Abstract
In this paper, an adaptive steganography algorithm based on block complexity and matrix embedding is proposed. The matrix embedding constructed by [8,3], [8,4] [8,5] [8,6] and [8,7] linear codes is taken as the basic embedding strategy. Each block with 2 × 4 pixels is used as a cover unit and its block complexity is computed by neighboring pixel difference. The embedding strategy sets are defined for seven kinds of blocks with different complexity. The corresponding embedding strategies are determined by resolving the embedding risk minimization problem. The adaption manners guarantee that message bits are mainly embedded into the regions with higher complexity values. Experiments are performed and the results show that the proposed method can provide a moderate capacity with lower distortion and have higher resistance ability against the chosen steganalytic algorithms.
Similar content being viewed by others
References
Lian, S. (ed.): Multimedia Communication Security: Recent Advances. Nova Publishers, New York (2009)
Sencar, H.T., Velastin, S., Nikolaidis, N., Lian, S. (eds.): Intelligent Multimedia Analysis for Security Applications. Springer, New York (2010)
Mielikainen, J.: LSB matching revisited. IEEE Signal Process. Lett. 13(5), 285–287 (2006)
Omoomi, M., Samavi, S., Dumitrescu, S.: An efficient high payload ±1 data embedding scheme. Multimed. Tools Appl. 54(2), 201–218 (2011)
Liu, G.J., Zhan, Z., Dai, Y.W., Lian, S.G.: Improved LSB-matching steganography for preserving second-order statistics. J. Multimed. 5(5), 458–463 (2010)
Kawaguchi, E., Eason, RO.: Principle and applications of BPCS steganography. In: Proceedings SPIE: Multimedia Systems and Applications, vol. 3528, pp. 464–473 (1998)
Wu, D.C., Tsai, W.H.: A steganographic method for images by pixelvalue differencing. Pattern Recogn. Lett. 24(9–10), 1613–1626 (2003)
Liu, GJ., Wang, JW., Lian, SG., Dai, YW., Wang, ZQ.: Data hiding in neural network prediction errors. Lecture Notes in Computer Scence:ISNN2006, vol. 3973, pp. 273–278 (2006)
Ming, C., Wu, N.I.: A high quality steganographic method with pixelvalue differencing and modulus function. J. Syst. Softw. 81(1), 150–158 (2008)
Zhang, X.P., Wang, S.Z.: Steganography using multiple-base notational system and human vision sensitivity. IEEE Signal Process. Lett. 12(1), 67–70 (2005)
Yang, C.Y., Lin, J.C.: Image hiding by base-oriented algorithm. Opt. Eng. 45(11), 117001-1–117001-10 (2006)
Sabeti, V., Samavi, S., Mahdavi, M., Shirani, S.: Steganalysis of pixel-value differencing steganographic method. In: Proceedings of IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, pp. 292–295 (2007)
Li, B., Fang, Y.M., Huang, J.W.: Steganalysis of multiple-base notational system steganography. IEEE Signal Process. Lett. 15, 493–496 (2008)
Crandall, R.: Some notes on steganography. Posted on steganography mailing list, [Online]. http://os.inf.tu-dresden.de/westfeld/crandall.pdf (1998)
Willems, F., Dijk, M.: Capacity and codes for embedding information in gray-scale signals. IEEE Trans Inf Theory 51(3), 1209–1214 (2005)
Galand, F., Kabatiansky, G.: Information hiding by coverings. In: Proceedings of IEEE Information Theory Workshop, pp. 151–154 (2003)
Westfel, A.: F5- A steganographic algorithm: high capacity despite better steganalysis. In: Proceeding of the 4th Information Hiding Workshop, pp. 289–302 (2001)
Munuera, C.: Steganography and error-correcting codes. Signal Process. 87, 1528–1533 (2007)
Zhang, W.M., Zhang, X.P., Wang, S.Z.: A double layered “plus-minus one” data embedding scheme. IEEE Signal Process. Lett. 14(11), 848–851 (2007)
Zhang, X.P., Zhang, W.M., Wang, S.Z.: Efficient double-layered steganographic embedding. IET Electr. Lett. 43(8), 482–483 (2007)
Fridrich, J.: Asymptotic behavior of the ZZW embedding construction. IEEE Trans. Inf. Forensics Secur. 4(1), 151–154 (2009)
Zhang, W.M., Wang, X.: Generalization of the ZZW embedding construction for steganography. IEEE Trans. Inf. Forensics Secur. 4(3), 564–569 (2009)
Lu, Y., Li, XL., Yang, B.: A secure steganography: noisy region embedding. In: Proceedings of 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 1046–1051 (2009)
Luo, W.Q., Huang, F.J., Huang, J.W.: Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inf. Forensics Secur. 5(2), 201–214 (2010)
Filler, T., Judas, J., Fridrich, J.: Minimizing embedding impact in steganography using trellis-coded quantization. In: Proceedings of SPIE, Electronic Imaging, Media Forensics and Security XII, pp. 05-01–05-04 (2010)
Westfeld, A.: High capacity despite better steganalysis (F5-a steganographic algorithm). In: Proceedings of the 4th International Workshop on Information Hiding. Lecture Notes in Computer Science, vol. 2137, pp. 289–302 (2001)
Fridrich, J., Souka, D.: Matrix embedding for large payloads. IEEE Trans. Inf. Forensics Secur. 1(3), 390–394 (2006)
Liu, Q.Z., Sun, A.H., Ribeiro, B., Wei, M.Z., Chen, Z.X., Xu, J.Y.: Image complexity and feature mining for steganalysis of least significant bit matching steganography. Inf Sci 178, 21–36 (2008)
Schaefer, G., Stich, M.: UCID—An uncompressed colour image database. http://vision.cs.aston.ac.uk/datasets/UCID/ucid.html, 2004-12-30/2008-5-21
Ker, A.D.: Steanalysis of LSB matching in grayscale images. IEEE Signal Process. Lett. 12(6), 441–444 (2005)
Pevny, T., Bas, P., Fridrich, J.: Steganalysis by substractive pixel adjacency matrix. IEEE Transact. Inf. Forensics Secur. 5(2), 215–224 (2010)
Tan, S.Q., Li, B.: Targeted steganalysis of edge adaptive image steganography based on LSB matching revisited using B-spline fitting. IEEE Signal Process. Lett. 19(6), 336–339 (2012)
Acknowledgments
This study was supported by NSF of China (Grant no. 61170250, 61103201) and NSF of Jiangsu province (Grant no. BK2010484).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Liu, G., Liu, W., Dai, Y. et al. Adaptive steganography based on block complexity and matrix embedding. Multimedia Systems 20, 227–238 (2014). https://doi.org/10.1007/s00530-013-0313-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00530-013-0313-5