Abstract
With the rapid development of information communication, information security is becoming more and more important. As an important technology in the field of information security, image steganography has attracted wide attention. CMD (clustering modification directions) steganographic strategy has high security performance. The cover image is decomposed into several sub-images, and then the costs of pixels are updated dynamically and the pixel modification directions are clustered. However, the sub-image cannot completely exploit mutual embedding impacts. In this paper, we propose a new steganography method based on patched block. This strategy can make the post-processing sub-image be influenced by all the sub-images which have already embedded. The experimental results show that the proposed method is more secure than CMD image steganographic method.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Zhou, Z., Wang, Y., Wu, J., Yang, C., Sun, X.: Effective and efficient global context verification for image copy detection. IEEE Trans. Inf. Forensics Secur. 12, 48–63 (2017)
Zhou, Z., Yang, C., Chen, B., Sun, X., Li, Q., Wu, J.: Effective and efficient image copy detection with resistance to arbitrary rotation. IEICE Trans. Inf. Syst. 99(6), 1531–1540 (2016)
Pan, Z., Lei, J., Zhang, Y., Sun, X., Sam, K.: Fast motion estimation based on content property for low-complexity H.265/HEVC encoder. IEEE Trans. Broadcast. 62, 675–684 (2016)
Xia, Z., Xiong, N., Vasilakos, A.V., Sun, X.: EPCBIR: an efficient and privacy-preserving content-based image retrieval scheme in cloud computing. Inf. Sci. 387, 195–204 (2017)
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K.A.: Privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11, 2594–2608 (2016)
Xia, Z., Zhu, Y., Sun, X., Qin, Z., Ren, K.: Towards privacy-preserving content-based image retrieval in cloud computing. IEEE Trans. Cloud Comput. 99, 1–1 (2015)
Xiong, L., Xu, Z., Xu, Y.: A secure re-encryption scheme for data services in a cloud computing environment. Concur. Comput. Pract. Exp. 27, 4573–4585 (2015)
Fu, Z., Sun, X., Ji, S., Xie, G.: Towards efficient content-aware search over encrypted outsourced data in cloud. In: IEEE International Conference on Computer Communications, pp. 1–9. IEEE Press, Brest (2016)
Xia, Z., Lv, R., Zhu, Y., Ji, P., Sun, H., Shi, Y.Q.: Fingerprint liveness detection using gradient-based texture features. Sig. Image Video Proc. 11, 381–388 (2017)
Chen, X., Sun, X., Zhou, Z., Zhang, J.: Reversible watermarking method based on asymmetric-histogram shifting of prediction errors. J. Syst. Softw. 86, 2620–2626 (2013)
Liao, X., Shu, C.: Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J. Vis. Commun. Image Representation 28, 21–27 (2015)
Anderson, R.J., Petitcolas, F.A.: On the limits of steganography. IEEE J. Sel. Areas Commun. 16, 474–481 (1998)
Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, 2nd edn. Morgan Kaufmann, San Francisco (2008)
Fridrich, J.: Minimizing the embedding impact in steganography. In: 8th ACM Workshop Multimedia Secur, Geneva, Switzerland, pp. 2–10 (2006)
Filler, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Forensics Secur. 6, 920–935 (2011)
Pevný, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 161–177. Springer, Heidelberg (2010). doi:10.1007/978-3-642-16435-4_13
Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: 2012 IEEE International Workshop on Information Forensics and Security, pp. 234–239. IEEE Press, Tenerife (2012)
Liao, X., Chen, G., Li, Q.: Improved WOW adaptive image steganography method. In: 15th IEEE International Conference on Algorithms and Architectures for Parallel Processing, pp. 685–702. IEEE Press, ChangSha (2015)
Holub, V., Fridrich, J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inf. Secur. 2014, 1–13 (2014)
Li, B., Wang, M., Huang, J., Li, X.: A new cost function for spatial image steganography. In: IEEE International Conference on Image Process, pp. 4026–4210. IEEE Press, Paris (2014)
Li, B., Wang, M., Li, X., Tan, S.: A strategy of clustering modification directions in spatial image steganography. IEEE Trans. Inf. Forensics Secur. 10, 1905–1917 (2015)
Hong, W.: Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique. Inf. Sci. 221, 473–489 (2013)
Bas, P., Filler, T., Pevný, T.: “Break Our Steganographic System”: the ins and outs of organizing BOSS. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 59–70. Springer, Heidelberg (2011). doi:10.1007/978-3-642-24178-9_5
Fridrich, J., Kodovsk, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Foren. Secur. 7, 868–882 (2012)
Kodovsk, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Foren. Secur. 7, 432–444 (2012)
Acknowledgments
This work is supported by National Natural Science Foundation of China (Grant Nos. 61402162, 61572182, 61370225, 61472131, 61272546), Hunan Provincial Natural Science Foundation of China (Grant No. 2017JJ3040), Specialized Research Fund for the Doctoral Program of Higher Education (Grant No. 20130161120004), Science and Technology Key Projects of Hunan Province (Grant Nos. 2015TP1004, 2016JC2012), Opening Project of Shanghai Key Laboratory of Integrated Administration Technologies for Information Security (Grant No. AGK201605).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Yu, Y., Liao, X. (2017). Improved CMD Adaptive Image Steganography Method. In: Sun, X., Chao, HC., You, X., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2017. Lecture Notes in Computer Science(), vol 10602. Springer, Cham. https://doi.org/10.1007/978-3-319-68505-2_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-68505-2_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-68504-5
Online ISBN: 978-3-319-68505-2
eBook Packages: Computer ScienceComputer Science (R0)