Skip to main content

Improved Algorithm of Edge Adaptive Image Steganography Based on LSB Matching Revisited Algorithm

  • Conference paper
  • First Online:
Digital-Forensics and Watermarking (IWDW 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8389))

Included in the following conference series:

Abstract

In edge adaptive image steganography based on LSB matching revisited algorithm (EAMR for short in this paper), the secret message bits are embedded into those consecutive pixel pairs whose absolute difference of grey values are larger than or equal to a threshold T. Tan et al. [1] pointed out that since those adjacent pixel pairs can be located by the potential attackers, the pulse distortion introduced in the histogram of absolute difference of pixel pairs (HADPP for short in this paper) can easily be discovered, and a targeted steganalyzer for revealing this pulse distortion is presented in [1]. In this paper, we propose an improved algorithm for EAMR, in which the adjacent pixel pairs for data hiding are selected in a new random way. Thus the attackers cannot locate the pixel pairs selected for data hiding accurately, and the abnormality that exists in HADPP cannot be discovered any longer. Experimental results demonstrate that our improved EAMR (I-EAMR) can efficiently defeat the targeted steganalyzer presented by Tan et al. [1]. Furthermore, it can still preserve the statistics of the carrier image well enough to resist today’s blind steganalyzers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Tan, S., Li, B.: Targeted steganalysis of edge adaptive image steganography based on LSB matching revisited using B-spline fitting. IEEE Sig. Process. Lett. 19(6), 336–339 (2012)

    Article  MathSciNet  Google Scholar 

  2. Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  3. Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in color, and gray-scale images. IEEE Multimedia 8(4), 22–28 (2001)

    Article  Google Scholar 

  4. Mielikaieen, J.: LSB matching revisited. IEEE Sig. Process. Lett 13(5), 285–287 (2006)

    Article  Google Scholar 

  5. Tan, S.: Steganalysis of LSB matching revisited for consecutive pixels using B-spline functions. In: Shi, Y.Q., Kim, H.-J., Perez-Gonzalez, F. (eds.) IWDW 2011. LNCS, vol. 7128, pp. 16–29. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  6. Luo, W., Huang, F., Huang, J.: Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inf. Forensics Secur. 5(2), 201–214 (2010)

    Article  MathSciNet  Google Scholar 

  7. Shi, Y.Q., et al.: Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network. In: Proceedings of the IEEE International Conference on Multimedia and Expo, pp. 269–272 (2005)

    Google Scholar 

  8. Farid, H.: Detecting hidden messages using higher-order statistical models. In: Proceedings of the IEEE International Conference on Image Processing, vol. 2, pp. 905–908 (2002)

    Google Scholar 

  9. Wang, Y., Moulin, P.: Optimazed feature extraction for learning-based image steganalysis. IEEE Trans. Inf. Forensics Secur. 2(1), 31–45 (2007)

    Article  Google Scholar 

  10. Li, B., Huang, J., Shi Y.Q.: Textural features based universal steganalysis. In: Proceedings of the Spie on Security, Forensics, Steganography and Watermarking of Multimedia, vol. 6819, p. 681912 (2008)

    Google Scholar 

  11. Unser, M.: B-spline signal processing: part I-theory. IEEE Trans. Signal Process. 41(2), 821–833 (1993)

    Article  MATH  MathSciNet  Google Scholar 

  12. Ruderman, D.L.: The statistics of natural images. Netw.: Comput. Neural Syst. 5, 517–548 (1994)

    Article  MATH  Google Scholar 

  13. Bas, P., Furon, T.: BOWS-2, July 2007. http://bows2.gipsa-lab.inpg.fr

  14. Pevny, T., Bas, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Forensics Secur. 5(2), 215–224 (2010)

    Article  Google Scholar 

  15. Chang, C.C., Lin, C.J.: LIBSVM : a library for support vector machines. ACM Trans. Intell. Syst. Technol. 2(27), 1–27 (2011)

    Article  Google Scholar 

  16. Wahba, G.: Smoothing noisy data with spline functions. Numer. Math. 24, 383–393 (1975)

    Article  MATH  MathSciNet  Google Scholar 

  17. Li, X., et al.: Steganalysis of a PVD-based content adaptive image steganography. Sig. Process. 93, 2529–2538 (2013)

    Article  Google Scholar 

Download references

Acknowledgments

The authors would like to thank Dr. Shunquan Tan at Shenzhen University, Shenzhen, China, for providing us the source code in [1]. This work was supported by the National Natural Science Foundation of China (61173147, U1135001), the 973 Program of China (2011CB302204), the Key Projects in the National Science & Technology Pillar Program (2012BAK16B06), the Fundamental Research Funds for Central Universities (12lgpy31), and the Project Sponsored by the Scientific Research Foundation for the Returned Overseas Chinese Scholars, State Education Ministry ([2012]1707).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fangjun Huang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Huang, F., Zhong, Y., Huang, J. (2014). Improved Algorithm of Edge Adaptive Image Steganography Based on LSB Matching Revisited Algorithm. In: Shi, Y., Kim, HJ., Pérez-González, F. (eds) Digital-Forensics and Watermarking. IWDW 2013. Lecture Notes in Computer Science(), vol 8389. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43886-2_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-43886-2_2

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-43885-5

  • Online ISBN: 978-3-662-43886-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics