Secure Halftone Image Steganography Based on Pixel Density Transition

被引:24
|
作者
Lu, Wei [1 ]
Xue, Yingjie [1 ]
Yeung, Yuileong [1 ]
Liu, Hongmei [1 ]
Huang, Jiwu [2 ,3 ]
Shi, Yun [4 ]
机构
[1] Sun Yat Sen Univ, Key Lab Machine Intelligence & Adzanced Comp, Guangdong Key Lab Informat Secur Technol, Minist Educ,Sch Data & Comp Sci, Guangzhou 510006, Peoples R China
[2] Shenzhen Univ, Guangdong Key Lab Intelligent Informat Proc, Shenzhen 518060, Peoples R China
[3] Shenzhen Univ, Key Lab Media Secur, Shenzhen 518060, Peoples R China
[4] New Jersey Inst Technol, Dept Elect & Comp Engn, Newark, NJ 07102 USA
基金
中国国家自然科学基金;
关键词
Halftone image steganography; pixel density histogram (PDH); pixel density transition; pixel mesh Markov transition matrix (PMMTM); BINARY IMAGE; AUTHENTICATION; STEGANALYSIS; DISTORTION;
D O I
10.1109/TDSC.2019.2933621
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Most state-of-the-art halftone image steganographic techniques only consider the flipping distortion according to the human visual system, which are not always secure when they are attacked by steganalyzers. In this paper, we propose a halftone image steganographic scheme that aims to generate stego images with good visual quality and strong statistical security of anti-steganalysis. First, the concept of pixel density is proposed and a novel construction called pixel density histogram (PDH) is proposed to design a "+/- 1 embedding" scheme for halftone images. Then, we optimize density pair selection to select density blocks that can improve visual quality. Finally, the messages are embedded through pixel density transition, where a novel pixel flipping strategy is proposed, which can maintain the structural dependence by optimizing the pixel mesh Markov transition matrix (PMMTM). The experimental results demonstrate that the proposed steganography scheme can achieve strong statistical security of anti-steganalysis with good visual quality without degrading the embedding capacity.
引用
收藏
页码:1137 / 1149
页数:13
相关论文
共 50 条
  • [1] Secure halftone image steganography based on density preserving and distortion fusion
    Yu, Mujian
    Yin, Xiaolin
    Liu, Wanteng
    Lu, Wei
    SIGNAL PROCESSING, 2021, 188
  • [2] Halftone Image Steganography with Flippability Measurement Based on Pixel Pairs
    Liu, Wanteng
    Lu, Wei
    Yin, Xiaolin
    Zhang, Junhong
    Yeung, Yuileong
    SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 879 - 890
  • [3] Secure Halftone Image Steganography Based on Feature Space and Layer Embedding
    Lu, Wei
    Chen, Junjia
    Zhang, Junhong
    Huang, Jiwu
    Weng, Jian
    Zhou, Yicong
    IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (06) : 5001 - 5014
  • [4] Secure halftone image steganography with minimizing the distortion on pair swapping
    Liu, Wanteng
    Yin, Xiaolin
    Lu, Wei
    Zhang, Junhong
    Zeng, Jinhua
    Shi, Shaopei
    Mao, Mingzhi
    SIGNAL PROCESSING, 2020, 167 (167)
  • [5] A pixel contrast based medical image steganography to ensure and secure patient data
    Hashim, Mohammed Mahdi
    Mahmood, Ali A.
    Mohammed, Mohammed Q.
    INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2021, 12 : 1885 - 1904
  • [6] Efficient halftone image steganography based on dispersion degree optimization
    Xue, Yingjie
    Liu, Wanteng
    Lu, Wei
    Yeung, Yuileong
    Liu, Xianjin
    Liu, Hongmei
    JOURNAL OF REAL-TIME IMAGE PROCESSING, 2019, 16 (03) : 601 - 609
  • [7] Efficient halftone image steganography based on dispersion degree optimization
    Yingjie Xue
    Wanteng Liu
    Wei Lu
    Yuileong Yeung
    Xianjin Liu
    Hongmei Liu
    Journal of Real-Time Image Processing, 2019, 16 : 601 - 609
  • [8] Adaptive Image Steganography Based on Pixel Selection
    Shen, Qingqing
    Liu, Guangjie
    Liu, Weiwei
    Dai, Yuewei
    PROCEEDINGS OF 2015 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATCS AND COMPUTING (IEEE PIC), 2015, : 623 - 627
  • [9] Secure Key Based Image Realization Steganography
    Samima, Shabnam
    Roy, Ratnakirti
    Changder, Suvamoy
    2013 IEEE SECOND INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), 2013, : 377 - 382
  • [10] A Highly Secure DNA Based Image Steganography
    Das, Prasenjit
    Kar, Nirmalya
    2014 INTERNATIONAL CONFERENCE ON GREEN COMPUTING COMMUNICATION AND ELECTRICAL ENGINEERING (ICGCCEE), 2014,