Efficient halftone image steganography based on dispersion degree optimization

被引:0
|
作者
Yingjie Xue
Wanteng Liu
Wei Lu
Yuileong Yeung
Xianjin Liu
Hongmei Liu
机构
[1] Sun Yat-sen University,Guangdong Key Laboratory of Information Security Technology
[2] Chinese Academy of Sciences,State Key Laboratory of Information Security Institute of Information Engineering
来源
关键词
Steganography; Halftone images; Dispersion degree; Efficient;
D O I
暂无
中图分类号
学科分类号
摘要
Halftone images are usually used in facsimile and halftone image steganography can be used for facsimile channel. In recent years, real-time image processing becomes more and more important. In this paper, an efficient block-based steganographic method for halftone images is proposed. This method is based on optimal dispersion degree (DD), which can measure the complexity of the region texture. To reduce the visual distortion, the blocks with complex texture can be selected as carriers according to the dispersion degree. Finally, the secret messages are embedded by flipping the pixels that can minimize the changes of texture structure. The experiments demonstrate that the proposed scheme maintains a good image visual quality and realizes acceptable statistical security with high capacity.
引用
收藏
页码:601 / 609
页数:8
相关论文
共 50 条
  • [31] Dual Image based LSB Steganography
    Maji, Giridhar
    Mandal, Sharmistha
    Sen, Soumya
    Debnath, Narayan C.
    PROCEEDINGS OF 2018 2ND INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN SIGNAL PROCESSING, TELECOMMUNICATIONS & COMPUTING (SIGTELCOM 2018), 2018, : 61 - 66
  • [32] An image steganography scheme based on ResNet
    Liu, Lianshan
    Meng, Lingzhuang
    Wang, Xiaoli
    Peng, Yanjun
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (27) : 39803 - 39820
  • [33] Chaotic coyote optimization algorithm for image encryption and steganography
    Huawei Tong
    Tianyou Li
    Youyun Xu
    Xinzhong Su
    Guopeng Qiao
    Multimedia Tools and Applications, 2024, 83 : 20861 - 20887
  • [34] Context-based lossless halftone image compression
    Denecker, K
    Van Assche, S
    De Neve, P
    Lemahieu, I
    JOURNAL OF ELECTRONIC IMAGING, 1999, 8 (04) : 404 - 414
  • [35] Halftone image encryption based on reversible pairwise swapping
    Chen, Bin
    Luo, Hao
    Zhao, Zhenfei
    Zhang, Xin
    MEASUREMENT, 2014, 57 : 85 - 93
  • [36] Halftone Image Quality Assessment Based on Digital Watermark
    Zhong Yunfei
    Fu Lujing
    Zou Jie
    Deng Ronghua
    ADVANCES IN PRINTING AND PACKAGING TECHNOLOGIES, 2013, 262 : 181 - +
  • [37] An Optimization Approach to the TWPVD Method for Digital Image Steganography
    Grajeda-Marin, Ismael R.
    Montes-Venegas, Hector A.
    Raymundo Marcial-Romero, J.
    Hernandez-Servin, J. A.
    De Ita, Guillermo
    PATTERN RECOGNITION (MCPR 2016), 2016, 9703 : 125 - 134
  • [38] Text Steganography Based on Image Caption
    Xue Y.-M.
    Zhou X.-J.
    Zhou X.-S.
    Niu S.-Z.
    Wen J.
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2018, 41 (06): : 7 - 13
  • [39] Generative Image Steganography Based on GANs
    Wang, Yaojie
    Yang, Xiaoyuan
    Jin, Hengkang
    TRUSTED COMPUTING AND INFORMATION SECURITY, CTCIS 2019, 2020, 1149 : 1 - 15
  • [40] Bayesian Classification of Halftone Image based on Region Covariance
    Wen, Zhiqiang
    Hu, Yongxiang
    Zhu, Wenqiu
    2013 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEM DESIGN AND ENGINEERING APPLICATIONS (ISDEA), 2013, : 398 - 401