A more secure steganography based on adaptive pixel-value differencing scheme

被引:55
|
作者
Luo, Weiqi [1 ,2 ]
Huang, Fangjun [1 ]
Huang, Jiwu [1 ]
机构
[1] Sun Yat Sen Univ, Sch Informat Sci & Technol, Guangzhou 510275, Guangdong, Peoples R China
[2] Fujian Normal Univ, Key Lab Network Secur & Cryptol, Fuzhou 350007, Peoples R China
基金
中国博士后科学基金;
关键词
Adaptive data hiding; Pixel-value differencing (PVD); Security; IMAGES;
D O I
10.1007/s11042-009-0440-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Pixel-value differencing (PVD) based steganography is one of popular approaches for secret data hiding in the spatial domain. However, based on extensive experiments, we find that some statistical artifacts will be inevitably introduced even with a low embedding capacity in most existing PVD-based algorithms. In this paper, we first analyze the common limitations of the original PVD and its modified versions, and then propose a more secure steganography based on a content adaptive scheme. In our method, a cover image is first partitioned into small squares. Each square is then rotated by a random degree of 0, 90, 180 or 270. The resulting image is then divided into non-overlapping embedding units with three consecutive pixels, and the middle one is used for data embedding. The number of embedded bits is dependent on the differences among the three pixels. To preserve the local statistical features, the sort order of the three pixel values will remain the same after data hiding. Furthermore, the new method can first use sharper edge regions for data hiding adaptively, while preserving other smoother regions by adjusting a parameter. The experimental results evaluated on a large image database show that our method achieves much better security compared with the previous PVD-based methods.
引用
收藏
页码:407 / 430
页数:24
相关论文
共 50 条
  • [21] Adaptive block-based pixel value differencing steganography
    Hosam, Osama
    Ben Halima, Nadhir
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5036 - 5050
  • [22] Reversible data hiding scheme based on pixel-value differencing in dual images
    Kim, Pyung-Han
    Ryu, Kwan-Woo
    Jung, Ki-Hyun
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (07)
  • [23] Chi-square-based steganalysis method against modified pixel-value differencing steganography
    Lin, Wen-Bin
    Lai, Tai-Hung
    Chou, Chao-Lung
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2021, 46 (09) : 8525 - 8533
  • [24] An Improved Steganography Method Based on Least-Significant-Bit Substitution and Pixel-Value Differencing
    Liu, Hsing-Han
    Su, Pin-Chang
    Hsu, Meng-Hua
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (11) : 4537 - 4556
  • [25] Chi-square-based steganalysis method against modified pixel-value differencing steganography
    Wen-Bin Lin
    Tai-Hung Lai
    Chao-Lung Chou
    Arabian Journal for Science and Engineering, 2021, 46 : 8525 - 8533
  • [26] Image steganographic scheme based on pixel-value differencing and LSB replacement methods
    Wu, HC
    Wu, N
    Tsai, CS
    Hwang, MS
    IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING, 2005, 152 (05): : 611 - 615
  • [27] Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security
    Zhang, XP
    Wang, SZ
    PATTERN RECOGNITION LETTERS, 2004, 25 (03) : 331 - 339
  • [28] Data hiding in images by adaptive LSB substitution based on the pixel-value differencing
    Li, Suk-Ling
    Leung, Kai-Chi
    Cheng, L. M.
    Chan, Chi-Kwong
    ICICIC 2006: FIRST INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING, INFORMATION AND CONTROL, VOL 3, PROCEEDINGS, 2006, : 58 - +
  • [29] Modified Multiway Pixel-Value Differencing Methods Based on General Quantization Ranges for Image Steganography
    Wu, Da-Chun
    Shih, Zong-Nan
    Wu, Jheng-Han
    IEEE ACCESS, 2022, 10 : 8824 - 8839
  • [30] Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing
    Weng, Chi-Yao
    Huang, Yen-Chia
    Lee, Chin-Feng
    Lin, Dong-Peng
    GENETIC AND EVOLUTIONARY COMPUTING, 2018, 579 : 109 - 117