domain [J].
Chen, Shuo-Tsung ;
Huang, Huang-Nan ;
Kung, Woon-Man ;
Hsu, Chih-Yu .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (10) :5493-5511
[8]   Color image steganography scheme using DFT, SPIHT codec, and modified differential phase-shift keying techniques [J].
Chen, Wen-Yuan .
APPLIED MATHEMATICS AND COMPUTATION, 2008, 196 (01) :40-54
[9]  
Chowdhury N., 2012, Int. J. Intell. Syst. Appl, V1, P32, DOI [10.5815/ijisa.2012.01.04, DOI 10.5815/IJISA.2012.01.04]
[10]   A generalized Benford's law for JPEG coefficients and its applications in image forensics [J].
Fu, Dongdong ;
Shi, Yuri Q. ;
Su, Wei .
SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS IX, 2007, 6505