收稿日期: 2016-08-04
修回日期: 2016-08-18
网络出版日期: 2016-09-30
基金资助
广东省应用型科技研发专项基金(No.2015B010130003);广州市科技项目基金(No.201510010275);广州市人体数据科学重点实验室项目基金(No.201605030011)资助
Texture-Based Image Steganography Using Adaptive Pixel Pair Matching
Received date: 2016-08-04
Revised date: 2016-08-18
Online published: 2016-09-30
图像纹理区结构随机性较强,因此在纹理丰富区域嵌入隐蔽信息比在平坦区域嵌入的安全性更高。提出一种基于自适应像素对匹配法(adaptive pixel pairmatching,APPM)的纹理区隐写算法,优先在复杂纹理区嵌入密信。定义了图像纹理区域判别准则,由此根据待嵌入秘密信息的长度调整阈值,实现自适应隐写。在嵌入过程中可能出现嵌密块纹理复杂度小于阈值的异常情况,为解决这一问题,算法包含了基于最小失真的像素值局部调整策略。实验结果表明,该算法的嵌入效率高于原始APPM算法,而且KL距离较小,抵抗几种常用隐写分析算法的能力也比其他几种代表性算法LSB和APPM更强。
刘烁炜, 胡永健, 刘琲贝, 化晓茜 . 利用自适应像素对匹配的图像纹理区隐写[J]. 应用科学学报, 2016 , 34(5) : 515 -526 . DOI: 10.3969/j.issn.0255-8297.2016.05.004
Compared with flat regions, texture-rich regions in an image are more randomlike, and therefore are more secure for hidden messages. Based on the adaptive pixel pair matching (APPM) scheme, we propose an improved steganographic algorithm that embeds secret data preferentially in texture regions. A criterion for image texture assessment is defined. According to the length of secret data, We use the the criterion to adaptively select appropriate regions for embedding. A pixel value adjustment strategy based on optimizing a minimum distortion function through local search is proposed to deal with possible abnormal situations in embedding. Experimental results show that the proposed algorithm outperforms the original APPM in terms of embedding efficiency and Kullback-Leibler divergence. It is also more robust against several representative steganalytic attacks than a number of least significant bits (LSB) algorithms and APPM.
[1] Mielikainen J. LSB matching revisited [J]. IEEE on Signal Processing Letters, 2006, 13(5): 285-287.
[2] Omoomi M, Samavi S, Dumitrescu S. An efficient high payload±1 data embedding scheme[J]. Multimedia Tools and Applications, 2011, 54(2): 201-218.
[3] Zhang X, Wang S. Efficient steganographic embedding by exploiting modification direction [J]. IEEE Communications Letters, 2006, 10(11): 781-783.
[4] Chao R, Wu H, Lee C. A novel image datahiding scheme with diamond encoding [J]. Eurasip Journal on Information Security, 2009, 2009(1): 1-9.
[5] Hong W, Chen T. A novel data embedding method using adaptive pixel pair matching [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(1): 176-184.
[6] Luo W, Huang F, Huang J. Edge adaptive image steganography based on LSB matching revisited [J]. IEEE Transactions on Information Forensics and Security, 2010, 5(2): 201-214.
[7] Cachin C. An information-theoretic model for steganography [J]. Information and Computation, 2004, 192(1): 41-56.
[8] Aucsmith D. Information hiding [M]. Berlin Heidelberg: Springer, 1998: 306-318.
[9] Fridrich J, Kodovsky J. Rich models for steganalysis of digital images [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(3): 868-882.
[10] Pevny T, Bas P, Fridrich J. Steganalysis by subtractive pixel adjacency matrix [J]. IEEE Transactions on Information Forensics and Security, 2010, 5(2): 215-224.
[11] Holub V, Fridrich J. Random projections of residuals for digital image steganalysis [J]. IEEE Transactions on Information Forensics and Security,2013, 8(12): 1996-2006.
[12] Schaefer G, Stich M. UCID: an uncompressed color image database [C]//Proceedingof the Storage and Retrieval Methods and Applications for Multimedia. CA: San Jose, 2004: 472-480.
[13] United States Department of Agriculture. Natural resources conservation service photo gallery.[OL]. Available: http://photogallery.nrcs.usda.gov.
[14] 师夏阳,马赛兰,胡永健,周琳娜. 一种基于像素块的纹理优先自适应隐写算法[J]. 电子学报,2015, 43(6): 1094-1100. Shi X Y, Ma S L, Hu Y J, Zhou L N. A pixel block-based adaptive steganographic algorithm with embedding priority given to image textures [J]. Chinese Journal of Electronics, 2015, 43(6): 1094-1100. (in Chinese)
[15] Tan S, Li B. Targeted steganalysis of edge adaptive image steganography based on LSB matching revisited using B-Spline fitting [J]. IEEE Signal Processing Letters, 2012, 19(6): 336-339.
[16] Kodovsky J, Fridrich J, Holub V. Ensemble classifiers for steganalysis of digital media [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 432-444.
[17] Gul G, Kurugollu F. A new methodology in steganalysis: breaking highly undetectable steganograpy (HUGO) [C]//International Conference on Information Hiding, Springer-Verlag, 2011, 6958: 71-84.
[18] Holub V, Fridrich J. Designing steganographic distortion using directional filters [C]//IEEE International Workshop on Information Forensic and Security, 2012: 234-239.
[19] Holub V, Fridrich J. Digital image steganography using universal distortion [C]//ACM Workshop on Information Hiding and Multimedia Security, 2013: 59-68.
[20] Li B, Wang M, Huang J, Li X. A new cost function for spatial image steganography [C]//IEEE International Conference on Image Processing, 2014: 4206-4210.
/
| 〈 |
|
〉 |