Novel high-capacity robust and imperceptible image steganography scheme using multi-flipped permutations and frequency entropy matching method

被引:12
作者
Khan, Ahmed [1 ]
Sarfaraz, Aaliya [1 ]
机构
[1] COMSATS Univ, Dept Comp Sci, Islamabad, Pakistan
关键词
Information hiding; Image steganography; Covert communication; Pixel value difference (PVD); Frequency entropy matching (FEM);
D O I
10.1007/s00500-018-3441-1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we present a robust and imperceptible image steganography (IS) scheme for covert communication. A substantial literature presented on IS is distortion based that radically affects image imperceptibility. These schemes conceal secret information in LSBs or MSBs of cover image by using simple or random substitution. The usage of LSBs and MSBs makes these schemes vulnerable to malicious attacks like Chi-square attack and sample pair attack, and specifically, the MSBs affect the imperceptibility of cover image. Additionally, these schemes endure low capacity as large numbers of cover image pixels are required for hiding even low volume of information. The proposed IS scheme is distortion free as the negligible PVD of cover and secret image is utilized for information hiding. In contrast to LSB- or MSB-based information hiding schemes, we proposed FEM method that compares the entropy of frequencies of secret and cover image for information hiding. In fact, the elevated rate of FEM leads to high imperceptibility and capacity. Moreover, the proposed scheme uses multilayer approach that has layered transformations to frequency domain for improved robustness. Experimental investigation demonstrates that the proposed scheme has better PSNR and BPP with enhanced robustness and imperceptibility in contrast to existing schemes.
引用
收藏
页码:8045 / 8056
页数:12
相关论文
共 46 条
[1]  
Akhtar Nadeem, 2013, 2013 5th International Conference on Computational Intelligence and Communication Networks (CICN), P385, DOI 10.1109/CICN.2013.85
[2]  
Akhtar N, 2014, PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ISSUES AND CHALLENGES IN INTELLIGENT COMPUTING TECHNIQUES (ICICT), P749, DOI 10.1109/ICICICT.2014.6781374
[3]  
Al-Jaber A, 2010, INT ARAB J INF TECHN, V2, P1
[4]  
Arora K, 2014, INT J COMPUT SCI ENG, V2, P50
[5]  
Ashwin S, 2012, INT C EMERG TRENDS E, P171, DOI 10.1109/ICETEEEM.2012.6494463
[6]  
Bansal K, 2012, INT J INNOV RES DEV, V1, P109
[7]  
Bing F, 2009, IEEE INT C IM AN SIG, P1
[8]  
Bukhari RH, 2018, SCI INT, V30, P327
[9]  
Chunying Gu, 2012, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), P2035, DOI 10.1109/CECNet.2012.6201610
[10]  
Dagadita Monica Adriana, 2013, Proceedings of the 2013 IEEE 12th International Symposium on Parallel and Distributed Computing (ISPDC 2013), P159, DOI 10.1109/ISPDC.2013.29