High-Capacity Image Steganography Based on Discrete Hadamard Transform

被引:3
|
作者
Zhang, Ying-Qian [1 ,2 ,3 ]
Zhong, Kuan [1 ,3 ]
Wang, Xing-Yuan [4 ]
机构
[1] Xiamen Univ, Sch Informat Sci & Technol, Zhangzhou 363105, Peoples R China
[2] Xiamen Univ Malaysia, Sch EEAI, Sepang 43900, Selangor, Malaysia
[3] Xiamen Univ, Sch Informat, Xiamen 361005, Peoples R China
[4] Dalian Maritime Univ, Informat Sci & Technol Coll, Dalian 116023, Peoples R China
来源
IEEE ACCESS | 2022年 / 10卷
基金
中国国家自然科学基金;
关键词
Transforms; Steganography; Robustness; Security; Watermarking; Visualization; Distortion; Information security; information hiding; discrete Hadamard transform; image steganography; WATERMARKING SCHEME; INFORMATION; PAYLOAD;
D O I
10.1109/ACCESS.2022.3181179
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
High capacity and high imperceptibility are the primary targets for ideal image steganography. For the traditional transform-based schemes, the main challenge is to balance the imperceptibility, hiding capacity, and running efficiency. To obtain a high-quality image in dense embedding, existing high-capacity schemes usually sacrifice running efficiency and security. These disadvantages make the schemes less appealing. In this paper, based on a lightweight transform Discrete Hadamard Transform (DHT), we introduce a simple but high-performance image steganographic model. In the case of only stego-image passed, the experiment results demonstrate that the proposed scheme achieves high imperceptibility and security even in the dense embedding of 8 BPP (Bits Per Pixel). Furthermore, the proposed scheme withstands various tests and shows desirable robustness. The comparative analyses are demonstrated that our scheme is efficient and feasible image steganography.
引用
收藏
页码:65141 / 65155
页数:15
相关论文
共 50 条
  • [21] Steganography Attack Based on Discrete Spring Transform and Image Geometrization
    Qi, Qilin
    Sharp, Aaron
    Yang, Yaoqing
    Peng, Dongming
    Sharif, Hamid
    2014 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2014, : 554 - 558
  • [22] Steganography Based on the Hadamard Transform and Modification of the DEMD
    Leontiev, V. V.
    Saragishvilli, S. E.
    2017 INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING, APPLICATIONS AND MANUFACTURING (ICIEAM), 2017,
  • [23] High-Capacity Image Steganography with Minimum Modified Bits Based on Data Mapping and LSB Substitution
    Zakaria, Abdul Alif
    Hussain, Mehdi
    Wahab, Ainuddin Wahid Abdul
    Idris, Mohd Yamani Idna
    Abdullah, Norli Anida
    Jung, Ki-Hyun
    APPLIED SCIENCES-BASEL, 2018, 8 (11):
  • [24] HIGH CAPACITY STEGANOGRAPHY TECHNIQUE BASED ON WAVELET TRANSFORM
    Divya, V.
    Sasirekha, N.
    PROCEEDINGS OF 2016 ONLINE INTERNATIONAL CONFERENCE ON GREEN ENGINEERING AND TECHNOLOGIES (IC-GET), 2016,
  • [25] High-capacity adaptive steganography based on LSB and Hamming code
    Wang, Yanting
    Tang, Mingwei
    Wang, Zhen
    OPTIK, 2020, 213 (213):
  • [26] A High-Capacity Image Steganography Method Using Chaotic Particle Swarm Optimization
    Jaradat, Aya
    Taqieddin, Eyad
    Mowafi, Moad
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [27] DISH: Digital image steganography using stochastic-computing with high-capacity
    EL-Hady, Mohamed
    Abbas, Maha H.
    Khanday, Farooq A.
    Said, Lobna A.
    Radwan, Ahmed G.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (25) : 66033 - 66048
  • [28] A High-Capacity and High-Security Image Steganography Network Based on Chaotic Mapping and Generative Adversarial Networks
    Huo, Lin
    Chen, Ruipei
    Wei, Jie
    Huang, Lang
    APPLIED SCIENCES-BASEL, 2024, 14 (03):
  • [29] New Image Steganography Method Based on Haar Discrete Wavelet Transform
    Taouil, Youssef
    Ameur, El Bachir
    Belghiti, Moulay Taib
    EUROPE AND MENA COOPERATION ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGIES, 2017, 520 : 287 - 297
  • [30] Robust Image Steganography Technique Based on Redundant Discrete Wavelet Transform
    Singh, Siddharth
    Siddiqui, Tanveer J.
    2012 2ND INTERNATIONAL CONFERENCE ON POWER, CONTROL AND EMBEDDED SYSTEMS (ICPCES 2012), 2012,