scispace - formally typeset
Journal ArticleDOI

A New Payload Partition Strategy in Color Image Steganography

TLDR
A novel channel-dependent payload partition strategy based on amplifying channel modification probabilities is proposed, so as to adaptively assign the embedding capacity among RGB channels, and the experimental results show that the new color image steganographic schemes, incorporated with the proposed strategy, can effectively make theembedding changes concentrated mainly in textured regions, and achieve better performance on resisting the modern color image Steganalysis.
Abstract
In traditional steganographic schemes, RGB three channels payloads are assigned equally in a true color image. In fact, the security of color image steganography relates not only to data-embedding algorithms but also to different payload partition. How to exploit inter-channel correlations to allocate payload for performance enhancement is still an open issue in color image steganography. In this paper, a novel channel-dependent payload partition strategy based on amplifying channel modification probabilities is proposed, so as to adaptively assign the embedding capacity among RGB channels. The modification probabilities of three corresponding pixels in RGB channels are simultaneously increased, and thus the embedding impacts could be clustered, in order to improve the empirical steganographic security against the channel co-occurrences detection. The experimental results show that the new color image steganographic schemes, incorporated with the proposed strategy, can effectively make the embedding changes concentrated mainly in textured regions, and achieve better performance on resisting the modern color image steganalysis.

read more

Citations
More filters
Journal ArticleDOI

PSNR vs SSIM: imperceptibility quality assessment for image steganography

TL;DR: This research concludes that SSIM is a better measure of imperceptibility in all aspects and it is preferable that in the next steganographic research at least use SSIM.
Journal ArticleDOI

A Novel Hybrid Secure Image Encryption Based on Julia Set of Fractals and 3D Lorenz Chaotic Map

TL;DR: This paper proposes a novel system that is computationally less expensive and provided a higher level of security in chaotic-based encryption schemes based on a shuffling process with fractals key along with three-dimensional Lorenz chaotic map.
Journal ArticleDOI

Reversible Image Steganography Using Dual-Layer LSB Matching

TL;DR: The objective of the proposed work is to enhance the embedding efficiency (EE) using dual-layer based embedding strategy and to curtail the distortion caused to the stego-image to improve its quality.
Journal ArticleDOI

An Optimal Information Hiding Approach Based on Pixel Value Differencing and Modulus Function

TL;DR: It has been experimentally verified that the proposed image steganography approach is resistant against RS attack and the fall off boundary problem which exists in most of the pixel value differencing approaches has been avoided.
Journal ArticleDOI

Image encryption algorithm with circle index table scrambling and partition diffusion

TL;DR: The main feature of this algorithm is that the robust chaos-based keystream and encryption process are highly sensitive to the plaintext, which will effectively resist against chosen-plain text and known-plaintext attacks.
References
More filters
Journal ArticleDOI

LIBSVM: A library for support vector machines

TL;DR: Issues such as solving SVM optimization problems theoretical convergence multiclass classification probability estimates and parameter selection are discussed in detail.
Posted Content

Caffe: Convolutional Architecture for Fast Feature Embedding

TL;DR: Caffe as discussed by the authors is a BSD-licensed C++ library with Python and MATLAB bindings for training and deploying general-purpose convolutional neural networks and other deep models efficiently on commodity architectures.
Journal ArticleDOI

Rich Models for Steganalysis of Digital Images

TL;DR: A novel general strategy for building steganography detectors for digital images by assembling a rich model of the noise component as a union of many diverse submodels formed by joint distributions of neighboring samples from quantized image noise residuals obtained using linear and nonlinear high-pass filters.
Journal ArticleDOI

On the limits of steganography

TL;DR: It is shown that public key information hiding systems exist, and are not necessarily constrained to the case where the warden is passive, and the use of parity checks to amplify covertness and provide public key steganography.
Proceedings ArticleDOI

UCID: an uncompressed color image database

TL;DR: A new dataset, UCID (pronounced "use it") - an Uncompressed Colour Image Dataset which tries to bridge the gap between standardised image databases and objective evaluation of image retrieval algorithms that operate in the compressed domain.
Related Papers (5)