Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3442705.3442713acmotherconferencesArticle/Chapter ViewAbstractPublication PagesvsipConference Proceedingsconference-collections
research-article

High Capacity Steganography on Float-Point Number with Single Precision

Published: 21 March 2021 Publication History

Abstract

Nowadays, the research on modern image steganography mainly focuses on the spatial domain and jpeg transform domain. And the image elements that used to carry the message bits are all integers without exception. However, with the in-depth study of High Dynamic Range (HDR) images, single-precision float-point numbers have gained more and more attention. The float-point number has more redundant bits than integer, which makes it can hide more secret information and more suitable for steganography. In this paper, based on the IEEE754 standard, we employ the luminance channel of HDR image as the steganography domain which is named the mantissa spatial domain. Based on this new steganography domain, we propose a novel adaptive steganography scheme that can realize satisfactory security under high payload such as 0.75bpp. Experimental results show that the proposed scheme achieves better performance on resisting the state-of-the-art steganalysis method than existing schemes and make a good balance between capacity and security.

References

[1]
B. Li, J. He, J. Huang, and Y. Q. Shi, “A survey on image steganography and steganalysis,” Journal of Information Hiding and Multimedia Signal Processing, vol.2, no. 2, pp. 142–172, April 2011.
[2]
A. Imra, S. M. Babar, “A Survey on Digital Image Steganography Approaches,” 1 st International Conference on Intelligent Technologies and Applications (INTAP), Islamia Univ Bahawalpur, Bahawalpur, PAKISTAN, 2019, pp. 769-778.
[3]
Fridrich J. Steganography in Digital Media: Principles, Algorithms, and Applications[M]. Cambridge University Press, 2009.
[4]
Holub V, Fridrich J. “Designing steganographic distortion using directional filters,” IEEE International Workshop on Information Forensics & Security, Tenerife, SPAIN, 2012, pp. 234-239.
[5]
V. Holub, J. Fridrich, and T. Denemark, “Universal distortion function for steganography in an arbitrary domain,”  EURASIP Journal on Information Security, vol.2014, no.1, pp. 1-13. 2014.
[6]
T. Pevný, T. Filler, and P. Bas, “Using High-Dimensional Image Models to Perform Highly Undetectable Steganography,” in Proc. 12 th Int. Conf. Inf. Hiding, Calgary, AB, Canada, Jun. 2010, pp. 161-177.
[7]
Mare S F, Vladutiu M, Prodan L. HDR based steganographic algorithm[C]//2011 IEEE 17th International Symposium for Design and Technology in Electronic Packaging (SIITME). IEEE, 2011: 333-338.
[8]
B. Li, M. Wang, J. Huang, and X. Li, “A new cost function for spatial image steganography,” in Proc. IEEE Int. Conf. Imaging Process., 2014, pp. 4206-4210.
[9]
Cheng Y M, Wang C M. A Novel Approach to Steganography in High-Dynamic-Range Images[J]. IEEE MultiMedia, 2009, 16(3): 70-80.
[10]
Qin X, Li B, Tan S, A Novel Steganography for Spatial Color Images based on Pixel Vector Cost[J]. IEEE Access, 2019, pp (99):1-1.
[11]
T. Filler, J. Judas, and J. Fridrich, “Minimizing additive distortion in steganography using syndrome-trellis codes,”  IEEE Trans. Inform. Forensics Security, vol. 6, no. 3, pp. 920-935, Sep. 2011.
[12]
D. H. Hu, “A Spatial Image Steganography Method Based on Non-negative Matrix Factorization,” IEEE Signal Process. Lett., vol. 25, no. 9, pp. 1364-1368, Sep. 2018.
[13]
A. Kaur, R. Kaur, and N. Kumarh, “A Survey on Image Steganography Techniques,” International Journal of Computer Applications, vol. 123, no. 4, pp. 20-24, Aug. 2015.
[14]
Wang Z, Qian Z, Zhang X, On Improving Distortion Functions for JPEG Steganography[J]. IEEE Access, 2018:1-1.
[15]
Z. C. Wang, X. P. Zhang, and Z. X. Yin, “Joint Cover-Selection and Payload-Allocation by Steganographic Distortion Optimization,” IEEE Signal Process. Lett., vol. 25, no. 10, pp. 1530-1534, Oct. 2018.
[16]
X. L. Hu, J. Q. Ni, and Y. Q. Shi, “Efficient JPEG Steganography Using Domain Transformation of Embedding Entropy,” IEEE Signal Process. Lett., vol.25, no.6, pp. 773-777, Jun. 2018.
[17]
C. Lee, E. Y. Lam,“Computationally Efficient Truncated Nuclear Norm Minimization for High Dynamic Range Imaging,” IEEE Trans. Image Process., vol.25, Issue 9, pp.4145-4157, 2016.
[18]
C. Lee, Y. L. Li, and V. Monga, “Ghost-Free High Dynamic Range Imaging via Rank Minimization,” IEEE Signal Process. Lett., vol.21, no.9, pp.1045-1049, Sep. 2014.
[19]
Ke Y, Liu J, Zhang M Q, Steganography Security: Principle and Practice[J]. IEEE Access, 2018, pp (99):1-1.
[20]
M. L. Pendu, C. Guillemot, and A. Smolic, “High Dynamic Range Light Fields via Weighted Low Rank Approximation,” in Proc. 25 th IEEE Int. Conf. Imag Process., 2018, pp.1728-1732.
[21]
J. Fridrich and T. Filler, “Practical methods for minimizing embedding impact in steganography,” in Proc. SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, 2007, vol. 6505, p. 650502.
[22]
Z. Wang, “Image quality assessment: from error visibility to structural similarity,” IEEE Trans. Image Process., vol. 13, no.4, pp. 600-612, 2004.
[23]
M. Goljan, J. Fridrich, and R. Cogranne, “Rich model for Steganalysis of color images,” IEEE International Workshop on Information Forensics & Security, 2015, pp.
[24]
F. Banterle, A. Artusi, K. Debattista, and A. Chalmers, “Advanced high dynamic range imaging: theory and practice,” Boca Raton, FL, USA,2011, pp.33-113.
[25]
High dynamic range specific image dataset (HDRSID). [Online].Available: http://faculties.sbu.ac.ir/_moghaddam/index.php/main/page/10
[26]
Kodovsky J, Fridrich J, Holub V. Ensemble Classifiers for Steganalysis of Digital Media[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2):432-444.
[27]
T O Aydın, R Mantiuk, H P Seidel. Extending quality metrics to full luminance range images[C]//Human Vision and Electronic Imaging XIII. International Society for Optics and Photonics, 2008, 6806: 68060B.

Cited By

View all
  • (2021)A Novel Method of high-Capacity Steganography Technique in Double Precision Images2021 International Conference on Computational Performance Evaluation (ComPE)10.1109/ComPE53109.2021.9751905(780-784)Online publication date: 1-Dec-2021

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
VSIP '20: Proceedings of the 2020 2nd International Conference on Video, Signal and Image Processing
December 2020
108 pages
ISBN:9781450388931
DOI:10.1145/3442705
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 21 March 2021

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. high dynamic range image
  2. high payload
  3. steganography
  4. steganography security

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

VSIP '20

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)11
  • Downloads (Last 6 weeks)3
Reflects downloads up to 24 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2021)A Novel Method of high-Capacity Steganography Technique in Double Precision Images2021 International Conference on Computational Performance Evaluation (ComPE)10.1109/ComPE53109.2021.9751905(780-784)Online publication date: 1-Dec-2021

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media