通信与信息工程

保持直方图特性的隐写嵌入

展开
  • 上海大学通信与信息工程学院, 上海200444

收稿日期: 2013-11-12

  网络出版日期: 2015-04-29

基金资助

国家自然科学基金资助项目(61472235)

Steganographic algorithm with histogram-preserving property

Expand
  • School of Communication and Information Engineering, Shanghai University, Shanghai 200444, China

Received date: 2013-11-12

  Online published: 2015-04-29

摘要

为了提高隐写的安全性, 必须保持隐写前后图像的特征一致. 提出了一种保持直方图特性的隐写算法. 首先, 对像素直方图进行分组, 通过计算定量失真时的最大嵌入数据量, 得到每个像素的修改概率, 并利用STC(syndrome trellis codes)确定需要修改的像素位置; 然后,根据直方图分组情况对需要修改的像素值进行组内和组间自适应调整, 实现秘密信息的嵌入,同时保持隐写前后图像的直方图变化最小. 实验结果表明, 在相同嵌入量的前提下, 该方法对直方图的改动远少于已有的隐写算法, 隐写图像视觉质量更好.

关键词: STC; 视觉质量; 隐写; 直方图

本文引用格式

申文锋, 栗风永, 张新鹏, 杨乾星 . 保持直方图特性的隐写嵌入[J]. 上海大学学报(自然科学版), 2015 , 21(2) : 190 -196 . DOI: 10.3969/j.issn.1007-2861.2013.07.046

Abstract

To enhance security of steganography, the characteristics of the image should be kept as far as possible. This paper proposes a steganography algorithm with histogrampreserving property. Firstly, the histogram of pixel values is grouped. By calculating the maximum payload under a given distortion, the modification rate for each pixel is found and the location of pixels is got that need to be changed by syndrome trellis codes (STC). Then embedding is performed by changing those pixels using adaptive intra-group and/or inter-group adjustments. The difference in histogram between the cover and the stegoimages is very small. Experimental results show that the proposed method makes less histogram change and gives better visual quality than existing methods under the same
embedding rate.

参考文献

[1] Chan C K, Cheng L M. Hiding data in images by simple LSB substitution [J]. Pattern Recognition, 2004, 37(3): 469-474.

[2] Filler T, Judas J, Fridrich J. Minimizing additive distortion in steganography using syndrome-trellis codes [J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3):

920-935.

[3] Zhang X P, Wang S Z. Efficient data hiding with histogram-preserving property [J]. Telecommunication Systems, 2012, 49(2): 179-185.

[4] Fridrich J, Soukal D. Matrix embedding for large payloads [J]. IEEE Transformations on Information Forensics and Security, 2006, 3(1): 390-394.

[5] Zhang W M, Zhang X P, Wang S Z. Maximizing steganographic embedding efficiency by combining Hamming codes and wet paper codes [C]// Proceedings of the 10th Information

Hiding Workshop. 2008: 60-71.

[6] Pevny T, Filler T, Bas P. Using high-dimensional image models to perform highly undetectable steganography [C]// Proceedings of the 10th Information Hiding Workshop. 2010:

161-177.

[7] Holub V, Fridrich J. Designing steganographic distortion using directional filters [C]// IEEE International Workshop on Information Forensics and Security. 2012: 234-239.

[8] Fridrich J, Kodoysky J. Multivariate Gaussian model for designing additive distortion for steganography [C]// IEEE International Conference on Acoustics, Speech, and Signal Processing. 2013: 2949-2953.

[9] 张新鹏, 刘焕, 张颖春, 等. 融合方向编码和湿纸编码的高效信息隐藏[J]. 上海大学学报: 自然科学版, 2010, 16(1): 1-4.
文章导航

/