Secure Halftone Image Steganography Based on Pixel Density Transition

被引:25
作者
Lu, Wei [1 ]
Xue, Yingjie [1 ]
Yeung, Yuileong [1 ]
Liu, Hongmei [1 ]
Huang, Jiwu [2 ,3 ]
Shi, Yun [4 ]
机构
[1] Sun Yat Sen Univ, Key Lab Machine Intelligence & Adzanced Comp, Guangdong Key Lab Informat Secur Technol, Minist Educ,Sch Data & Comp Sci, Guangzhou 510006, Peoples R China
[2] Shenzhen Univ, Guangdong Key Lab Intelligent Informat Proc, Shenzhen 518060, Peoples R China
[3] Shenzhen Univ, Key Lab Media Secur, Shenzhen 518060, Peoples R China
[4] New Jersey Inst Technol, Dept Elect & Comp Engn, Newark, NJ 07102 USA
基金
中国国家自然科学基金;
关键词
Halftone image steganography; pixel density histogram (PDH); pixel density transition; pixel mesh Markov transition matrix (PMMTM); BINARY IMAGE; AUTHENTICATION; STEGANALYSIS; DISTORTION;
D O I
10.1109/TDSC.2019.2933621
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Most state-of-the-art halftone image steganographic techniques only consider the flipping distortion according to the human visual system, which are not always secure when they are attacked by steganalyzers. In this paper, we propose a halftone image steganographic scheme that aims to generate stego images with good visual quality and strong statistical security of anti-steganalysis. First, the concept of pixel density is proposed and a novel construction called pixel density histogram (PDH) is proposed to design a "+/- 1 embedding" scheme for halftone images. Then, we optimize density pair selection to select density blocks that can improve visual quality. Finally, the messages are embedded through pixel density transition, where a novel pixel flipping strategy is proposed, which can maintain the structural dependence by optimizing the pixel mesh Markov transition matrix (PMMTM). The experimental results demonstrate that the proposed steganography scheme can achieve strong statistical security of anti-steganalysis with good visual quality without degrading the embedding capacity.
引用
收藏
页码:1137 / 1149
页数:13
相关论文
共 50 条
[41]   GAN-based image steganography for enhancing security via adversarial attack and pixel-wise deep fusion [J].
Yuan, Chao ;
Wang, Hongxia ;
He, Peisong ;
Luo, Jie ;
Li, Bin .
MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (05) :6681-6701
[42]   High payload image steganography with reduced distortion using octonary pixel pairing scheme [J].
Balasubramanian, C. ;
Selvakumar, S. ;
Geetha, S. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 73 (03) :2223-2245
[43]   A novel secure image steganography scheme based on Hamming encoding and LSB matching revisited using Lah Transform [J].
Nguyen, Tuan Duc ;
Le, Hai Quoc .
MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (32) :77347-77375
[44]   Discop: Provably Secure Steganography in Practice Based on "Distribution Copies" [J].
Ding, Jinyang ;
Chen, Kejiang ;
Wang, Yaofei ;
Zhao, Na ;
Zhang, Weiming ;
Yu, Nenghai .
2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, :2238-2255
[45]   Secure high payload steganography: A model-based approach [J].
Rabie, Tamer ;
Baziyad, Mohammed ;
Kamel, Ibrahim .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 63
[46]   An Efficient Sound and Data Steganography Based Secure Authentication System [J].
Datta, Debajit ;
Garg, Lalit ;
Srinivasan, Kathiravan ;
Inoue, Atsushi ;
Reddy, G. Thippa ;
Reddy, M. Praveen Kumar ;
Ramesh, K. ;
Nasser, Nidal .
CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 67 (01) :723-751
[47]   Steganography Based on Adaptive Pixel-Value Differencing Scheme Revisited [J].
Zhang, Hong ;
Guan, Qingxiao ;
Zhao, Xianfeng .
DIGITAL-FORENSICS AND WATERMARKING, IWDW 2013, 2014, 8389 :32-47
[48]   Steganalysis of AE-LSB Steganography Based on Pixel Value Differencing [J].
Zhu, Zhenhao ;
Zhang, Tao ;
Zhu, Pengwei ;
Wan, Baoji ;
Hou, Xiaodan .
2013 NINTH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION (ICNC), 2013, :1449-1453
[49]   GAN-based spatial image steganography with cross feedback mechanism [J].
Li, Fengyong ;
Yu, Zongliang ;
Qin, Chuan .
SIGNAL PROCESSING, 2022, 190
[50]   A Novel Edge Based Image Steganography Technique [J].
Seeja, K. R. ;
Rana, Jyoti ;
Priya, Srishti ;
Ahuja, Latika .
PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND PATTERN RECOGNITION (SOCPAR 2016), 2018, 614 :66-75