Color local complexity estimation based steganographic (CLCES) method

被引:17
|
作者
Carvajal-Gamez, Blanca E. [1 ]
Gallegos-Funes, Francisco J. [1 ]
Rosales-Silva, Alberto J. [1 ]
机构
[1] Natl Polytech Inst Mexico, Mech & Elect Engn Higher Sch, ESIME SEPI Elect, Mexico City 07738, DF, Mexico
关键词
Steganographic method; Local complexity estimation; Steganalysis; Color spaces; IMAGES;
D O I
10.1016/j.eswa.2012.08.024
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper we present the color local complexity estimation based steganographic (CLCES) method that is able of both preventing visual degradation and providing a large embedding capacity. A preprocessing stage is applied in the proposed scheme to improve the steganography security. The embedding capacity of each pixel is determined by the local complexity of the cover image, allowing good visual quality as well as embedding a large amount of secret messages. We classify the pixels using a threshold based on the standard deviation of the local complexity in the cover image to provide a compromise between the embedding capacity and the image visual quality. The experimental results demonstrated that the algorithm CLCES proposed produces insignificant visual distortion due to the hidden message. It provides a high embedding capacity that is superior respect to the offered by the existing schemes. The proposed method is a secure steganographic algorithm; it can resist the image quality measures (IQM) steganalysis attack. The RGB, YCbCr, and HSV color spaces are incorporated in the proposed scheme to ensure that the difference between the cover image and the stego-image which is indistinguishable by the human visual system (HVS). Finally, the proposed scheme is simple, efficient, and feasible for the adaptive steganographic applications. (C) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1132 / 1142
页数:11
相关论文
共 50 条
  • [31] An Adaptive JPEG Steganographic Scheme Based on Run-Length Statistical Complexity
    WEN Juan
    ZHANG Jie
    ZHOU Jie
    LI Yan
    XUE Yiming
    Chinese Journal of Electronics, 2018, 27 (01) : 52 - 59
  • [32] An Adaptive JPEG Steganographic Scheme Based on Run-Length Statistical Complexity
    Wen Juan
    Zhang Jie
    Zhou Jie
    Li Yan
    Xue Yiming
    CHINESE JOURNAL OF ELECTRONICS, 2018, 27 (01) : 52 - 59
  • [33] A Steganographic method based on DCT and new quantization technique
    Sakr, Ahmed Saber
    Ibrahem, Hani Mohamed
    Abdullkader, Hatem M.
    Amin, Mohamed
    2012 22ND INTERNATIONAL CONFERENCE ON COMPUTER THEORY AND APPLICATIONS (ICCTA), 2012, : 187 - 191
  • [34] An Improved Steganographic Technique Based on Diamond Encoding Method
    Haque, Md. Mokammel
    Sheikh, Jobayer
    Al Rashid, Md. Jihan
    2017 INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION ENGINEERING (ECCE), 2017, : 583 - 588
  • [35] Undetectable steganographic method for palette-based images
    Wu, Han-Yan
    Chen, Ling-Hwei
    Ching, Yu-Tai
    JOURNAL OF ELECTRONIC IMAGING, 2020, 29 (06)
  • [36] A New Steganographic Method Based on Equivalence Class Partition
    Liu, Shaohui
    Chen, Yong
    Jiang, Feng
    Yao, Hongxun
    JOURNAL OF COMPUTATIONAL AND THEORETICAL NANOSCIENCE, 2012, 9 (10) : 1757 - 1765
  • [37] An adaptive denoising method based on local mode estimation
    Wang, Yuehong
    Sun, Xusheng
    Zhang, Jin
    Rong, Gang
    2005 27TH ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY, VOLS 1-7, 2005, : 6555 - 6558
  • [38] A nonlinear adaptive estimation method based on local approximation
    Iiguni, Y
    Kawamoto, I
    Adachi, N
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 1997, 45 (07) : 1831 - 1841
  • [39] High capacity steganographic method based upon JPEG
    Almohammad, Adel
    Hierons, Robert M.
    Ghinea, Gheorghita
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 544 - +
  • [40] AIPISteg: An active IP identification based steganographic method
    Abdullaziz, Osamah Ibrahiem
    Goh, Vik Tor
    Ling, Huo-Chong
    Wong, KokSheik
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 63 : 150 - 158