Skip to main content
Log in

A more secure steganography based on adaptive pixel-value differencing scheme

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Pixel-value differencing (PVD) based steganography is one of popular approaches for secret data hiding in the spatial domain. However, based on extensive experiments, we find that some statistical artifacts will be inevitably introduced even with a low embedding capacity in most existing PVD-based algorithms. In this paper, we first analyze the common limitations of the original PVD and its modified versions, and then propose a more secure steganography based on a content adaptive scheme. In our method, a cover image is first partitioned into small squares. Each square is then rotated by a random degree of 0, 90, 180 or 270. The resulting image is then divided into non-overlapping embedding units with three consecutive pixels, and the middle one is used for data embedding. The number of embedded bits is dependent on the differences among the three pixels. To preserve the local statistical features, the sort order of the three pixel values will remain the same after data hiding. Furthermore, the new method can first use sharper edge regions for data hiding adaptively, while preserving other smoother regions by adjusting a parameter. The experimental results evaluated on a large image database show that our method achieves much better security compared with the previous PVD-based methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Notes

  1. T is a threshold, the initialize setting of T is 32 in this paper.

  2. Note that only the centre one has been changed after data hiding.

  3. The threshold T can be extracted in a preset region in the stego.

  4. It can be proven that such region is the same before and after data embedding using our embedding scheme. Please refer to Appendix for more details.

References

  1. Chan CK, Cheng L-M (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37:469–474

    Article  MATH  Google Scholar 

  2. Farid H (2002) Detecting hidden messages using higher-order statistical models. In: IEEE int. conf. on image processing, vol 2, pp II905–II908

  3. Huang F, Li B, Huang J (2007) Attack LSB matching steganography by counting alteration rate of the number of neighbourhood gray levels. In: IEEE international conference on image processing, vol 1, pp 401–404

  4. Ker AD (2005) Steganalysis of LSB matching in grayscale images. IEEE Signal Process Lett 12(6):441–444

    Article  Google Scholar 

  5. Lee YK, Chen LH (2000) High capacity image steganographic model. In: Proceedings of IEE inst. elect. eng., vis. images signal process, vol 147, pp 288–294

  6. Li B, Huang J, Shi Y (2008) Textural features based universal steganalysis. In: Proceedings of the SPIE on security, forensics, steganography and watermarking of multimedia, vol 6819, pp 681912

  7. Li X, Zeng T, Yang B (2008), Detecting LSB matching by applying calibration technique for difference image. In: Proceedings of the 10th ACM workshop on multimedia and security, Oxford, United Kingdom, pp 133–138

  8. Nguyen B, Yoon S, Lee H (2006) Multi bit plane image steganography. In: Proceedings of 5th int. workshop on digital watermarking, pp 61–70

  9. Noda H, Spaulding J (2002) Bit-plane decomposition steganography combine with JPEG2000 compression. In: Proceedings of 5th int. workshop on information hiding, pp 295–309

  10. NRCS Photo Gallery (2005) Available at: http://photogallery.nrcs.usda.gov/

  11. Pereira S, Voloshynovskiy S, Madueno M, Marchand-Maillet S, Pun T (2001) Second generation benchmarking and application oriented evaluation. In: Information hiding workshop III, pp 340–353

  12. Provos N (2001) Defending against statistical steganalysis. In: Proceedings of 10th conf. on USENIX security symposium

  13. Schaefer G, Stich M (2003) Ucid: an uncompressed color image database. In: Proceedings of SPIE electronic imaging, storage and retrieval methods and applications for multimedia, vol 5307, pp 472–480

  14. Shi Y, Xuan G, Zou D, Gao J, Yang C, Zhang Z, Chai P, Chen W, Chen C (2005) Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network. In: IEEE int. conf. on multimedia and expo

  15. Unser M (1986) Local linear transforms for texture measurements. Signal Process 11(1):61–79

    Article  MathSciNet  Google Scholar 

  16. Voloshynovskiy S, Herrigel A, Baumgaertner N, Pun T (1999) A stochastic approach to content adaptive digital image watermarking. In: Workshop on information hiding, pp 211–236

  17. Voloshynovskiy S, Pereira S, Herrigel A, Baumgartner N, Pun T (2000) Generalized watermarking attack based on watermark estimation and perceptual remodulation. In: Proceedings of SPIE, vol 3971, pp 358–370

  18. Voloshynovskiy S, Pereira S, Iquise V, Pun T (2001) Attack modelling: towards a second generation watermarking benchmark. Signal Process 81:1177–1214

