Skip to main content

Improved WOW Adaptive Image Steganography Method

  • Conference paper
  • First Online:
Algorithms and Architectures for Parallel Processing (ICA3PP 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9530))

Abstract

Currently, the most secure adaptive image steganographic methods for spatial domain are to design cost functions to minimize embedding distortion. Wavelet Obtained Weights (WOW) is one of these methods, which can adaptively embed secret message into cover image according to textural complexity. In this paper, an improved WOW adaptive image steganography method is proposed. We apply a binary stochastic matrix to preprocess the cover image to generate a new image firstly, which helps to reduce the probability of locating embedding change positions by stego image. Then, three directional filters are used to weigh the embedding cost of each pixel in the new image and the syndrome-trellis codes are applied to minimize the distortion. Experimental results demonstrate that the proposed method achieves a better performance on resisting the state-of-the-art steganalysis over prior works.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Anderson, R.J., Petitcolas, F.A.: On the limits of steganography. IEEE J. Sel. Areas Commun. 16(4), 474–481 (1998)

    Article  Google Scholar 

  2. Petitcolas, F.A., Anderson, R.J., Kuhn, M.G.: Information hiding-a survey. Proc. IEEE 87(7), 1062–1078 (1999)

    Article  Google Scholar 

  3. Wang, H., Wang, S.: Cyber warfare: steganography vs. steganalysis. Commun. ACM 47(10), 76–82 (2004)

    Article  Google Scholar 

  4. Pevný, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: Böhme, R., Fong, P.W., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 161–177. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  5. Filler, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Foren. Secur. 6(3), 920–935 (2011)

    Article  Google Scholar 

  6. Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 234–239 (2012)

    Google Scholar 

  7. Pevný, T., Bas, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Foren. Secur. 5(2), 215–224 (2010)

    Article  Google Scholar 

  8. Fridrich, J., Kodovský, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Foren. Secur. 7(3), 868–882 (2012)

    Article  Google Scholar 

  9. Tang, W., Li, H., Luo, W., Huang, J.: Adaptive steganalysis against WOW embedding algorithm. In: Proceedings of the 2nd ACM Workshop on Information Hiding and Multimedia Security, pp. 91–96 (2014)

    Google Scholar 

  10. Bas, P., Filler, T., Pevný, T.: “Break our steganographic system”: the ins and outs of organizing BOSS. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 59–70. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  11. Kodovský, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Foren. Secur. 7(2), 432–444 (2012)

    Article  Google Scholar 

Download references

Acknowledgment

This work is supported by National Natural Science Foundation of China (Grant No. 61402162), Hunan Provincial Natural Science Foundation of China (Grant No. 14JJ7024), Specialized Research Fund for the Doctoral Program of Higher Education (Grant No. 20130161120004), China Postdoctoral Science Foundation (Grant No. 2014M560123), Young Teacher Foundation of Hunan University (Grant No. 531107040701).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xin Liao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Liao, X., Chen, G., Li, Q., Liu, J. (2015). Improved WOW Adaptive Image Steganography Method. In: Wang, G., Zomaya, A., Martinez, G., Li, K. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2015. Lecture Notes in Computer Science(), vol 9530. Springer, Cham. https://doi.org/10.1007/978-3-319-27137-8_50

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27137-8_50

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27136-1

  • Online ISBN: 978-3-319-27137-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics