Secure Halftone Image Steganography Based on Pixel Density Transition

被引:24
作者
Lu, Wei [1 ]
Xue, Yingjie [1 ]
Yeung, Yuileong [1 ]
Liu, Hongmei [1 ]
Huang, Jiwu [2 ,3 ]
Shi, Yun [4 ]
机构
[1] Sun Yat Sen Univ, Key Lab Machine Intelligence & Adzanced Comp, Guangdong Key Lab Informat Secur Technol, Minist Educ,Sch Data & Comp Sci, Guangzhou 510006, Peoples R China
[2] Shenzhen Univ, Guangdong Key Lab Intelligent Informat Proc, Shenzhen 518060, Peoples R China
[3] Shenzhen Univ, Key Lab Media Secur, Shenzhen 518060, Peoples R China
[4] New Jersey Inst Technol, Dept Elect & Comp Engn, Newark, NJ 07102 USA
基金
中国国家自然科学基金;
关键词
Halftone image steganography; pixel density histogram (PDH); pixel density transition; pixel mesh Markov transition matrix (PMMTM); BINARY IMAGE; AUTHENTICATION; STEGANALYSIS; DISTORTION;
D O I
10.1109/TDSC.2019.2933621
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Most state-of-the-art halftone image steganographic techniques only consider the flipping distortion according to the human visual system, which are not always secure when they are attacked by steganalyzers. In this paper, we propose a halftone image steganographic scheme that aims to generate stego images with good visual quality and strong statistical security of anti-steganalysis. First, the concept of pixel density is proposed and a novel construction called pixel density histogram (PDH) is proposed to design a "+/- 1 embedding" scheme for halftone images. Then, we optimize density pair selection to select density blocks that can improve visual quality. Finally, the messages are embedded through pixel density transition, where a novel pixel flipping strategy is proposed, which can maintain the structural dependence by optimizing the pixel mesh Markov transition matrix (PMMTM). The experimental results demonstrate that the proposed steganography scheme can achieve strong statistical security of anti-steganalysis with good visual quality without degrading the embedding capacity.
引用
收藏
页码:1137 / 1149
页数:13
相关论文
共 50 条
  • [21] A secure image sharing scheme with high quality stego-images based on steganography
    He, Junhui
    Lan, Weiqiang
    Tang, Shaohua
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (06) : 7677 - 7698
  • [22] A Novel Steganography for Spatial Color Images Based on Pixel Vector Cost
    Qin, Xinghong
    Li, Bin
    Tan, Shunquan
    Zeng, Jishen
    IEEE ACCESS, 2019, 7 : 8834 - 8846
  • [23] Constructing Immunized Stego-Image for Secure Steganography via Artificial Immune System
    Li, Wanjie
    Wang, Hongxia
    Chen, Yijing
    Abdullahi, Sani M.
    Luo, Jie
    IEEE TRANSACTIONS ON MULTIMEDIA, 2023, 25 : 8320 - 8333
  • [24] Cover selection technique for secure transform domain image steganography
    Mansi S. Subhedar
    Iran Journal of Computer Science, 2021, 4 (4) : 241 - 252
  • [25] Image Steganalysis Against Adversarial Steganography by Combining Confidence and Pixel Artifacts
    Hu, Mingzhi
    Wang, Hongxia
    IEEE SIGNAL PROCESSING LETTERS, 2023, 30 : 987 - 991
  • [26] A secure image steganography based on modified matrix encoding using the adaptive region selection technique
    Tuan Duc Nguyen
    Hai Quoc Le
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (18) : 25251 - 25281
  • [27] A secure image steganography based on modified matrix encoding using the adaptive region selection technique
    Tuan Duc Nguyen
    Hai Quoc Le
    Multimedia Tools and Applications, 2022, 81 : 25251 - 25281
  • [28] Evaluation of pixel-based steganography and stegodetection methods
    Bailey, K
    Curran, K
    Condell, J
    IMAGING SCIENCE JOURNAL, 2004, 52 (03) : 131 - 150
  • [29] Reversible dynamic secure steganography for medical image using graph coloring
    Thiyagarajan, P.
    Aghila, G.
    HEALTH POLICY AND TECHNOLOGY, 2013, 2 (03) : 151 - 161
  • [30] Novel and Secure Encoding and Hiding Techniques using Image Steganography: A Survey
    Ashwin, S.
    Kumar, S. Aravind
    Ramesh, J.
    Gunavathi, K.
    2012 INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ELECTRICAL ENGINEERING AND ENERGY MANAGEMENT (ICETEEEM - 2012), 2012, : 171 - 177