Secure Halftone Image Steganography Based on Pixel Density Transition

被引:25
作者
Lu, Wei [1 ]
Xue, Yingjie [1 ]
Yeung, Yuileong [1 ]
Liu, Hongmei [1 ]
Huang, Jiwu [2 ,3 ]
Shi, Yun [4 ]
机构
[1] Sun Yat Sen Univ, Key Lab Machine Intelligence & Adzanced Comp, Guangdong Key Lab Informat Secur Technol, Minist Educ,Sch Data & Comp Sci, Guangzhou 510006, Peoples R China
[2] Shenzhen Univ, Guangdong Key Lab Intelligent Informat Proc, Shenzhen 518060, Peoples R China
[3] Shenzhen Univ, Key Lab Media Secur, Shenzhen 518060, Peoples R China
[4] New Jersey Inst Technol, Dept Elect & Comp Engn, Newark, NJ 07102 USA
基金
中国国家自然科学基金;
关键词
Halftone image steganography; pixel density histogram (PDH); pixel density transition; pixel mesh Markov transition matrix (PMMTM); BINARY IMAGE; AUTHENTICATION; STEGANALYSIS; DISTORTION;
D O I
10.1109/TDSC.2019.2933621
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Most state-of-the-art halftone image steganographic techniques only consider the flipping distortion according to the human visual system, which are not always secure when they are attacked by steganalyzers. In this paper, we propose a halftone image steganographic scheme that aims to generate stego images with good visual quality and strong statistical security of anti-steganalysis. First, the concept of pixel density is proposed and a novel construction called pixel density histogram (PDH) is proposed to design a "+/- 1 embedding" scheme for halftone images. Then, we optimize density pair selection to select density blocks that can improve visual quality. Finally, the messages are embedded through pixel density transition, where a novel pixel flipping strategy is proposed, which can maintain the structural dependence by optimizing the pixel mesh Markov transition matrix (PMMTM). The experimental results demonstrate that the proposed steganography scheme can achieve strong statistical security of anti-steganalysis with good visual quality without degrading the embedding capacity.
引用
收藏
页码:1137 / 1149
页数:13
相关论文
共 50 条
[31]   Enhanced secure lossless image steganography using invertible neural networks [J].
Chen, Weida ;
Chen, Weizhe .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2024, 36 (10)
[32]   SSGAN: Secure Steganography Based on Generative Adversarial Networks [J].
Shi, Haichao ;
Dong, Jing ;
Wang, Wei ;
Qian, Yinlong ;
Zhang, Xiaoyu .
ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2017, PT I, 2018, 10735 :534-544
[33]   Provably Secure Public-Key Steganography Based on Elliptic Curve Cryptography [J].
Zhang, Xin ;
Chen, Kejiang ;
Ding, Jinyang ;
Yang, Yuqi ;
Zhang, Weiming ;
Yu, Nenghai .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 :3148-3163
[34]   Provably Secure Generative Steganography Based on Autoregressive Model [J].
Yang, Kuan ;
Chen, Kejiang ;
Zhang, Weiming ;
Yu, Nenghai .
DIGITAL FORENSICS AND WATERMARKING, IWDW 2018, 2019, 11378 :55-68
[35]   Pixel Prediction-Based Image Steganography Using Crow Search Algorithm-Based Deep Belief Network Approach [J].
Ravikumar, K. P. ;
Reddy, H. S. Manjunatha .
INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2021, 21 (01)
[36]   Fast and Secure Steganography Based on J-UNIWARD [J].
Su, Ante ;
Ma, Sai ;
Zhao, Xianfeng .
IEEE SIGNAL PROCESSING LETTERS, 2020, 27 :221-225
[37]   An evaluation of image based steganography methods [J].
Bailey K. ;
Curran K. .
Multimedia Tools Appl, 2006, 1 (55-88) :55-88
[38]   Edge-based image steganography [J].
Islam, Saiful ;
Modi, Mangat R. ;
Gupta, Phalguni .
EURASIP JOURNAL ON INFORMATION SECURITY, 2014, 2014 (01)
[39]   Binary image steganography based on permutation [J].
Juvet Karnel Sadié ;
Stéphane Gael R. Ekodeck ;
René Ndoundam .
Iran Journal of Computer Science, 2023, 6 (4) :321-332
[40]   ENHANCING STEGANOGRAPHY OF GENERATIVE IMAGE BASED ON IMAGE RETOUCHING [J].
Gao, Yue ;
Yang, Jinshuai ;
Chen, Cheng ;
Pang, Kaiyi ;
Huang, Yongfeng .
2024 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, ICASSP 2024, 2024, :4945-4949