Secure Binary Image Steganography Based on Fused Distortion Measurement

Some state-of-the-art binary image steganographic methods aim to generate stego images with good visual quality, while others focus more on the statistical security of the anti-steganalysis. This paper proposes a binary steganographic scheme that improves both of them by selecting more appropriate flipped pixels. First, a fused distortion measurement is developed that combines the advantages of flipping distortion measurement (FDM) and two data-carrying pixel location methods, including the edge adaptive grid method (EAG) and the “Connectivity Preserving” criterion (CPc). The FDM measures the distortion score by statistical features and achieves high-statistical security, while the EAG and CPc select pixels by analyzing the local texture structures based on visual quality. Then, to eliminate the interference brought by adjacent flipped pixels, a flipping position optimization strategy is proposed to find better positions for flipping pixels to further improve the steganographic performance. Experimental results have demonstrated that the proposed steganographic scheme can achieve stronger statistical security with better visual quality without degrading the embedding capacity.

[1]  Jian Weng,et al.  Steganalysis of content-adaptive binary image data hiding , 2017, J. Vis. Commun. Image Represent..

[2]  Alex ChiChung Kot,et al.  Objective Distortion Measure for Binary Text Image Based on Edge Line Segment Similarity , 2007, IEEE Transactions on Image Processing.

[3]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[4]  Alex ChiChung Kot,et al.  Steganalysis of data hiding in binary text images , 2005, 2005 IEEE International Symposium on Circuits and Systems.

[5]  Josef Pieprzyk,et al.  Blind Steganalysis: A Countermeasure for Binary Image Steganography , 2010, 2010 International Conference on Availability, Reliability and Security.

[6]  Yu-Chee Tseng,et al.  A secure data hiding scheme for binary images , 2002, IEEE Trans. Commun..

[7]  Nasir D. Memon,et al.  Data hiding in binary text documents , 2001, IS&T/SPIE Electronic Imaging.

[8]  Hongbin Zhang,et al.  High Capacity Data Hiding for Binary Image Authentication , 2010, 2010 20th International Conference on Pattern Recognition.

[9]  Wei Lu,et al.  Binary image steganalysis based on pixel mesh Markov transition matrix , 2015, J. Vis. Commun. Image Represent..

[10]  B. Ripley,et al.  Pattern Recognition , 1968, Nature.

[11]  Min Wu,et al.  Data hiding in binary image for authentication and annotation , 2004, IEEE Transactions on Multimedia.

[12]  Haiping Lu,et al.  Secure data hiding in binary document images for authentication , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..

[13]  Josef Pieprzyk,et al.  Estimating Hidden Message Length in Binary Image Embedded by Using Boundary Pixels Steganography , 2010, 2010 International Conference on Availability, Reliability and Security.

[14]  Josef Pieprzyk,et al.  Binary Image Steganographic Techniques Classification Based on Multi-class Steganalysis , 2010, ISPEC.

[15]  Huifang Sun,et al.  Image and Video Compression for Multimedia Engineering: Fundamentals, Algorithms, and Standards , 1999 .

[16]  Alex ChiChung Kot,et al.  Pattern-Based Data Hiding for Binary Image Authentication by Connectivity-Preserving , 2007, IEEE Transactions on Multimedia.

[17]  Haiping Lu,et al.  Distance-reciprocal distortion measure for binary document images , 2004, IEEE Signal Processing Letters.

[18]  Susanto Rahardja,et al.  Orthogonal Data Embedding for Binary Images in Morphological Transform Domain- A High-Capacity Approach , 2008, IEEE Transactions on Multimedia.

[19]  Alex ChiChung Kot,et al.  On Establishing Edge Adaptive Grid for Bilevel Image Data Hiding , 2013, IEEE Transactions on Information Forensics and Security.

[20]  Wei Lu,et al.  Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture , 2015, IEEE Transactions on Information Forensics and Security.