Efficient halftone image steganography based on dispersion degree optimization

被引:0
|
作者
Yingjie Xue
Wanteng Liu
Wei Lu
Yuileong Yeung
Xianjin Liu
Hongmei Liu
机构
[1] Sun Yat-sen University,Guangdong Key Laboratory of Information Security Technology
[2] Chinese Academy of Sciences,State Key Laboratory of Information Security Institute of Information Engineering
来源
关键词
Steganography; Halftone images; Dispersion degree; Efficient;
D O I
暂无
中图分类号
学科分类号
摘要
Halftone images are usually used in facsimile and halftone image steganography can be used for facsimile channel. In recent years, real-time image processing becomes more and more important. In this paper, an efficient block-based steganographic method for halftone images is proposed. This method is based on optimal dispersion degree (DD), which can measure the complexity of the region texture. To reduce the visual distortion, the blocks with complex texture can be selected as carriers according to the dispersion degree. Finally, the secret messages are embedded by flipping the pixels that can minimize the changes of texture structure. The experiments demonstrate that the proposed scheme maintains a good image visual quality and realizes acceptable statistical security with high capacity.
引用
收藏
页码:601 / 609
页数:8
相关论文
共 50 条
  • [41] Binary image steganography based on permutation
    Juvet Karnel Sadié
    Stéphane Gael R. Ekodeck
    René Ndoundam
    Iran Journal of Computer Science, 2023, 6 (4) : 321 - 332
  • [42] Steganography based image sharing with reversibility
    Sirisha, B. Lakshmi
    Kumar, S. Srinivas
    Mohan, B. Chandra
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2016, 19 (01): : 67 - 80
  • [43] Edge-based image steganography
    Islam, Saiful
    Modi, Mangat R.
    Gupta, Phalguni
    EURASIP JOURNAL ON INFORMATION SECURITY, 2014, Springer International Publishing (01):
  • [44] Palette Based Technique for Image Steganography
    Lamgunde, Anuradha
    Kale, Achana
    ADVANCES IN COMPUTING, COMMUNICATION AND CONTROL, 2011, 125 : 364 - +
  • [45] IMAGE-BASED JPEG STEGANOGRAPHY
    Jokay, Matus
    Moravcik, Tomas
    NILCRYPT 10, 2010, 45 : 65 - 74
  • [46] Saliency Map Based Image Steganography
    Singh, Rama Kant
    Lall, Brejesh
    PROCEEDINGS OF 2013 28TH INTERNATIONAL CONFERENCE ON IMAGE AND VISION COMPUTING NEW ZEALAND (IVCNZ 2013), 2013, : 430 - 435
  • [47] An image steganography scheme based on ResNet
    Lianshan Liu
    Lingzhuang Meng
    Xiaoli Wang
    Yanjun Peng
    Multimedia Tools and Applications, 2022, 81 : 39803 - 39820
  • [48] Satellite Image Steganography using High degree Compressed Embedding Technique
    Rohith, G.
    Bhuvaneswari, M.
    Nithyapriya, S.
    Kannaki, S.
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 181 - 187
  • [49] Latent Vector Optimization-Based Generative Image Steganography for Consumer Electronic Applications
    Zhou, Zhili
    Bao, Zhipeng
    Jiang, Weiwei
    Huang, Yuan
    Peng, Yun
    Shankar, Achyut
    Maple, Carsten
    Selvarajan, Shitharth
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 4357 - 4366
  • [50] A sparse representation based image steganography using Particle Swarm Optimization and wavelet transform
    Nipanikar, S. I.
    Deepthi, V. Hima
    Kulkarni, Nikita
    ALEXANDRIA ENGINEERING JOURNAL, 2018, 57 (04) : 2343 - 2356