Special Issue: Information Security of Multimedia Contents

Texture-Based Image Steganography Using Adaptive Pixel Pair Matching

Expand
  • School of Electronic and Information Engineering, South China University of Technology, Guangzhou 510641, China

Received date: 2016-08-04

  Revised date: 2016-08-18

  Online published: 2016-09-30

Abstract

Compared with flat regions, texture-rich regions in an image are more randomlike, and therefore are more secure for hidden messages. Based on the adaptive pixel pair matching (APPM) scheme, we propose an improved steganographic algorithm that embeds secret data preferentially in texture regions. A criterion for image texture assessment is defined. According to the length of secret data, We use the the criterion to adaptively select appropriate regions for embedding. A pixel value adjustment strategy based on optimizing a minimum distortion function through local search is proposed to deal with possible abnormal situations in embedding. Experimental results show that the proposed algorithm outperforms the original APPM in terms of embedding efficiency and Kullback-Leibler divergence. It is also more robust against several representative steganalytic attacks than a number of least significant bits (LSB) algorithms and APPM.

Cite this article

LIU Shuo-wei, HU Yong-jian, LIU Bei-bei, HUA Xiao-qian . Texture-Based Image Steganography Using Adaptive Pixel Pair Matching[J]. Journal of Applied Sciences, 2016 , 34(5) : 515 -526 . DOI: 10.3969/j.issn.0255-8297.2016.05.004

References

[1] Mielikainen J. LSB matching revisited [J]. IEEE on Signal Processing Letters, 2006, 13(5): 285-287.
[2] Omoomi M, Samavi S, Dumitrescu S. An efficient high payload±1 data embedding scheme[J]. Multimedia Tools and Applications, 2011, 54(2): 201-218.
[3] Zhang X, Wang S. Efficient steganographic embedding by exploiting modification direction [J]. IEEE Communications Letters, 2006, 10(11): 781-783.
[4] Chao R, Wu H, Lee C. A novel image datahiding scheme with diamond encoding [J]. Eurasip Journal on Information Security, 2009, 2009(1): 1-9.
[5] Hong W, Chen T. A novel data embedding method using adaptive pixel pair matching [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(1): 176-184.
[6] Luo W, Huang F, Huang J. Edge adaptive image steganography based on LSB matching revisited [J]. IEEE Transactions on Information Forensics and Security, 2010, 5(2): 201-214.
[7] Cachin C. An information-theoretic model for steganography [J]. Information and Computation, 2004, 192(1): 41-56.
[8] Aucsmith D. Information hiding [M]. Berlin Heidelberg: Springer, 1998: 306-318.
[9] Fridrich J, Kodovsky J. Rich models for steganalysis of digital images [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(3): 868-882.
[10] Pevny T, Bas P, Fridrich J. Steganalysis by subtractive pixel adjacency matrix [J]. IEEE Transactions on Information Forensics and Security, 2010, 5(2): 215-224.
[11] Holub V, Fridrich J. Random projections of residuals for digital image steganalysis [J]. IEEE Transactions on Information Forensics and Security,2013, 8(12): 1996-2006.
[12] Schaefer G, Stich M. UCID: an uncompressed color image database [C]//Proceedingof the Storage and Retrieval Methods and Applications for Multimedia. CA: San Jose, 2004: 472-480.
[13] United States Department of Agriculture. Natural resources conservation service photo gallery.[OL]. Available: http://photogallery.nrcs.usda.gov.
[14] 师夏阳,马赛兰,胡永健,周琳娜. 一种基于像素块的纹理优先自适应隐写算法[J]. 电子学报,2015, 43(6): 1094-1100. Shi X Y, Ma S L, Hu Y J, Zhou L N. A pixel block-based adaptive steganographic algorithm with embedding priority given to image textures [J]. Chinese Journal of Electronics, 2015, 43(6): 1094-1100. (in Chinese)
[15] Tan S, Li B. Targeted steganalysis of edge adaptive image steganography based on LSB matching revisited using B-Spline fitting [J]. IEEE Signal Processing Letters, 2012, 19(6): 336-339.
[16] Kodovsky J, Fridrich J, Holub V. Ensemble classifiers for steganalysis of digital media [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 432-444.
[17] Gul G, Kurugollu F. A new methodology in steganalysis: breaking highly undetectable steganograpy (HUGO) [C]//International Conference on Information Hiding, Springer-Verlag, 2011, 6958: 71-84.
[18] Holub V, Fridrich J. Designing steganographic distortion using directional filters [C]//IEEE International Workshop on Information Forensic and Security, 2012: 234-239.
[19] Holub V, Fridrich J. Digital image steganography using universal distortion [C]//ACM Workshop on Information Hiding and Multimedia Security, 2013: 59-68.
[20] Li B, Wang M, Huang J, Li X. A new cost function for spatial image steganography [C]//IEEE International Conference on Image Processing, 2014: 4206-4210.

Outlines

/