Skip to main content
Log in

New cubic reference table based image steganography

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Tradition reference table based (RTB) methods employ two pixels to conceal a secret digit according to a two-dimensional reference table. In this paper, x-dimensional reference table framework is defined, which can be regarded as generalization of the prior works. The available pixels to be embedded are limited in two-dimensional space, so the proposed methods extend the dimensional space of reference table. Theoretical analyses are given to justify the effectiveness of the proposed construction. Two novel RTB methods named CRT (cubic reference table) and CRT-PVD (cubic reference table and pixel value differencing) are presented. The former is independent of image contents while embedding, and the latter is depended on the discriminated image smoothness. Experimental results show that two proposed methods can achieve better performance compared with the prior works.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Anderson R, Petitcolas F (1998) On the limits of steganography. IEEE J Sel Areas Commun 16(4):474–481

    Article  Google Scholar 

  2. Cai K, Li X, Zeng T, et al (2010) Reliable histogram features for detecting LSB matching. In: Proceedings of IEEE international conference on image processing, pp 26–29

    Google Scholar 

  3. Chang CC, Chou YC, Kieu TD (2008) An information hiding scheme using sudoku. In: Proceedings of IEEE international conference on innovative computing information and control, pp 17–17

    Google Scholar 

  4. Chao RM, Wu HC, Lee CC, et al (2009) A novel image data hiding scheme with diamond encoding. EURASIP J Inf Secur 1:658047

    Article  Google Scholar 

  5. Felgenhauer B, Jarvis F (2006) Mathematics of sudoku I. Math Spectr 39(1):15–22

    Google Scholar 

  6. Feng B, Lu W, Dai L et al (2014) Steganography based on high-dimensional reference table. In: Proceedings of the international workshop on digital watermarking, pp 574–587

  7. Feng B, Lu W, Sun W (2015) Novel steganographic method based on generalized K-distance N-dimensional pixel matching. Multimedia Tools and Applications 74 (21):9623–9646

    Article  Google Scholar 

  8. Fridrich J, Goljan M, Du R (2001) Reliable detection of LSB steganography in color and grayscale images. In: Proceedings of IEEE international workshop on multimedia and security, pp 27–30

    Google Scholar 

  9. Hong W (2013) Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique. Inf Sci 221(1):473–489

    Article  Google Scholar 

  10. Hong W, Chen TS (2012) A novel data embedding method using adaptive pixel pair matching. IEEE Trans Inf Forensics Secur 7(1):176–184

    Article  Google Scholar 

  11. Hong W, Chen TS, Shiu CW (2008) A minimal euclidean distance searching technique for sudoku steganography. In: Proceedings of IEEE international symposium on information science and engineering, vol 1, pp 515–518

    Google Scholar 

  12. Hong W, Chen TS, Shiu CW (2008) Steganography using sudoku revisited. In: Proceedings of IEEE international symposium on intelligent information technology application, vol 2, pp 935–939

    Google Scholar 

  13. Liao X, Li K, Yin J (2016) Separable data hiding in encrypted image based on compressive sensing and discrete Fourier transform. Multimedia Tools and Applications doi:10.1007/s11042-016-3971-4

  14. Liao X, Shu C (2015) Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J Vis Commun Image Represent 28(4):21–27

    Article  Google Scholar 

  15. Liao X, Wen Q, Zhang J (2011) A steganographic method for digital images with four-pixel differencing and modified LSB substitution. J Vis Commun Image Represent 22(1):1–8

    Article  Google Scholar 

  16. Liao X, Wen Q, Zhang J (2012) A novel steganographic method with fourpixel differencing and exploiting modification direction. IEICE Transactions on Fundamentals E95-A(7):1189–1192

    Article  Google Scholar 

  17. Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensics Secur 5(2):201–214

    Article  Google Scholar 

  18. Mao Q, Bharanitharan K, Chang CC (2015) Multi-round dynamic swap optimisation for table-based steganography. IET Image Process 9(12):1073–1082

    Article  Google Scholar 

  19. Peng F, Zhou D, Long M, et al (2017) Discrimination of natural images and computer generated graphics based on multi-fractal and regression analysis. AEU-Int J Electron C 71(1):72–81

    Article  Google Scholar 

  20. Schaefer G, Stich M (2004) UCID-an uncompressed colour image database. In: Proceedings of SPIE, storage and retrieval methods and applications for multimedia, pp 472–480

    Google Scholar 

  21. Wang CM, Wu NI, Tsai CS, Hwang MS (2008) A high quality steganography method with pixel-value differencing and modulus function. J Syst Softw 81(1):150–158

    Article  Google Scholar 

  22. Wang H, Wang S (2004) Cyber warfare: steganography vs. steganalysis. Commun ACM 47(10):76–82

    Article  Google Scholar 

  23. Wang Z, Bovik AC, Sheikh HR, et al (2014) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612

    Article  Google Scholar 

  24. Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(9-10):1613–1626

    Article  MATH  Google Scholar 

  25. Wu HC, Wu NI, Tsai CS, Hwang MS (2005) Image steganographic scheme based on pixel-value differencing and LSB replacement methods. In: Proceedings of IEEE proceedings on vision, image and signal processing, vol 152, no 5, pp 611–615

    Google Scholar 

  26. Xia Z, Wang X, Sun X, et al (2016) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimedia Tools and Applications 75(4):1947–1962

    Article  Google Scholar 

  27. Xia Z, Wang X, Zhang L, et al (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(11):2594–2608

    Article  Google Scholar 

  28. Yang CH, Weng CY, Wang SJ, Sun HM (2008) Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans Inf Forensics Secur 3(3):488–497

    Article  Google Scholar 

  29. Zhan W, Peng Z, Hong W, et al (2015) A secure data hiding method based on patched reference table and pixel value differencing technique. In: Proceedings of IEEE international conference on computational intelligence and communication networks, pp 1199–1202

    Google Scholar 

  30. Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781–783

    Article  Google Scholar 

  31. Zhu X, Ding J, Dong H, et al (2014) Normalized correlation based quantization modulation for robust watermarking. IEEE Trans Multimedia 16(7):1888–1904

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported by National Natural Science Foundation of China (Grant Nos. 61402162, 61370225, 61472131, 61272546), Hunan Provincial Natural Science Foundation of China (Grant No. 2017JJ3040), Opening Project of Shanghai Key Laboratory of Integrated Administration Technologies for Information Security (Grant No. AGK201605), CCF-Venustech Research Fund, Specialized Research Fund for the Doctoral Program of Higher Education (Grant No. 20130161120004), Science and Technology Key Projects of Hunan Province (Grant Nos. 2015TP1004, 2016JC2012).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiong Li.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liao, X., Guo, S., Yin, J. et al. New cubic reference table based image steganography. Multimed Tools Appl 77, 10033–10050 (2018). https://doi.org/10.1007/s11042-017-4946-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4946-9

Keywords

Navigation