Skip to main content
Log in

Adaptive steganography based on block complexity and matrix embedding

  • Regular Paper
  • Published:
Multimedia Systems Aims and scope Submit manuscript

Abstract

In this paper, an adaptive steganography algorithm based on block complexity and matrix embedding is proposed. The matrix embedding constructed by [8,3], [8,4] [8,5] [8,6] and [8,7] linear codes is taken as the basic embedding strategy. Each block with 2 × 4 pixels is used as a cover unit and its block complexity is computed by neighboring pixel difference. The embedding strategy sets are defined for seven kinds of blocks with different complexity. The corresponding embedding strategies are determined by resolving the embedding risk minimization problem. The adaption manners guarantee that message bits are mainly embedded into the regions with higher complexity values. Experiments are performed and the results show that the proposed method can provide a moderate capacity with lower distortion and have higher resistance ability against the chosen steganalytic algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Lian, S. (ed.): Multimedia Communication Security: Recent Advances. Nova Publishers, New York (2009)

    Google Scholar 

  2. Sencar, H.T., Velastin, S., Nikolaidis, N., Lian, S. (eds.): Intelligent Multimedia Analysis for Security Applications. Springer, New York (2010)

    Google Scholar 

  3. Mielikainen, J.: LSB matching revisited. IEEE Signal Process. Lett. 13(5), 285–287 (2006)

    Article  Google Scholar 

  4. Omoomi, M., Samavi, S., Dumitrescu, S.: An efficient high payload ±1 data embedding scheme. Multimed. Tools Appl. 54(2), 201–218 (2011)

    Article  Google Scholar 

  5. Liu, G.J., Zhan, Z., Dai, Y.W., Lian, S.G.: Improved LSB-matching steganography for preserving second-order statistics. J. Multimed. 5(5), 458–463 (2010)

    Article  Google Scholar 

  6. Kawaguchi, E., Eason, RO.: Principle and applications of BPCS steganography. In: Proceedings SPIE: Multimedia Systems and Applications, vol. 3528, pp. 464–473 (1998)

  7. Wu, D.C., Tsai, W.H.: A steganographic method for images by pixelvalue differencing. Pattern Recogn. Lett. 24(9–10), 1613–1626 (2003)

    Article  MATH  Google Scholar 

  8. Liu, GJ., Wang, JW., Lian, SG., Dai, YW., Wang, ZQ.: Data hiding in neural network prediction errors. Lecture Notes in Computer Scence:ISNN2006, vol. 3973, pp. 273–278 (2006)

  9. Ming, C., Wu, N.I.: A high quality steganographic method with pixelvalue differencing and modulus function. J. Syst. Softw. 81(1), 150–158 (2008)

    Article  Google Scholar 

  10. Zhang, X.P., Wang, S.Z.: Steganography using multiple-base notational system and human vision sensitivity. IEEE Signal Process. Lett. 12(1), 67–70 (2005)

    Article  Google Scholar 

  11. Yang, C.Y., Lin, J.C.: Image hiding by base-oriented algorithm. Opt. Eng. 45(11), 117001-1–117001-10 (2006)

    Google Scholar 

  12. Sabeti, V., Samavi, S., Mahdavi, M., Shirani, S.: Steganalysis of pixel-value differencing steganographic method. In: Proceedings of IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, pp. 292–295 (2007)

  13. Li, B., Fang, Y.M., Huang, J.W.: Steganalysis of multiple-base notational system steganography. IEEE Signal Process. Lett. 15, 493–496 (2008)

    Article  Google Scholar 

  14. Crandall, R.: Some notes on steganography. Posted on steganography mailing list, [Online]. http://os.inf.tu-dresden.de/westfeld/crandall.pdf (1998)

  15. Willems, F., Dijk, M.: Capacity and codes for embedding information in gray-scale signals. IEEE Trans Inf Theory 51(3), 1209–1214 (2005)

