Abstract
Utilizing some special pixels patterns constructing the steganalytic features is popular in binary image steganalysis, which could be also used in halftone image. There is almost no specific image steganalysis for halftone image. In this paper, a halftone image steganalysis scheme is proposed and achieves a satisfactory performance, which is totally different from the previous works focussing on some special pixels patterns. Inspired by the fact that halftoning techniques based on the low-pass characteristic of human visual system model (HVS model), the grayscale image is considered reconstructing with a Gaussian filter. And the distortions caused by embedding secret messages will still exist. After that, some common grayscale image steganalysis can be used for extracting the steganalytic features. Furthermore, a series of experiments are conducted and the experimental results show that the proposed scheme is effective on halftone image steganalysis.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bas, P., Filler, T., Pevný, T.: “Break our steganographic system”: the ins and outs of organizing BOSS. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 59–70. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-24178-9_5
Chen, J., Lu, W., Fang, Y., Liu, X., Yeung, Y., Xue, Y.: Binary image steganalysis based on local texture pattern. J. Vis. Commun. Image Represent. 55, 149–156 (2018)
Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273–297 (1995). https://doi.org/10.1007/BF00994018
Denemark, T., Sedighi, V., Holub, V., Cogranne, R., Fridrich, J.: Selection-channel-aware rich model for steganalysis of digital images. In: IEEE International Workshop on Information Forensics and Security, pp. 48–53 (2014)
Feng, B., Lu, W., Sun, W.: Binary image steganalysis based on pixel mesh Markov transition matrix. J. Vis. Commun. Image Represent. 26, 284–295 (2015)
Feng, B., Lu, W., Sun, W.: Secure binary image steganography based on minimizing the distortion on the texture. IEEE Trans. Inf. Forensics Secur. 10(2), 243–255 (2015)
Floyd, R.W., Steinberg, L.: Adaptive algorithm for spatial greyscale. Proc. SID 17, 75–77 (1976)
Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868–882 (2012)
Fu, M.S., Au, O.C.: Data hiding for halftone images. In: Security and Watermarking of Multimedia Contents II, vol. 3971, pp. 228–236. International Society for Optics and Photonics (2000)
Fu, M.S., Au, O.C.: Data hiding watermarking for halftone images. IEEE Trans. Image Process. 11(4), 477–484 (2002)
Guo, J.M.: Improved data hiding in halftone images with cooperating pair toggling human visual system. Int. J. Imaging Syst. Technol. 17(6), 328–332 (2007)
Guo, J.M., Liu, Y.F., Chang, J.Y.: High efficient direct binary search using multiple lookup tables. In: 19th IEEE International Conference on Image Processing, pp. 813–816. IEEE (2012)
Kodovsky, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Secur. 7(2), 432–444 (2011)
Kodovskỳ, J., Pevnỳ, T., Fridrich, J.: Modern steganalysis can detect YASS. In: Media Forensics and Security II, vol. 7541. International Society for Optics and Photonics (2010)
Lin, C., Lu, W., Huang, X., Liu, K., Sun, W., Lin, H.: Region duplication detection based on hybrid feature and evaluative clustering. Multimedia Tools Appl. 78(15), 20739–20763 (2019). https://doi.org/10.1007/s11042-019-7342-9
Liu, X., Lu, W., Zhang, Q., Huang, J., Shi, Y.Q.: Downscaling factor estimation on pre-jpeg compressed images. IEEE Trans. Circ. Syst. Video Technol. 30(3), 618–631 (2020)
Liu, Y.F., Guo, J.M.: Dot-diffused halftoning with improved homogeneity. IEEE Trans. Image Process. 24(11), 4581–4591 (2015)
Lu, W., He, L., Yeung, Y., Xue, Y., Liu, H., Feng, B.: Secure binary image steganography based on fused distortion measurement. IEEE Trans. Circ. Syst. Video Technol. 29(6), 1608–1618 (2019)
Lu, W., Xue, Y., Yeung, Y., Liu, H., Huang, J., Shi, Y.: Secure halftone image steganography based on pixel density transition. IEEE Trans. Dependable Secure Comput. 18, 1137–1149 (2019)
Mese, M., Vaidyanathan, P.P.: Optimized halftoning using dot diffusion and methods for inverse halftoning. IEEE Trans. Image Process. 9(4), 691–709 (2000)
Pevny, T., Bas, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Forensics Secur. 5(2), 215–224 (2010)
Ulichney, R.: Digital Halftoning. MIT Press, Cambridge (1987)
Yang, Z.L., Guo, X.Q., Chen, Z.M., Huang, Y.F., Zhang, Y.J.: RNN-stega: linguistic steganography based on recurrent neural networks. IEEE Trans. Inf. Forensics Secur. 14(5), 1280–1295 (2019)
Yang, Z., Wang, K., Li, J., Huang, Y., Zhang, Y.J.: TS-RNN: text steganalysis based on recurrent neural networks. IEEE Sig. Process. Lett. 26(12), 1743–1747 (2019)
Yang, Z., Yang, H., Hu, Y., Huang, Y., Zhang, Y.J.: Real-time steganalysis for stream media based on multi-channel convolutional sliding windows. arXiv preprint arXiv:1902.01286 (2019)
Yeung, Y., Lu, W., Xue, Y., Huang, J., Shi, Y.Q.: Secure binary image steganography with distortion measurement based on prediction. IEEE Trans. Circ. Syst. Video Technol. 30(5), 1423–1434 (2020)
Zhou, B., Fang, X.: Improving mid-tone quality of variable-coefficient error diffusion using threshold modulation. In: ACM Transactions on Graphics, vol. 22, pp. 437–444. ACM (2003)
Acknowledgements
This work is supported by the Key Areas R&D Program of Guangdong (No. 2019B010136002), the National Natural Science Foundation of China (No. U2001202, No. 62072480, No. U1736118), the National Key R&D Program of China (No. 2019QY2202, No. 2019QY(Y)0207), the Key Scientific Research Program of Guangzhou (No. 201804020068).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Luo, J., Lin, C., Zeng, L., Liang, J., Lu, W. (2021). Halftone Image Steganalysis by Reconstructing Grayscale Image. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2021. Lecture Notes in Computer Science(), vol 12737. Springer, Cham. https://doi.org/10.1007/978-3-030-78612-0_33
Download citation
DOI: https://doi.org/10.1007/978-3-030-78612-0_33
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-78611-3
Online ISBN: 978-3-030-78612-0
eBook Packages: Computer ScienceComputer Science (R0)