期刊文献+

利用自适应像素对匹配的图像纹理区隐写 被引量:2

Texture-Based Image Steganography Using Adaptive Pixel Pair Matching
下载PDF
导出
摘要 图像纹理区结构随机性较强,因此在纹理丰富区域嵌入隐蔽信息比在平坦区域嵌入的安全性更高.提出一种基于自适应像素对匹配法(adaptive pixel pairmatching,APPM)的纹理区隐写算法,优先在复杂纹理区嵌入密信.定义了图像纹理区域判别准则,由此根据待嵌入秘密信息的长度调整阈值,实现自适应隐写.在嵌入过程中可能出现嵌密块纹理复杂度小于阈值的异常情况,为解决这一问题,算法包含了基于最小失真的像素值局部调整策略.实验结果表明,该算法的嵌入效率高于原始APPM算法,而且KL距离较小,抵抗几种常用隐写分析算法的能力也比其他几种代表性算法LSB和APPM更强. Compared with flat regions,texture-rich regions in an image are more randomlike,and therefore are more secure for hidden messages.Based on the adaptive pixel pair matching(APPM) scheme,we propose an improved steganographic algorithm that embeds secret data preferentially in texture regions.A criterion for image texture assessment is defined.According to the length of secret data,We use the the criterion to adaptively select appropriate regions for embedding.A pixel value adjustment strategy based on optimizing a minimum distortion function through local search is proposed to deal with possible abnormal situations in embedding.Experimental results show that the proposed algorithm outperforms the original APPM in terms of embedding efficiency and KullbackLeibler divergence.It is also more robust against several representative steganalytic attacks than a number of least significant bits(LSB) algorithms and APPM.
出处 《应用科学学报》 CAS CSCD 北大核心 2016年第5期515-526,共12页 Journal of Applied Sciences
基金 广东省应用型科技研发专项基金(No.2015B010130003) 广州市科技项目基金(No.201510010275) 广州市人体数据科学重点实验室项目基金(No.201605030011)资助
关键词 自适应像素对匹配法 图像纹理 安全性 KL距离 adaptive pixel pair matching(APPM) image texture security KullbackLeibler divergence
  • 相关文献

参考文献19

  • 1Mielikainen J. LSB matching revisited [J]. IEEE on Signal Processing Letters, 2006, 13(5): 285-287.
  • 2Omoomi M, Samavi S, Dumitrescu S. An efficient high payload±1 data embedding scheme[J]. Multimedia Tools and Applications, 2011, 54(2): 201-218.
  • 3Zhang X, Wang S. Efficient steganographic embedding by exploiting modification direction [J]. IEEE Communications Letters, 2006, 10(11): 781-783.
  • 4Chao R, Wu H, Lee C. A novel image datahiding scheme with diamond encoding [J]. Eurasip Journal on Information Security, 2009, 2009(1): 1-9.
  • 5Hong W, Chen T. A novel data embedding method using adaptive pixel pair matching [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(1): 176-184.
  • 6Luo W, Huang F, Huang J. Edge adaptive image steganography based on LSB matching revisited [J]. IEEE Transactions on Information Forensics and Security, 2010, 5(2): 201-214.
  • 7Cachin C. An information-theoretic model for steganography [J]. Information and Computation, 2004, 192(1): 41-56.
  • 8Aucsmith D. Information hiding [M]. Berlin Heidelberg: Springer, 1998: 306-318.
  • 9Fridrich J, Kodovsky J. Rich models for steganalysis of digital images [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(3): 868-882.
  • 10Pevny T, Bas P, Fridrich J. Steganalysis by subtractive pixel adjacency matrix [J]. IEEE Transactions on Information Forensics and Security, 2010, 5(2): 215-224.

二级参考文献14

  • 1Westfeld A, Pfitzmann A. Attacks on steganographic systems [ A]. Proceedings of Third lmemational Workshop, Information Hiding[ C]. Berlin: Springer-Verlag, 2000.61 - 76.
  • 2Filler T, Fridrich J. Fisher information determines capacity of e- secure steganography [ A ]. Proceedings of l lth International Workshop, Information Hiding[ C]. Germany: Darmstadt, 2009. 31 - 47.
  • 3Goljan M, Fridrich J, Holotyak T. New blind steganalysis and its implications [ A ]. Proceedings of SPIE 6072, Security, Steganography, and Watermarking of Multimedia Contents Ⅷ [C] .San Jose,CA: SPIE,2006.1 - 13.
  • 4Harmsen J J, Pearlnlan W A. Steganalysis of additive-noise modelable information hiding[ A]. Proceedings of SPIE 5020, Security and Watermarking of Multimedia Contents V [ C ]. Santa Clara,CA: SPIE,2003. 131 - 142.
  • 5Cancelli G, Doerr G, Cox I J, et al. Dection of ± 1 LSB steganography based on the amplitude of histogram local extrema [ A ]. Proceedings of 15th IEEF, International Conference. Image Processing[C] .San Diego,CA: IEEE,2008.1288 - 1291.
  • 6Pevny T, Bas P, Fridrich J. Steganalysis by subtractive pixel ad- jacency matrix[ J]. IEEE Transactions on Information Forensics and Security,2010,5(2) :215 - 224.
  • 7Mielikainen J. LSB matching revisited [ J]. IEEE Signal Pro- cessing Letters,2006, 13(5) :285 - 287.
  • 8Luo W, Huang F, Huang J. Edge adaptive image steganography based on LSB matching revisited[ J]. IEEE Transactions on In- formation Forensics and Security,2010,5(2):201 -214.
  • 9Tan S, Li B. Targeted steganalysis of edge adaptive image steganography based on LSB matching revisited using B- Spline titling[ J]. IEEE Signal Processing Letters, 2012, 19 (6) :336 - 339.
  • 10Omoomi M, Samavi S, Dumitrescu S. An efficient high pay- load ± 1 data embedding scheme[ J ]. Multimedia Tools and Applications, 2011,54 ( 2 ) : 201 - 218.

共引文献6

同被引文献11

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部