A new steganography method which preserves histogram: Generalization of LSB++

Histogram-based steganalysis methods diagnose abnormalities in the stego histogram. LSB+ and outguess are two steganography methods which preserve the cover histogram completely. These methods embed some extra bits to retain the cover histogram. However, these techniques adversely affect the statistical and perceptual attributes of the cover media. LSB++ was proposed to improve LSB+ by prohibiting some pixels from changing, resulting in the reduction of the extra bits. In this paper, we improve the LSB++ method by proposing a technique to distinguish sensitive pixels and protect them from extra bit embedding, which causes lower distortion in the co-occurrence matrices. In addition, we extend LSB++ to preserve the DCT coefficients histogram of jpeg images and generalize this method to the case where more than one bit of the cover elements are used. The experimental results show that the improved LSB++ method produces fewer traces in the co-occurrence matrices than the LSB++ method. Furthermore, the histogram based attacks cannot detect stego images produced by the proposed method with or without extra bits embedding. Therefore, the visual quality of the cover can be improved by the elimination of extra bit embedding.

[1]  Karim Faez,et al.  Detection of LSB+/-1 steganography based on co-occurrence matrix and bit plane clipping , 2010, J. Electronic Imaging.

[2]  Cheng-Hsing Yang,et al.  Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.

[3]  Der-Chyuan Lou,et al.  LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis , 2012, Inf. Sci..

[4]  Tung-Shou Chen,et al.  A Novel Data Embedding Method Using Adaptive Pixel Pair Matching , 2012, IEEE Transactions on Information Forensics and Security.

[5]  Anindya Sarkar,et al.  Matrix Embedding With Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography , 2010, IEEE Transactions on Information Forensics and Security.

[6]  Andrew D. Ker Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.

[7]  Chao Guan,et al.  Steganalysis Based on Co-occurrence Matrix of Differential Image , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[8]  Shahrokh Ghaemmaghami,et al.  LSB++: An improvement to LSB+ steganography , 2011, TENCON 2011 - 2011 IEEE Region 10 Conference.

[9]  Yun Q. Shi,et al.  Steganalysis Using High-Dimensional Features Derived from Co-occurrence Matrix and Class-Wise Non-Principal Components Analysis (CNPCA) , 2006, IWDW.

[10]  Shiuh-Jeng Wang,et al.  Data embedding for vector quantization image processing on the basis of adjoining state-codebook mapping , 2013, Inf. Sci..

[11]  Jean-Luc Dugelay,et al.  A Data Mapping Method for Steganography and Its Application to Images , 2008, Information Hiding.

[12]  Reza Safabakhsh,et al.  Adaptive method for hiding data in images , 2012, J. Electronic Imaging.

[13]  Siwei Lyu,et al.  Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.

[14]  Qingzhong Liu,et al.  Image complexity and feature mining for steganalysis of least significant bit matching steganography , 2008, Inf. Sci..

[15]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[16]  Andrew D. Ker Steganalysis of Embedding in Two Least-Significant Bits , 2007, IEEE Transactions on Information Forensics and Security.

[17]  André R. S. Marçal,et al.  A Steganographic Method for Digital Images Robust to RS Steganalysis , 2005, ICIAR.

[18]  Tao Zhang,et al.  Steganalysis of LSB matching based on statistical modeling of pixel difference distributions , 2010, Inf. Sci..

[19]  Mohammad Rahmati,et al.  A Model-Based Image Steganography Method Using Watson’s Visual Model , 2014 .

[20]  Wien Hong,et al.  Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique , 2013, Inf. Sci..

[21]  Hyoung Joong Kim,et al.  Near-optimal solution to pair-wise LSB matching via an immune programming strategy , 2010, Inf. Sci..

[22]  William A. Pearlman,et al.  Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.

[23]  Weiming Zhang,et al.  Fast Matrix Embedding by Matrix Extending , 2012, IEEE Transactions on Information Forensics and Security.

[24]  Rengarajan Amirtharajan,et al.  An intelligent chaotic embedding approach to enhance stego-image quality , 2012, Inf. Sci..

[25]  Jiann-Der Lee,et al.  Lossless data hiding for VQ indices based on neighboring correlation , 2010, 2010 IEEE International Symposium on Industrial Electronics.

[26]  Reza Safabakhsh,et al.  High-capacity method for hiding data in the discrete cosine transform domain , 2013, J. Electronic Imaging.

[27]  Tomás Pevný,et al.  Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..

[28]  Chien-Ping Chang,et al.  High-payload image hiding with quality recovery using tri-way pixel-value differencing , 2012, Inf. Sci..

[29]  Niels Provos,et al.  Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.

[30]  Bin Li,et al.  Targeted Steganalysis of Edge Adaptive Image Steganography Based on LSB Matching Revisited Using B-Spline Fitting , 2012, IEEE Signal Processing Letters.

[31]  Jessica J. Fridrich,et al.  Matrix embedding for large payloads , 2006, IEEE Trans. Inf. Forensics Secur..

[32]  Jiwu Huang,et al.  Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.

[33]  Mohammad Rahmati,et al.  Adaptive image steganography using contourlet transform , 2013, J. Electronic Imaging.

[34]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.