    Article  MATH  Google Scholar 

  19. Wang Y, Moulin P (2007) Optimized feature extraction for learning-based image steganalysis. IEEE Trans. on Information Forensics and Security 2(1):31–45

    Article  Google Scholar 

  20. Wang RZ, Lin CF, Lin JC (2001) Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn 34(3):671–683

    Article  MATH  Google Scholar 

  21. Westfeld A (2001) F5—a steganographic algorithm high capacity despite better steganalysis. In: Proceedings of 4th int. workshop on information hiding, pp 289–302

  22. Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24:1613–1626

    Article  MATH  Google Scholar 

  23. Wu HC, Wu NI, Tsai CS, Hwang MS (2005) Image steganographic scheme based on pixel-value differencing and LSB replacement methods. In: Proceeding of IEE inst. elect. eng., vis. images signal process, vol 152, no 5, pp 611–615

  24. Yang CH, Weng CY, Wang SJ, Sun HM (2008) Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans. on Information Forensics and Security 3(3):488–497

    Article  Google Scholar 

  25. Zhang X, Wang S (2004) Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recogn Lett 25:331–339

    Article  Google Scholar 

  26. Zhang X, Wang S (2005) Steganography using multiple-based notational system and human vison sensitivity. IEEE Signal Process Lett 12(1):66–70

    Google Scholar 

Download references

Acknowledgements

This work is supported by the NSFC (60633030), 973 Program (2006CB303104), China Postdoctoral Science Foundation (20080440795), Funds of Key Lab of Fujian Province University Network Security and Cryptology (09A011) and Guangzhou Science and Technology Program (2009J1-C541-2).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jiwu Huang.

Appendix

Appendix

Figure 8 illustrates the four different cases according to the pixel values g i , g i + 1, g i + 2 within an embedding unit and a given threshold T. Note that g i and g i + 2 are fixed before and after data embedding. In this appendix, we want to show you how to determine the range of the centre pixel values \(range_{g_{i+1}'}\) so that the sort order of the three consecutive pixel values and the relationships between the pixel values and T are well preserved after data embedding.

Fig. 8
figure 8

Four different cases according to the values of g i ,g i + 1,g i + 2

Without loss of generality, case 1.1 is considered. Other cases can be analyzed in a similar way. In case 1.1,we have the following inequations:

$$ g_{i+1}<g_i, g_{i+1}<g_{i+2}, \big|d_1\big|>T, \big|d_2\big|>T $$

Then we obtain

$$ \big|d_1\big|=\big|g_i-g_{i+1}\big|=g_i-g_{i+1}>T, \big|d_2\big|=\big|g_{i+1}-g_{i+2}\big|=g_{i+2}-g_{i+1}>T $$

Namely

$$ g_{i+1}<g_i-T, g_{i+1}<g_{i+2}-T $$

Since g i + 1 is an integer and belongs to [0,...,255], we can obtain

$$ g_{i+1}\in \big[0, \ldots ,min\big(g_i-T-1,g_{i+2}-T-1\big)\big] $$

Therefore, if we limit the centre pixel value changing in the following range when doing data embedding

$$range_{g_{i+1}'}=[0, \ldots ,min(g_i-T-1,g_{i+2}-T-1)]$$

All the inequations in case 1.1 will hold. And this is very important to preserve some local structure features in the cover image. However, most existing PVD-based approaches will inevitably destroy such relationships and thus make it easy to detect based on the extensive experiments.

Moreover, it can be seen that the range is constrained by a threshold T. Usually, the larger the threshold T is, the narrower the range is, and thus the fewer secret bits can be embedded using our proposed method. In practice, we can change the threshold T to adjust the embedding capacity. For the short secret message, we can just use those pixels on the sharper edges (larger than T) within an image for data hiding, while keep other smooth regions (smaller than or equal to T) unchanged. If there is not enough space for the given secret message, we will decrease the threshold T to enlarge the embedding space. In such a way, our method is more adaptive with image contents. Based on our experiments and analysis, both the visual imperceptivity and security will become much better.

Please note that since all the inequations are preserved after data embedding, we can reappear the same range in the stego image, which guarantees the validity of data extraction.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Luo, W., Huang, F. & Huang, J. A more secure steganography based on adaptive pixel-value differencing scheme. Multimed Tools Appl 52, 407–430 (2011). https://doi.org/10.1007/s11042-009-0440-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-009-0440-3

Keywords

Navigation