A Secure Steganography: Noisy Region Embedding

Generally, the steganographic algorithm randomly selects adequate pixels for data embedding, and the embedding distortion distributes uniformly in cover data. However, uniform embedding is not an ideal approach, because the modification in smooth regions (of an image) is more likely to be perceived than in noisy regions. In this paper, in order to achieve a higher level of security, we propose a novel steganographic scheme in which the embedding modification is carried out in noisy regions. The experiments in which we compare the novel scheme with some state-of-the-art steganographic algorithms support our argument. In addition, the proposed algorithm is computationally efficient for both encoding and decoding, and suitable for practical applications.

[1]  Jessica J. Fridrich,et al.  Matrix embedding for large payloads , 2006, IEEE Trans. Inf. Forensics Secur..

[2]  Frank Y. Shih,et al.  Digital Watermarking and Steganography: Fundamentals and Techniques , 2007 .

[3]  Sorina Dumitrescu,et al.  Detection of LSB Steganography via Sample Pair Analysis , 2002, Information Hiding.

[4]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[5]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[6]  Jessica J. Fridrich,et al.  Wet paper codes with improved embedding efficiency , 2006, IEEE Transactions on Information Forensics and Security.

[7]  Jessica J. Fridrich,et al.  Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..

[8]  Andrew D. Ker A General Framework for Structural Steganalysis of LSB Replacement , 2005, Information Hiding.

[9]  Weiming Zhang,et al.  A Double Layered “Plus-Minus One” Data Embedding Scheme , 2007, IEEE Signal Processing Letters.

[10]  Jessica J. Fridrich,et al.  Writing on wet paper , 2005, IEEE Transactions on Signal Processing.

[11]  Xiaolin Wu,et al.  A new framework of LSB steganalysis of digital media , 2005, IEEE Transactions on Signal Processing.

[12]  Toby Sharp,et al.  An Implementation of Key-Based Digital Signal Steganography , 2001, Information Hiding.

[13]  Andrew D. Ker A Fusion of Maximum Likelihood and Structural Steganalysis , 2007, Information Hiding.

[14]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[15]  Weiming Zhang,et al.  Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes , 2008, Information Hiding.

[16]  Bin Li,et al.  Textural features based universal steganalysis , 2008, Electronic Imaging.

[17]  Weiming Zhang,et al.  Improving Embedding Efficiency of Covering Codes for Applications in Steganography , 2007, IEEE Communications Letters.

[18]  Siwei Lyu,et al.  Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.

[19]  Jessica J. Fridrich,et al.  New blind steganalysis and its implications , 2006, Electronic Imaging.

[20]  Min Wu,et al.  Noise Features for Image Tampering Detection and Steganalysis , 2007, 2007 IEEE International Conference on Image Processing.

[21]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.