Abstract
Pixel-value differencing (PVD) based steganography is one of popular approaches for secret data hiding in the spatial domain. However, based on extensive experiments, we find that some statistical artifacts will be inevitably introduced even with a low embedding capacity in most existing PVD-based algorithms. In this paper, we first analyze the common limitations of the original PVD and its modified versions, and then propose a more secure steganography based on a content adaptive scheme. In our method, a cover image is first partitioned into small squares. Each square is then rotated by a random degree of 0, 90, 180 or 270. The resulting image is then divided into non-overlapping embedding units with three consecutive pixels, and the middle one is used for data embedding. The number of embedded bits is dependent on the differences among the three pixels. To preserve the local statistical features, the sort order of the three pixel values will remain the same after data hiding. Furthermore, the new method can first use sharper edge regions for data hiding adaptively, while preserving other smoother regions by adjusting a parameter. The experimental results evaluated on a large image database show that our method achieves much better security compared with the previous PVD-based methods.







Similar content being viewed by others
Notes
T is a threshold, the initialize setting of T is 32 in this paper.
Note that only the centre one has been changed after data hiding.
The threshold T can be extracted in a preset region in the stego.
It can be proven that such region is the same before and after data embedding using our embedding scheme. Please refer to Appendix for more details.
References
Chan CK, Cheng L-M (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37:469–474
Farid H (2002) Detecting hidden messages using higher-order statistical models. In: IEEE int. conf. on image processing, vol 2, pp II905–II908
Huang F, Li B, Huang J (2007) Attack LSB matching steganography by counting alteration rate of the number of neighbourhood gray levels. In: IEEE international conference on image processing, vol 1, pp 401–404
Ker AD (2005) Steganalysis of LSB matching in grayscale images. IEEE Signal Process Lett 12(6):441–444
Lee YK, Chen LH (2000) High capacity image steganographic model. In: Proceedings of IEE inst. elect. eng., vis. images signal process, vol 147, pp 288–294
Li B, Huang J, Shi Y (2008) Textural features based universal steganalysis. In: Proceedings of the SPIE on security, forensics, steganography and watermarking of multimedia, vol 6819, pp 681912
Li X, Zeng T, Yang B (2008), Detecting LSB matching by applying calibration technique for difference image. In: Proceedings of the 10th ACM workshop on multimedia and security, Oxford, United Kingdom, pp 133–138
Nguyen B, Yoon S, Lee H (2006) Multi bit plane image steganography. In: Proceedings of 5th int. workshop on digital watermarking, pp 61–70
Noda H, Spaulding J (2002) Bit-plane decomposition steganography combine with JPEG2000 compression. In: Proceedings of 5th int. workshop on information hiding, pp 295–309
NRCS Photo Gallery (2005) Available at: http://photogallery.nrcs.usda.gov/
Pereira S, Voloshynovskiy S, Madueno M, Marchand-Maillet S, Pun T (2001) Second generation benchmarking and application oriented evaluation. In: Information hiding workshop III, pp 340–353
Provos N (2001) Defending against statistical steganalysis. In: Proceedings of 10th conf. on USENIX security symposium
Schaefer G, Stich M (2003) Ucid: an uncompressed color image database. In: Proceedings of SPIE electronic imaging, storage and retrieval methods and applications for multimedia, vol 5307, pp 472–480
Shi Y, Xuan G, Zou D, Gao J, Yang C, Zhang Z, Chai P, Chen W, Chen C (2005) Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network. In: IEEE int. conf. on multimedia and expo
Unser M (1986) Local linear transforms for texture measurements. Signal Process 11(1):61–79
Voloshynovskiy S, Herrigel A, Baumgaertner N, Pun T (1999) A stochastic approach to content adaptive digital image watermarking. In: Workshop on information hiding, pp 211–236
Voloshynovskiy S, Pereira S, Herrigel A, Baumgartner N, Pun T (2000) Generalized watermarking attack based on watermark estimation and perceptual remodulation. In: Proceedings of SPIE, vol 3971, pp 358–370
Voloshynovskiy S, Pereira S, Iquise V, Pun T (2001) Attack modelling: towards a second generation watermarking benchmark. Signal Process 81:1177–1214
Wang Y, Moulin P (2007) Optimized feature extraction for learning-based image steganalysis. IEEE Trans. on Information Forensics and Security 2(1):31–45
Wang RZ, Lin CF, Lin JC (2001) Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn 34(3):671–683
Westfeld A (2001) F5—a steganographic algorithm high capacity despite better steganalysis. In: Proceedings of 4th int. workshop on information hiding, pp 289–302
Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24:1613–1626
Wu HC, Wu NI, Tsai CS, Hwang MS (2005) Image steganographic scheme based on pixel-value differencing and LSB replacement methods. In: Proceeding of IEE inst. elect. eng., vis. images signal process, vol 152, no 5, pp 611–615
Yang CH, Weng CY, Wang SJ, Sun HM (2008) Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans. on Information Forensics and Security 3(3):488–497
Zhang X, Wang S (2004) Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recogn Lett 25:331–339
Zhang X, Wang S (2005) Steganography using multiple-based notational system and human vison sensitivity. IEEE Signal Process Lett 12(1):66–70
Acknowledgements
This work is supported by the NSFC (60633030), 973 Program (2006CB303104), China Postdoctoral Science Foundation (20080440795), Funds of Key Lab of Fujian Province University Network Security and Cryptology (09A011) and Guangzhou Science and Technology Program (2009J1-C541-2).
Author information
Authors and Affiliations
Corresponding author
Appendix
Appendix
Figure 8 illustrates the four different cases according to the pixel values g i , g i + 1, g i + 2 within an embedding unit and a given threshold T. Note that g i and g i + 2 are fixed before and after data embedding. In this appendix, we want to show you how to determine the range of the centre pixel values \(range_{g_{i+1}'}\) so that the sort order of the three consecutive pixel values and the relationships between the pixel values and T are well preserved after data embedding.
Without loss of generality, case 1.1 is considered. Other cases can be analyzed in a similar way. In case 1.1,we have the following inequations:
Then we obtain
Namely
Since g i + 1 is an integer and belongs to [0,...,255], we can obtain
Therefore, if we limit the centre pixel value changing in the following range when doing data embedding
All the inequations in case 1.1 will hold. And this is very important to preserve some local structure features in the cover image. However, most existing PVD-based approaches will inevitably destroy such relationships and thus make it easy to detect based on the extensive experiments.
Moreover, it can be seen that the range is constrained by a threshold T. Usually, the larger the threshold T is, the narrower the range is, and thus the fewer secret bits can be embedded using our proposed method. In practice, we can change the threshold T to adjust the embedding capacity. For the short secret message, we can just use those pixels on the sharper edges (larger than T) within an image for data hiding, while keep other smooth regions (smaller than or equal to T) unchanged. If there is not enough space for the given secret message, we will decrease the threshold T to enlarge the embedding space. In such a way, our method is more adaptive with image contents. Based on our experiments and analysis, both the visual imperceptivity and security will become much better.
Please note that since all the inequations are preserved after data embedding, we can reappear the same range in the stego image, which guarantees the validity of data extraction.
Rights and permissions
About this article
Cite this article
Luo, W., Huang, F. & Huang, J. A more secure steganography based on adaptive pixel-value differencing scheme. Multimed Tools Appl 52, 407–430 (2011). https://doi.org/10.1007/s11042-009-0440-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-009-0440-3