Abstract
In edge adaptive image steganography based on LSB matching revisited algorithm (EAMR for short in this paper), the secret message bits are embedded into those consecutive pixel pairs whose absolute difference of grey values are larger than or equal to a threshold T. Tan et al. [1] pointed out that since those adjacent pixel pairs can be located by the potential attackers, the pulse distortion introduced in the histogram of absolute difference of pixel pairs (HADPP for short in this paper) can easily be discovered, and a targeted steganalyzer for revealing this pulse distortion is presented in [1]. In this paper, we propose an improved algorithm for EAMR, in which the adjacent pixel pairs for data hiding are selected in a new random way. Thus the attackers cannot locate the pixel pairs selected for data hiding accurately, and the abnormality that exists in HADPP cannot be discovered any longer. Experimental results demonstrate that our improved EAMR (I-EAMR) can efficiently defeat the targeted steganalyzer presented by Tan et al. [1]. Furthermore, it can still preserve the statistics of the carrier image well enough to resist today’s blind steganalyzers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Tan, S., Li, B.: Targeted steganalysis of edge adaptive image steganography based on LSB matching revisited using B-spline fitting. IEEE Sig. Process. Lett. 19(6), 336–339 (2012)
Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)
Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in color, and gray-scale images. IEEE Multimedia 8(4), 22–28 (2001)
Mielikaieen, J.: LSB matching revisited. IEEE Sig. Process. Lett 13(5), 285–287 (2006)
Tan, S.: Steganalysis of LSB matching revisited for consecutive pixels using B-spline functions. In: Shi, Y.Q., Kim, H.-J., Perez-Gonzalez, F. (eds.) IWDW 2011. LNCS, vol. 7128, pp. 16–29. Springer, Heidelberg (2012)
Luo, W., Huang, F., Huang, J.: Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inf. Forensics Secur. 5(2), 201–214 (2010)
Shi, Y.Q., et al.: Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network. In: Proceedings of the IEEE International Conference on Multimedia and Expo, pp. 269–272 (2005)
Farid, H.: Detecting hidden messages using higher-order statistical models. In: Proceedings of the IEEE International Conference on Image Processing, vol. 2, pp. 905–908 (2002)
Wang, Y., Moulin, P.: Optimazed feature extraction for learning-based image steganalysis. IEEE Trans. Inf. Forensics Secur. 2(1), 31–45 (2007)
Li, B., Huang, J., Shi Y.Q.: Textural features based universal steganalysis. In: Proceedings of the Spie on Security, Forensics, Steganography and Watermarking of Multimedia, vol. 6819, p. 681912 (2008)
Unser, M.: B-spline signal processing: part I-theory. IEEE Trans. Signal Process. 41(2), 821–833 (1993)
Ruderman, D.L.: The statistics of natural images. Netw.: Comput. Neural Syst. 5, 517–548 (1994)
Bas, P., Furon, T.: BOWS-2, July 2007. http://bows2.gipsa-lab.inpg.fr
Pevny, T., Bas, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Forensics Secur. 5(2), 215–224 (2010)
Chang, C.C., Lin, C.J.: LIBSVM : a library for support vector machines. ACM Trans. Intell. Syst. Technol. 2(27), 1–27 (2011)
Wahba, G.: Smoothing noisy data with spline functions. Numer. Math. 24, 383–393 (1975)
Li, X., et al.: Steganalysis of a PVD-based content adaptive image steganography. Sig. Process. 93, 2529–2538 (2013)
Acknowledgments
The authors would like to thank Dr. Shunquan Tan at Shenzhen University, Shenzhen, China, for providing us the source code in [1]. This work was supported by the National Natural Science Foundation of China (61173147, U1135001), the 973 Program of China (2011CB302204), the Key Projects in the National Science & Technology Pillar Program (2012BAK16B06), the Fundamental Research Funds for Central Universities (12lgpy31), and the Project Sponsored by the Scientific Research Foundation for the Returned Overseas Chinese Scholars, State Education Ministry ([2012]1707).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Huang, F., Zhong, Y., Huang, J. (2014). Improved Algorithm of Edge Adaptive Image Steganography Based on LSB Matching Revisited Algorithm. In: Shi, Y., Kim, HJ., Pérez-González, F. (eds) Digital-Forensics and Watermarking. IWDW 2013. Lecture Notes in Computer Science(), vol 8389. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43886-2_2
Download citation
DOI: https://doi.org/10.1007/978-3-662-43886-2_2
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-43885-5
Online ISBN: 978-3-662-43886-2
eBook Packages: Computer ScienceComputer Science (R0)