A novel quantum color image steganography algorithm based on turtle shell and LSB

被引:8
|
作者
Wang, Meng-Xi [1 ]
Yang, Hong-Mei [1 ]
Jiang, Dong-Huan [2 ]
Yan, Bin [3 ]
Pan, Jeng-Shyang [1 ]
Liu, Tao [1 ]
机构
[1] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Shandong, Peoples R China
[2] Shandong Univ Sci & Technol, Coll Math & Syst Sci, Qingdao 266590, Shandong, Peoples R China
[3] Shandong Univ Sci & Technol, Coll Elect & Informat Engn, Qingdao 266590, Shandong, Peoples R China
基金
中国国家自然科学基金;
关键词
Quantum image steganography; Data hiding; Turtle shell; HVS; LSB; REPRESENTATION; COMPRESSION;
D O I
10.1007/s11128-022-03494-w
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Quantum image steganography has attracted considerable attention in recent years. The majority of existing algorithms do not simultaneously have excellent imperceptibility, high embedding capacity, and good security. Therefore, a novel quantum color image steganography scheme is researched based on turtle shell and least significant bit (LSB) replacement. Human vision system (HVS) model and check codes are introduced into the proposed scheme to improve visual quality and security. According to the theory that HVS has different sensitivities to various colors, two channels are randomly selected with different probabilities to hide secret information from the red (R), green (G), and blue (B) channels of each color carrier pixel. Grayscale values of the two chosen channels correspond to a point in the turtle shell-based reference matrix. Depending on whether the point is at the boundary of the reference matrix or not, the LSB substitution method or turtle shell algorithm is utilized to embed the secret information. Dedicated quantum circuits are presented to better describe the procedure of the novel scheme. Experimental results show that the proposed algorithm is feasible and has superior performance in imperceptibility, embedding capacity, and security.
引用
收藏
页数:32
相关论文
共 50 条
  • [21] Analysis of LSB based image steganography techniques
    Chandramouli, R
    Memon, N
    2001 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL III, PROCEEDINGS, 2001, : 1019 - 1022
  • [22] Detection of LSB steganography based on image smoothness*
    Zhang, Tao
    Zhang, Yan
    Ping, Xijian
    Song, Mingwu
    2006 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO - ICME 2006, VOLS 1-5, PROCEEDINGS, 2006, : 1377 - +
  • [23] Image and audio steganography based on indirect LSB
    Sultani, Zainab N.
    Dhannoon, Ban N.
    KUWAIT JOURNAL OF SCIENCE, 2021, 48 (04)
  • [24] LSB-based Steganography Using Reflected Gray Code for Color Quantum Images
    Li, Panchi
    Lu, Aiping
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2018, 57 (05) : 1516 - 1548
  • [25] A novel color image LSB steganography using improved 1D chaotic map
    Chanil Pak
    Jonggun Kim
    Kwangil An
    Changho Kim
    Kwanghun Kim
    Cholmyong Pak
    Multimedia Tools and Applications, 2020, 79 : 1409 - 1425
  • [26] A novel color image LSB steganography using improved 1D chaotic map
    Pak, Chanil
    Kim, Jonggun
    An, Kwangil
    Kim, Changho
    Kim, Kwanghun
    Pak, Cholmyong
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (1-2) : 1409 - 1425
  • [27] A Novel LSB Steganography Technique Using Image Segmentation
    Demircan, Yasir Yakup
    Ozekes, Serhat
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2024, 30 (03) : 308 - 332
  • [28] LSB-based Steganography Using Reflected Gray Code for Color Quantum Images
    Panchi Li
    Aiping Lu
    International Journal of Theoretical Physics, 2018, 57 : 1516 - 1548
  • [29] A Novel Approach of Image Steganography for Secure Communication Based on LSB Substitution Technique
    Rahman, Shahid
    Masood, Fahad
    Khan, Wajid Ullah
    Ullah, Niamat
    Khan, Fazal Qudus
    Tsaramirsis, George
    Jan, Sadeeq
    Ashraf, Majid
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 64 (01): : 31 - 61
  • [30] Image Steganography on Gray and Color Image using DCT Enhancement and RSA with LSB Method
    Singh, Yash Kumar
    Sharma, Sudhanshu
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 511 - 515