Skip to main content

HVS-Based Imperceptibility Evaluation for Steganography

  • Conference paper
  • 442 Accesses

Abstract

The aim of steganography is to conceal the very existence of hidden communication, so imperceptibility is the primary demand. However there are short of corresponding evaluation methods. Most researchers still use Peak-Signal-to-Noise Ratio (PSNR) for their imperceptibility evaluation, while ignoring the speciality of steganography. In this paper, firstly, we present an objective method of imperceptibility evaluation for gray image, which is based on both characteristics of steganography and human visual systems (HVS).Then, based on the color masking, metric CHPSNR for color image is proposed. CHPSNR relates embedding capacity to steganography, and can reflect the localized distortion of stego images. Extensive experimental results demonstrate that our method is superior to global PSNR, which is consistent with HVS and can effectively evaluate the performance of steganographic algorithm.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Fridrich, J., Lisonek, P., Soukal, D.: On Steganographic Embedding Efficiency. In: Information Hiding, 8th International Workshop, Alexandria, VA, pp. 282–296 (2008)

    Google Scholar 

  2. Ker, A.D.: Steganographic Strategies for a Square Distortion Function. In: Proceedings SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents, San Jose, CA (2008)

    Google Scholar 

  3. Parvez, M.T., Gutub, A.A.-A.: RGB Intensity Based Variable-Bits Image Steganography. In: Asia-Pacific Services Computing Conference, APSCC 2008, pp. 1322–1327. IEEE, Los Alamitos (2008)

    Chapter  Google Scholar 

  4. Li, X., Yang, B., Cheng, D., Zeng, T.: A Generalization of LSB Matching. IEEE Signal Processing Letters 16(2), 69–72 (2009)

    Article  Google Scholar 

  5. Xiang-wei, K., Ru-feng, C., Xiao-hu, B., Ting, Z., De-li, Y.: A Perception Evaluation Scheme for Steganography. In: Liu, J., Cheung, Y.-m., Yin, H. (eds.) IDEAL 2003. LNCS, vol. 2690, pp. 426–430. Springer, Heidelberg (2003)

    Google Scholar 

  6. Ker, A.D.: Quantitative Evaluation of Pairs and RS Steganalysis. In: Proceedings SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, pp. 83–97 (2004)

    Google Scholar 

  7. van den Branden, Lambrecht, C.J., Verscheure, Q.: Perceptual quality Measure Using a Spatio-Temporal Mode1 of the Human Visual System. In: Proceedings of SPIE, pp. 450–461 (1996)

    Google Scholar 

  8. Zhou, W., Bovik, A.C.: A Human Visual System Based Objective Video Distortion Measurement System. In: Internationa1 Conference on Multimedia Processing and Systems (2001)

    Google Scholar 

  9. Tan, S.H., Ngan, K.N.: Classified perceptual coding with adaptive quantization. IEEE Trans. Circuits System for Video Technology, 375–388 (1996)

    Google Scholar 

  10. Wang, X.-y., Y ang, H.-y., Chen, L.-k.: New Color Image Watermarking Based on Adaptive Quantization. Mini-Micro Systems, 1525–1529 (2005)

    Google Scholar 

  11. Hamad Hassan, M., Gilani, S.A.M.: A fragile watermarking scheme for color image authentication. In: Proceedings of World Academy of Science, Engineering and Technology, pp. 312–316 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Xiu-ying, M., Jia-jun, L. (2009). HVS-Based Imperceptibility Evaluation for Steganography. In: Mueller, P., Cao, JN., Wang, CL. (eds) Scalable Information Systems. INFOSCALE 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 18. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10485-5_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-10485-5_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10484-8

  • Online ISBN: 978-3-642-10485-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics