Skip to main content

Halftone Image Steganalysis by Reconstructing Grayscale Image

  • Conference paper
  • First Online:
Artificial Intelligence and Security (ICAIS 2021)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12737))

Included in the following conference series:

  • 1449 Accesses

Abstract

Utilizing some special pixels patterns constructing the steganalytic features is popular in binary image steganalysis, which could be also used in halftone image. There is almost no specific image steganalysis for halftone image. In this paper, a halftone image steganalysis scheme is proposed and achieves a satisfactory performance, which is totally different from the previous works focussing on some special pixels patterns. Inspired by the fact that halftoning techniques based on the low-pass characteristic of human visual system model (HVS model), the grayscale image is considered reconstructing with a Gaussian filter. And the distortions caused by embedding secret messages will still exist. After that, some common grayscale image steganalysis can be used for extracting the steganalytic features. Furthermore, a series of experiments are conducted and the experimental results show that the proposed scheme is effective on halftone image steganalysis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bas, P., Filler, T., Pevný, T.: “Break our steganographic system”: the ins and outs of organizing BOSS. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 59–70. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-24178-9_5

    Chapter  Google Scholar 

  2. Chen, J., Lu, W., Fang, Y., Liu, X., Yeung, Y., Xue, Y.: Binary image steganalysis based on local texture pattern. J. Vis. Commun. Image Represent. 55, 149–156 (2018)

    Article  Google Scholar 

  3. Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273–297 (1995). https://doi.org/10.1007/BF00994018

    Article  MATH  Google Scholar 

  4. Denemark, T., Sedighi, V., Holub, V., Cogranne, R., Fridrich, J.: Selection-channel-aware rich model for steganalysis of digital images. In: IEEE International Workshop on Information Forensics and Security, pp. 48–53 (2014)

    Google Scholar 

  5. Feng, B., Lu, W., Sun, W.: Binary image steganalysis based on pixel mesh Markov transition matrix. J. Vis. Commun. Image Represent. 26, 284–295 (2015)

    Article  Google Scholar 

  6. Feng, B., Lu, W., Sun, W.: Secure binary image steganography based on minimizing the distortion on the texture. IEEE Trans. Inf. Forensics Secur. 10(2), 243–255 (2015)

    Article  Google Scholar 

  7. Floyd, R.W., Steinberg, L.: Adaptive algorithm for spatial greyscale. Proc. SID 17, 75–77 (1976)

    Google Scholar 

  8. Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868–882 (2012)

    Article  Google Scholar 

  9. Fu, M.S., Au, O.C.: Data hiding for halftone images. In: Security and Watermarking of Multimedia Contents II, vol. 3971, pp. 228–236. International Society for Optics and Photonics (2000)

    Google Scholar 

  10. Fu, M.S., Au, O.C.: Data hiding watermarking for halftone images. IEEE Trans. Image Process. 11(4), 477–484 (2002)

    Article  Google Scholar 

  11. Guo, J.M.: Improved data hiding in halftone images with cooperating pair toggling human visual system. Int. J. Imaging Syst. Technol. 17(6), 328–332 (2007)

    Article  Google Scholar 

  12. Guo, J.M., Liu, Y.F., Chang, J.Y.: High efficient direct binary search using multiple lookup tables. In: 19th IEEE International Conference on Image Processing, pp. 813–816. IEEE (2012)

    Google Scholar 

  13. Kodovsky, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Secur. 7(2), 432–444 (2011)

    Article  Google Scholar 

  14. Kodovskỳ, J., Pevnỳ, T., Fridrich, J.: Modern steganalysis can detect YASS. In: Media Forensics and Security II, vol. 7541. International Society for Optics and Photonics (2010)

    Google Scholar 

  15. Lin, C., Lu, W., Huang, X., Liu, K., Sun, W., Lin, H.: Region duplication detection based on hybrid feature and evaluative clustering. Multimedia Tools Appl. 78(15), 20739–20763 (2019). https://doi.org/10.1007/s11042-019-7342-9

    Article  Google Scholar 

  16. Liu, X., Lu, W., Zhang, Q., Huang, J., Shi, Y.Q.: Downscaling factor estimation on pre-jpeg compressed images. IEEE Trans. Circ. Syst. Video Technol. 30(3), 618–631 (2020)

    Article  Google Scholar 

  17. Liu, Y.F., Guo, J.M.: Dot-diffused halftoning with improved homogeneity. IEEE Trans. Image Process. 24(11), 4581–4591 (2015)

    Article  MathSciNet  Google Scholar 

  18. Lu, W., He, L., Yeung, Y., Xue, Y., Liu, H., Feng, B.: Secure binary image steganography based on fused distortion measurement. IEEE Trans. Circ. Syst. Video Technol. 29(6), 1608–1618 (2019)

    Article  Google Scholar 

  19. Lu, W., Xue, Y., Yeung, Y., Liu, H., Huang, J., Shi, Y.: Secure halftone image steganography based on pixel density transition. IEEE Trans. Dependable Secure Comput. 18, 1137–1149 (2019)

    Google Scholar 

  20. Mese, M., Vaidyanathan, P.P.: Optimized halftoning using dot diffusion and methods for inverse halftoning. IEEE Trans. Image Process. 9(4), 691–709 (2000)

    Article  Google Scholar 

  21. Pevny, T., Bas, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Forensics Secur. 5(2), 215–224 (2010)

    Article  Google Scholar 

  22. Ulichney, R.: Digital Halftoning. MIT Press, Cambridge (1987)

    Book  Google Scholar 

  23. Yang, Z.L., Guo, X.Q., Chen, Z.M., Huang, Y.F., Zhang, Y.J.: RNN-stega: linguistic steganography based on recurrent neural networks. IEEE Trans. Inf. Forensics Secur. 14(5), 1280–1295 (2019)

    Article  Google Scholar 

  24. Yang, Z., Wang, K., Li, J., Huang, Y., Zhang, Y.J.: TS-RNN: text steganalysis based on recurrent neural networks. IEEE Sig. Process. Lett. 26(12), 1743–1747 (2019)

    Article  Google Scholar 

  25. Yang, Z., Yang, H., Hu, Y., Huang, Y., Zhang, Y.J.: Real-time steganalysis for stream media based on multi-channel convolutional sliding windows. arXiv preprint arXiv:1902.01286 (2019)

  26. Yeung, Y., Lu, W., Xue, Y., Huang, J., Shi, Y.Q.: Secure binary image steganography with distortion measurement based on prediction. IEEE Trans. Circ. Syst. Video Technol. 30(5), 1423–1434 (2020)

    Article  Google Scholar 

  27. Zhou, B., Fang, X.: Improving mid-tone quality of variable-coefficient error diffusion using threshold modulation. In: ACM Transactions on Graphics, vol. 22, pp. 437–444. ACM (2003)

    Google Scholar 

Download references

Acknowledgements

This work is supported by the Key Areas R&D Program of Guangdong (No. 2019B010136002), the National Natural Science Foundation of China (No. U2001202, No. 62072480, No. U1736118), the National Key R&D Program of China (No. 2019QY2202, No. 2019QY(Y)0207), the Key Scientific Research Program of Guangzhou (No. 201804020068).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei Lu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Luo, J., Lin, C., Zeng, L., Liang, J., Lu, W. (2021). Halftone Image Steganalysis by Reconstructing Grayscale Image. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2021. Lecture Notes in Computer Science(), vol 12737. Springer, Cham. https://doi.org/10.1007/978-3-030-78612-0_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-78612-0_33

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-78611-3

  • Online ISBN: 978-3-030-78612-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics