Adaptive image steganography using contourlet transform

被引:16
|
作者
Fakhredanesh, Mohammad [1 ]
Rahmati, Mohammad [1 ]
Safabakhsh, Reza [1 ]
机构
[1] Amirkabir Univ Technol, Comp Engn & Informat Technol Dept, Tehran 158754413, Iran
关键词
SCHEME;
D O I
10.1117/1.JEI.22.4.043007
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This work presents adaptive image steganography methods which locate suitable regions for embedding by contourlet transform, while embedded message bits are carried in discrete cosine transform coefficients. The first proposed method utilizes contourlet transform coefficients to select contour regions of the image. In the embedding procedure, some of the contourlet transform coefficients may change which may cause errors at the message extraction phase. We propose a novel iterative procedure to resolve such problems. In addition, we have proposed an improved version of the first method in which it uses an advanced embedding operation to boost its security. Experimental results show that the proposed base method is an imperceptible image steganography method with zero retrieval error rate. Comparisons with other steganography methods which utilize contourlet transform show that our proposed method is able to retrieve all messages perfectly, whereas the others fail. Moreover, the proposed method outperforms the ContSteg method in terms of PSNR and the higher-order statistics steganalysis method. Experimental evaluations of our methods with the well known DCT-based steganography algorithms have demonstrated that our improved method has superior performance in terms of PSNR and SSIM, and is more secure against the steganalysis attack. (C) 2013 SPIE and IS&T
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Image steganography using contourlet transform and matrix decomposition techniques
    Subhedar, Mansi S.
    Mankar, Vijay H.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (15) : 22155 - 22181
  • [2] Image steganography using contourlet transform and matrix decomposition techniques
    Mansi S. Subhedar
    Vijay H. Mankar
    [J]. Multimedia Tools and Applications, 2019, 78 : 22155 - 22181
  • [3] Adaptive Steganography Method Based on Contourlet Transform
    Sajedi, Hedieh
    Jamzad, Mansour
    [J]. ICSP: 2008 9TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, VOLS 1-5, PROCEEDINGS, 2008, : 745 - 748
  • [4] Human visual system based color image steganography using the contourlet transform
    Abdul, W.
    Carre, P.
    Gaborit, P.
    [J]. MEDIA FORENSICS AND SECURITY II, 2010, 7541
  • [5] Effective payload and improved security using HMT Contourlet transform in medical image steganography
    S. Jeevitha
    N. Amutha Prabha
    [J]. Health and Technology, 2020, 10 : 217 - 229
  • [6] Effective payload and improved security using HMT Contourlet transform in medical image steganography
    Jeevitha, S.
    Prabha, N. Amutha
    [J]. HEALTH AND TECHNOLOGY, 2020, 10 (01) : 217 - 229
  • [7] Using contourlet transform and cover selection for secure steganography
    Sajedi, Hedieh
    Jamzad, Mansour
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 9 (05) : 337 - 352
  • [8] Using contourlet transform and cover selection for secure steganography
    Hedieh Sajedi
    Mansour Jamzad
    [J]. International Journal of Information Security, 2010, 9 : 337 - 352
  • [9] Performance Evaluation of Image Steganography based on Cover Selection and Contourlet Transform
    Subhedar, Mansi S.
    Mankar, Vijay H.
    [J]. 2013 INTERNATIONAL CONFERENCE ON CLOUD & UBIQUITOUS COMPUTING & EMERGING TECHNOLOGIES (CUBE 2013), 2013, : 172 - +
  • [10] Adaptive fingerprint image enhancement with contourlet transform
    Cheng, Guang-Quan
    Cheng, Li-Zhi
    [J]. CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 3, PROCEEDINGS, 2008, : 261 - 264