
Secure Steganography by n-Dimensional Hypercube Modulo Mapping
LIAO Qi-nan, SUN Xian-bo, PAN Rui-dong
ACTA ELECTRONICA SINICA ›› 2016, Vol. 44 ›› Issue (1) : 160-167.
Secure Steganography by n-Dimensional Hypercube Modulo Mapping
In order to solve the problems existing in steganography based on modular function, this paper presents n-dimensional hypercube modulo mapping steganographic algorithm.According to modular arithmetic properties, the algorithm defines an n-dimensional modular function which n pixels values are mapped to a data in an-ary notational system, thus the algorithm realizes that each secret digit in an-ary notational system is carried by n cover pixels.The algorithm can get different rates of embedding and visual quality of stego image when we choose different parameter a, and can get better visual quality of stego image when a is even number and we choose bigger parameter n.Theoretical analysis and experimental results show that the proposed algorithm, by comparing with many steganography, not only has the function of these algorithms, but also has a better visual quality of stego image, better security, and stronger practicability.
digital image / modular function / remainder cycle / steganography {{custom_keyword}} /
[1] Bender W, Gruhl D, Morimoto N, et al.Techniques for data hiding[J].IBM System Journal, 1996, 35(3-4):313-336.
[2] Fridrich J, Goljan M, Du R.Detecting LSB steganography in color and grayscale images[J].IEEE Multimedia, 2001, 8(4):22-28.
[3] Sharp T.An implementation of key-based digital signal steganography[A].Proceedings of 4th International Workshop on Information Hiding[C].Springer LNCS, 2001.2137:13-26.
[4] 罗向阳, 陆佩忠, 刘粉林.一类可抵御SPA分析的动态补偿LSB信息隐藏方法[J].计算机学报, 2007, 30(3):463-473. Luo Xiang-yang, Lu Pei-zhong, Liu Fen-lin.A dynamic compensation LSB steganography method defeating SPA[J].Chinese Journal of Computers, 2007, 30(3):463-473.(in Chinese)
[5] Mielikainen J.LSB matching revisited[J].IEEE Signal Processing Letters, 2006, 13(5):285-287.
[6] Chan C K, Cheng L M.Hiding data in images by simple LSB substitution[J].Pattern Recognition, 2004, 37(3):469-474.
[7] Jessica J Fridrich, Miroslav Goljan, David Soukal.Searching for the stego-key[A].Security, Steganography, and Watermarking of Multimedia Contents VI[C].USA, 2004.5306:70-82.
[8] 刘劲, 康志伟, 何怡刚.一种基于小波对比度和LSB的密写[J].电子学报, 2007, 35(7):1391-1393. LIU Jin, KANG Zhi-wei, HE Yi-gang.A steganographic method based on wavelet contrast and LSB[J].Acta Electronica Sinica, 2007, 35(7):1391-1393.(in Chinese)
[9] 陶然, 张涛, 李文祥, 等.应用整数小波变换的抗盲检测图像隐写[J].应用科学学报, 2010, 28(6):592-600. TAO Ran, ZHANG Tao, LI Wen-xiang, et al.Images steganography against blind detection using integer wavelet transform[J].Journal of Applied Sciences, 2010, 28(6):592-600.(in Chinese)
[10] Yang C H, Weng C Y, Wang S J.Adaptive data hiding in edge areas of images with spatial LSB domain systems[J].IEEE Transactions on Information Forensics and Security, 2008, 3(3):488-497.
[11] Luo W Q, Huang F J, Huang J W.Edge adaptive image steganography based on LSB matching revisited[J].IEEE Transactions on Information Forensics and Security, 2010, 5(2):201-214.
[12] Lou D C, Wu N I, Wang C M, et al.A novel adaptive steganography based on local complexity and human vision sensitivity[J].The Journal of Systems and Software, 2010, 83:1236-1248.
[13] Zhang X P, Wang S Z.Efficient steganographic embedding by exploiting modification direction[J].IEEE Communications Letters, 2006, 10(11):781-783.
[14] Lee C F, Wang Y R, Chang C C.A steganographic method with high embedding capacity by improving exploiting modification direction[A].Third International Conference on Inter-national Information Hiding and Multimedia Signal Processing[C].IEEE, 2007.497-500.
[15] Kuo W C, Wuu L C, Shyi C N, et al.A data hiding scheme with high embedding capacity based on general improving exploiting modification direction method[A].Ninth International Conference on Hybrid Intelligent Systems[C].IEEE, 2009.69-72.
[16] Chao R M, Wu H C, Lee C C, et al.A novel image data hiding scheme with diamond encoding[J].EURASIP Journal on Information Security, 2009(2009):658047.1-9.
[17] 廖琪男.利用模运算及其周期性特点的安全隐写算法[J].中国图象图形学报, 2012, 17(10):1206-1212. LIAO Qi-nan.Secure steganography based on modulo and its cyclical characteristic[J].Journal of Image and Graphics, 2012, 17(10):1206-1212.(in Chinese)
[18] Qu Z G, Fu Y, Niu X X, et al.Improved EMD steganography with great embedding rate and high embedding efficiency[A].Proceedings of Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing[C].IEEE, 2009.348-352.
[19] 张新鹏, 刘焕, 张颖春, 等.融合方向编码和湿纸编码的高效信息隐藏[J].上海大学学报(自然科学版), 2010, 16(1):1-4. ZHANG Xin-peng, LIU Huan, ZHANG Ying-chun, et al.Efficient data embedding by combining modification direction modulation and wet paper code[J].Journal of Shanghai University (Natural Science), 2010, 16(1):1-4.(in Chinese)
[20] Kieu T D, Chang C C.A steganographic scheme by fully exploiting modification directions[J].Expert Systems with Applications, 2011, 38(8):10648-10657.
[21] Wang X T, Chang C C, Lin C C, et al.A novel multi-group exploiting modification direction method based on switch map[J].Signal Processing, 2012(92):1525-1535.
[22] 廖琪男.基于边缘匹配和模函数的安全密写算法[J].电子学报, 2012, 40(10):2002-2008. LIAO Qi-nan.Secure steganographic algorithm based on side match and modular function[J].Acta Electronica Sinica, 2012, 40(10):2002-2008.(in Chinese)
/
〈 |
|
〉 |