    Article  Google Scholar 

  16. Galand, F., Kabatiansky, G.: Information hiding by coverings. In: Proceedings of IEEE Information Theory Workshop, pp. 151–154 (2003)

  17. Westfel, A.: F5- A steganographic algorithm: high capacity despite better steganalysis. In: Proceeding of the 4th Information Hiding Workshop, pp. 289–302 (2001)

  18. Munuera, C.: Steganography and error-correcting codes. Signal Process. 87, 1528–1533 (2007)

    Article  MATH  Google Scholar 

  19. Zhang, W.M., Zhang, X.P., Wang, S.Z.: A double layered “plus-minus one” data embedding scheme. IEEE Signal Process. Lett. 14(11), 848–851 (2007)

    Article  Google Scholar 

  20. Zhang, X.P., Zhang, W.M., Wang, S.Z.: Efficient double-layered steganographic embedding. IET Electr. Lett. 43(8), 482–483 (2007)

    Article  Google Scholar 

  21. Fridrich, J.: Asymptotic behavior of the ZZW embedding construction. IEEE Trans. Inf. Forensics Secur. 4(1), 151–154 (2009)

    Article  Google Scholar 

  22. Zhang, W.M., Wang, X.: Generalization of the ZZW embedding construction for steganography. IEEE Trans. Inf. Forensics Secur. 4(3), 564–569 (2009)

    Article  Google Scholar 

  23. Lu, Y., Li, XL., Yang, B.: A secure steganography: noisy region embedding. In: Proceedings of 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 1046–1051 (2009)

  24. Luo, W.Q., Huang, F.J., Huang, J.W.: Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inf. Forensics Secur. 5(2), 201–214 (2010)

    MathSciNet  Google Scholar 

  25. Filler, T., Judas, J., Fridrich, J.: Minimizing embedding impact in steganography using trellis-coded quantization. In: Proceedings of SPIE, Electronic Imaging, Media Forensics and Security XII, pp. 05-01–05-04 (2010)

  26. Westfeld, A.: High capacity despite better steganalysis (F5-a steganographic algorithm). In: Proceedings of the 4th International Workshop on Information Hiding. Lecture Notes in Computer Science, vol. 2137, pp. 289–302 (2001)

  27. Fridrich, J., Souka, D.: Matrix embedding for large payloads. IEEE Trans. Inf. Forensics Secur. 1(3), 390–394 (2006)

    Article  Google Scholar 

  28. Liu, Q.Z., Sun, A.H., Ribeiro, B., Wei, M.Z., Chen, Z.X., Xu, J.Y.: Image complexity and feature mining for steganalysis of least significant bit matching steganography. Inf Sci 178, 21–36 (2008)

    Article  Google Scholar 

  29. Schaefer, G., Stich, M.: UCID—An uncompressed colour image database. http://vision.cs.aston.ac.uk/datasets/UCID/ucid.html, 2004-12-30/2008-5-21

  30. Ker, A.D.: Steanalysis of LSB matching in grayscale images. IEEE Signal Process. Lett. 12(6), 441–444 (2005)

    Article  Google Scholar 

  31. Pevny, T., Bas, P., Fridrich, J.: Steganalysis by substractive pixel adjacency matrix. IEEE Transact. Inf. Forensics Secur. 5(2), 215–224 (2010)

    Article  Google Scholar 

  32. Tan, S.Q., Li, B.: Targeted steganalysis of edge adaptive image steganography based on LSB matching revisited using B-spline fitting. IEEE Signal Process. Lett. 19(6), 336–339 (2012)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgments

This study was supported by NSF of China (Grant no. 61170250, 61103201) and NSF of Jiangsu province (Grant no. BK2010484).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guangjie Liu.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Liu, G., Liu, W., Dai, Y. et al. Adaptive steganography based on block complexity and matrix embedding. Multimedia Systems 20, 227–238 (2014). https://doi.org/10.1007/s00530-013-0313-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00530-013-0313-5

Keywords

Navigation