An OMP Steganographic Algorithm Optimized by SFLA

In this paper, we propose a novel steganographic method, which utilizes the sparsity and integrity of the image compressed sensing to reduce the risk of being detected by steganalysis. In the proposed algorithm, the message hiding process is integrated into the image sparse decomposition process without affecting the image perceptibility. First, the cover image is decomposed by the orthogonal matching pursuit algorithm of image sparse decomposition, and the shuffled frog leaping algorithm (SFLA) is used to select the optimal atom in each decomposition iteration. Then, different quantization bits are adopted to quantify the sparse decomposition coefficients. Finally, via LSB±k steganographic strategy, the secret message is embedded in the least significant bits of the quantized coefficients. Experimental results show that the embedded data are invisible perceptually. Simultaneously, experiments show that the new steganography has good expandability in embedding capacity, owing to less sensitivity to the em...

[1]  Pachiyappan Arulmozhivarman,et al.  High security image steganography using IWT and graph theory , 2013, 2013 IEEE International Conference on Signal and Image Processing Applications.

[2]  Chin-Chen Chang,et al.  Second-order steganographic method based on adaptive reference matrix , 2015, IET Image Process..

[3]  Toby Sharp,et al.  An Implementation of Key-Based Digital Signal Steganography , 2001, Information Hiding.

[4]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[5]  Shahrokh Ghaemmaghami,et al.  Colour image steganography method based on sparse representation , 2015, IET Image Process..

[6]  Li-Hua Gong,et al.  Novel image compression–encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing , 2014 .

[7]  Saeed R. Khosravirad,et al.  Closure of sets: A statistically hypersensitive system for steganalysis of least significant bit embedding , 2011 .

[8]  Tomás Pevný,et al.  Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..

[9]  Wang Liang-jun,et al.  Advances in Theory and Application of Compressed Sensing , 2009 .

[10]  Mauro Barni,et al.  MPSteg-color: A New Steganographic Technique for Color Images , 2007, Information Hiding.

[11]  Yun Q. Shi,et al.  Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.

[12]  Kevin E Lansey,et al.  Optimization of Water Distribution Network Design Using the Shuffled Frog Leaping Algorithm , 2003 .

[13]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[14]  Xinxin Niu,et al.  Non-uniform Quantization in Breaking HUGO , 2013, IWDW.

[15]  Mauro Barni,et al.  MPSteg-Color: Data Hiding Through Redundant Basis Decomposition , 2009, IEEE Transactions on Information Forensics and Security.

[16]  Chin-Chen Chang,et al.  A multi-threshold secret image sharing scheme based on MSP , 2012, Pattern Recognit. Lett..

[17]  Jignesh N. Sarvaiya,et al.  Image reconstruction using Orthogonal Matching Pursuit (OMP) algorithm , 2014, 2014 2nd International Conference on Emerging Technology Trends in Electronics, Communication and Networking.

[18]  Florent Retraint,et al.  Statistical Model of Quantized DCT Coefficients: Application in the Steganalysis of Jsteg Algorithm , 2014, IEEE Transactions on Image Processing.

[19]  Ja-Chen Lin,et al.  Reversible JPEG-Based Hiding Method with High Hiding-Ratio , 2010, Int. J. Pattern Recognit. Artif. Intell..

[20]  Xuezeng Pan,et al.  A lossless robust data hiding scheme , 2010, Pattern Recognit..

[21]  Andrew D. Ker Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.

[22]  Li Zhang,et al.  Supervised locally linear embedding algorithm based on orthogonal matching pursuit , 2015, IET Image Process..

[23]  Jun Yu,et al.  Capacity Limits of Pseudorandom Channels in Deception Problems , 2015, IEEE Transactions on Information Forensics and Security.

[24]  Kuo-Chen Wu,et al.  Steganography Using Reversible Texture Synthesis , 2015, IEEE Transactions on Image Processing.