Adaptive steganography based on block complexity and matrix embedding

In this paper, an adaptive steganography algorithm based on block complexity and matrix embedding is proposed. The matrix embedding constructed by [8,3], [8,4] [8,5] [8,6] and [8,7] linear codes is taken as the basic embedding strategy. Each block with 2 × 4 pixels is used as a cover unit and its block complexity is computed by neighboring pixel difference. The embedding strategy sets are defined for seven kinds of blocks with different complexity. The corresponding embedding strategies are determined by resolving the embedding risk minimization problem. The adaption manners guarantee that message bits are mainly embedded into the regions with higher complexity values. Experiments are performed and the results show that the proposed method can provide a moderate capacity with lower distortion and have higher resistance ability against the chosen steganalytic algorithms.

[1]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[2]  Andreas Westfeld,et al.  F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .

[3]  Sergio A. Velastin,et al.  Intelligent Multimedia Analysis for Security Applications , 2012, Intelligent Multimedia Analysis for Security Applications.

[4]  Xiaolong Li,et al.  A Secure Steganography: Noisy Region Embedding , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[5]  Gerald Schaefer,et al.  UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.

[6]  HwangMin-Shiang,et al.  A high quality steganographic method with pixel-value differencing and modulus function , 2008 .

[7]  Tomás Pevný,et al.  Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.

[8]  Jessica J. Fridrich,et al.  Minimizing embedding impact in steganography using trellis-coded quantization , 2010, Electronic Imaging.

[9]  Qingzhong Liu,et al.  Image complexity and feature mining for steganalysis of least significant bit matching steganography , 2008, Inf. Sci..

[10]  Eiji Kawaguchi,et al.  Principles and applications of BPCS steganography , 1999, Other Conferences.

[11]  Wen-Hsiang Tsai,et al.  A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..

[12]  Sorina Dumitrescu,et al.  An efficient high payload ±1 data embedding scheme , 2011, Multimedia Tools and Applications.

[13]  Tomás Pevný,et al.  Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..

[14]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[15]  Yuewei Dai,et al.  Data Hiding in Neural Network Prediction Errors , 2006, ISNN.

[16]  Bin Li,et al.  Targeted Steganalysis of Edge Adaptive Image Steganography Based on LSB Matching Revisited Using B-Spline Fitting , 2012, IEEE Signal Processing Letters.

[17]  S. Samavi,et al.  Steganalysis of Pixel-Value Differencing Steganographic Method , 2007, 2007 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing.

[18]  Jessica J. Fridrich,et al.  Matrix embedding for large payloads , 2006, IEEE Transactions on Information Forensics and Security.

[19]  Bin Li,et al.  Steganalysis of Multiple-Base Notational System Steganography , 2008, IEEE Signal Processing Letters.

[20]  Weiming Zhang,et al.  Generalization of the ZZW Embedding Construction for Steganography , 2009, IEEE Transactions on Information Forensics and Security.

[21]  Ja-Chen Lin,et al.  Image hiding by base-oriented algorithm , 2006 .

[22]  Weiming Zhang,et al.  A Double Layered “Plus-Minus One” Data Embedding Scheme , 2007, IEEE Signal Processing Letters.

[23]  Andrew D. Ker Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.

[24]  Jiwu Huang,et al.  Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.

[25]  Yuewei Dai,et al.  Improved LSB-matching Steganography for Preserving Second-order Statistics , 2010, J. Multim..

[26]  Xinpeng Zhang,et al.  Steganography using multiple-base notational system and human vision sensitivity , 2005, IEEE Signal Process. Lett..

[27]  Marten van Dijk,et al.  Capacity and codes for embedding information in gray-scale signals , 2005, IEEE Transactions on Information Theory.

[28]  Carlos Munuera,et al.  Steganography and error-correcting codes , 2007, Signal Process..

[29]  Jessica J. Fridrich,et al.  Asymptotic Behavior of the ZZW Embedding Construction , 2009, IEEE Transactions on Information Forensics and Security.

[30]  Xinpeng Zhang,et al.  Efficient double-layered steganographic embedding , 2007 .

[31]  R. Crandall,et al.  Some Notes on Steganography , 1999 .

[32]  Gregory A. Kabatiansky,et al.  Information hiding by coverings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).