Skip to main content

2014 | OriginalPaper | Buchkapitel

Steganography Based on Adaptive Pixel-Value Differencing Scheme Revisited

verfasst von : Hong Zhang, Qingxiao Guan, Xianfeng Zhao

Erschienen in: Digital-Forensics and Watermarking

Verlag: Springer Berlin Heidelberg

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The adaptive pixel-value differencing (APVD) based steganography proposed by Luo et al. is a state-of-the-art steganographic approach in spatial domain. It can resist blind steganalysis but is vulnerable to the targeted attack proposed by Tan et al. In this paper, we introduce an improved version of APVD. Like APVD, we also first divide an image into some non-overlapping squares and then rotate each of them by a random degree of 0, 90, 180 or 270. For an embedding unit constructed with three consecutive pixels of the resulting image, we randomly select one pixel of it for data embedding. Furthermore, the local statistical features are well preserved by exploiting neighborhood information of pixels. The experimental results evaluated on a large image database reveal that our method makes a significant improvement against the APVD-specific steganalytic attack, and has an impressive performance on resisting blind steganalysis compared with previous PVD-based steganographic methods.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
T is a threshold and has an initialized value of 32 in this work.
 
2
We set \( k = 4 \) in this paper.
 
Literatur
1.
Zurück zum Zitat Solanki, K., Sarkar, A., Manjunath, B.S.: YASS: yet another steganographic scheme that resists blind steganalysis. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 16–31. Springer, Heidelberg (2008)CrossRef Solanki, K., Sarkar, A., Manjunath, B.S.: YASS: yet another steganographic scheme that resists blind steganalysis. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 16–31. Springer, Heidelberg (2008)CrossRef
2.
Zurück zum Zitat Luo, W., Huang, F., Huang, J.: A more secure steganography based on adaptive pixel-value differencing scheme. Multimed. Tools Appl. 52, 407–430 (2011)CrossRef Luo, W., Huang, F., Huang, J.: A more secure steganography based on adaptive pixel-value differencing scheme. Multimed. Tools Appl. 52, 407–430 (2011)CrossRef
3.
Zurück zum Zitat Li, B., Huang, J., Shi, Y.Q.: Steganalysis of YASS. IEEE Trans. Inf. Forensics Secur. 4(3), 369–382 (2009)CrossRef Li, B., Huang, J., Shi, Y.Q.: Steganalysis of YASS. IEEE Trans. Inf. Forensics Secur. 4(3), 369–382 (2009)CrossRef
4.
Zurück zum Zitat Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB steganography via sample pair analysis. IEEE Trans. Signal Process. 51(7), 1995–2007 (2003)CrossRef Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB steganography via sample pair analysis. IEEE Trans. Signal Process. 51(7), 1995–2007 (2003)CrossRef
5.
Zurück zum Zitat Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in color and gray-scale images. Magazine of IEEE Multimedia, Special Issue on Security, October–November Issue, pp. 22–28 (2001) Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in color and gray-scale images. Magazine of IEEE Multimedia, Special Issue on Security, October–November Issue, pp. 22–28 (2001)
6.
Zurück zum Zitat Sallee, P.: Model-based methods for stenography and steganalysis. Int. J. Image Graphics 5(1), 167–190 (2005)CrossRef Sallee, P.: Model-based methods for stenography and steganalysis. Int. J. Image Graphics 5(1), 167–190 (2005)CrossRef
7.
Zurück zum Zitat Fridrich, J., Goljan, M., Hogea, D.: Attacking the OutGuess. In: Proceedings of ACM: Special Session on Multimedia Security and Watermarking, Juan-les-Pins, France (2002) Fridrich, J., Goljan, M., Hogea, D.: Attacking the OutGuess. In: Proceedings of ACM: Special Session on Multimedia Security and Watermarking, Juan-les-Pins, France (2002)
8.
Zurück zum Zitat Wu, D.C., Tsai, W.H.: A steganographic method for images by pixel-value differencing. Pattern Recognit. Lett. 24(9–10), 1613–1626 (2003)CrossRefMATH Wu, D.C., Tsai, W.H.: A steganographic method for images by pixel-value differencing. Pattern Recognit. Lett. 24(9–10), 1613–1626 (2003)CrossRefMATH
9.
Zurück zum Zitat Zhang, X., Wang, S.: Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recognit. Lett. 25(3), 331–339 (2004)CrossRef Zhang, X., Wang, S.: Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recognit. Lett. 25(3), 331–339 (2004)CrossRef
10.
Zurück zum Zitat Wu, H.C., Wu, N.I., Tsai, C.S., Hwang, M.S.: Image steganographic scheme based on pixel-value differencing and LSB replacement methods. Proc. Inst. Elect. Eng., Vis. Images Signal Process. 152(5), 611–615 (2005)CrossRef Wu, H.C., Wu, N.I., Tsai, C.S., Hwang, M.S.: Image steganographic scheme based on pixel-value differencing and LSB replacement methods. Proc. Inst. Elect. Eng., Vis. Images Signal Process. 152(5), 611–615 (2005)CrossRef
11.
12.
Zurück zum Zitat Yang, C.-H., Weng, C.-Y., Wang, S.-J., Sun, H.-M.: Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans. Inf. Forensics Secur. 3(3), 488–497 (2008)CrossRef Yang, C.-H., Weng, C.-Y., Wang, S.-J., Sun, H.-M.: Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans. Inf. Forensics Secur. 3(3), 488–497 (2008)CrossRef
13.
Zurück zum Zitat Tan, S., Li, B.: Targeted steganalysis of adaptive pixel-value differencing steganography. In: 2012 19th IEEE International Conference on Image Processing (ICIP), 30 September 2012–3 October 2012, pp. 1129–1132 (2012) Tan, S., Li, B.: Targeted steganalysis of adaptive pixel-value differencing steganography. In: 2012 19th IEEE International Conference on Image Processing (ICIP), 30 September 2012–3 October 2012, pp. 1129–1132 (2012)
14.
Zurück zum Zitat Bas, P., Filler, T., Pevný, T.: “Break our steganographic system”: the ins and outs of organizing BOSS. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 59–70. Springer, Heidelberg (2011)CrossRef Bas, P., Filler, T., Pevný, T.: “Break our steganographic system”: the ins and outs of organizing BOSS. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 59–70. Springer, Heidelberg (2011)CrossRef
16.
Zurück zum Zitat Ker, A.D., Böhme, R.: Revisiting weighted stego-image steganalysis. In: Delp, E.J., Wong, P.W. (eds.) Proceedings SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, 27–31 January 2008, vol. 6819, pp. 51–517 (2008) Ker, A.D., Böhme, R.: Revisiting weighted stego-image steganalysis. In: Delp, E.J., Wong, P.W. (eds.) Proceedings SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, 27–31 January 2008, vol. 6819, pp. 51–517 (2008)
17.
Zurück zum Zitat Pevny, T., Bas, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. In: Proceedings of the 11th ACM Multimedia and Security Workshop, Princeton, NJ, 7–8 September 2009, pp. 75–84 (2009) Pevny, T., Bas, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. In: Proceedings of the 11th ACM Multimedia and Security Workshop, Princeton, NJ, 7–8 September 2009, pp. 75–84 (2009)
Metadaten
Titel
Steganography Based on Adaptive Pixel-Value Differencing Scheme Revisited
verfasst von
Hong Zhang
Qingxiao Guan
Xianfeng Zhao
Copyright-Jahr
2014
Verlag
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-662-43886-2_3

Premium Partner