Abstract
In this paper, a steganographic scheme adopting the concept of the generalized K d -distance N-dimensional pixel matching is proposed. The generalized pixel matching embeds a B-ary digit (B is a function of K and N) into a cover vector of length N, where the order-d Minkowski distance-measured embedding distortion is no larger than K. In contrast to other pixel matching-based schemes, a N-dimensional reference table is used. By choosing d, K, and N adaptively, an embedding strategy which is suitable for arbitrary relative capacity can be developed. Additionally, an optimization algorithm, namely successive iteration algorithm (SIA), is proposed to optimize the codeword assignment in the reference table. Benefited from the high dimensional embedding and the optimization algorithm, nearly maximal embedding efficiency is achieved. Compared with other content-free steganographic schemes, the proposed scheme provides better image quality and statistical security. Moreover, the proposed scheme performs comparable to state-of-the-art content-based approaches after combining with image models.
Similar content being viewed by others
References
Abdel-Aziz B, Chouinard JY (2004) Digital watermarking. Springer, pp 277–288
Bas P, Furon T (2007) BOWS-2. [Online]. Available: http://bows2.gipsa-lab.inpg.fr/
Bierbrauer J, Fridrich J (2008). Trans Data Hiding Multimedia Secur III 4920:1
Chao RM, Wu HC, Lee CC, Chu YP (2009) EURASIP J Inf Secur 2009. doi:10.1155/2009/658047
Chan CK (2004) Cheng, LM. Pattern Recognit 37(3):469
Chang CC, Lin CJ (2011). ACM Trans Intell Syst Technol (TIST) 2(3):27
Chang CC, Lin CJ (2011). ACM Trans Intell Syst Technol (TIST) 2(3):27
Chang CC, Chou YC, Kieu TD (2008) Innovative computing information and control, 2008. ICICIC’08, 3rd International Conference on. IEEE, p 17
Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography. Morgan Kaufmann
Fillatre L (2012). IEEE Trans Sig Process 60(2):556
Fridrich J, Filler T (2007) Proceedings SPIE, EI, Security, Steganography, and Watermarking of Multimedia Contents IX, vol 6505, pp 2–3
Fridrich JJ, Kodovský J (2012). IEEE Trans Inf Forensic Secur 7(3):868
Fridrich J, Goljan M, Lisonĕk P, Soukal D (2005) Security, steganography, and watermarking of multimedia contents, Proceedings of SPIE. Delp EJ, Wong PW (eds) Proceedings of SPIE, vol 5681. SPIE, pp 328–340
Holub V, Fridrich J (2012) Information Forensics and Security (WIFS), 2012 IEEE International Workshop on (IEEE), pp 234–239
Hong W (2013). Inf Sci 221:473C489
Hong W, Chen TS (2012). IEEE Trans Inf Forensic Secur 7(1):176
Ker AD, Böhme R (2008) Security, forensics, steganography, and watermarking of multimedia contents X, Proceedings of SPIE electronic imaging, vol 6819. SPIE, pp 0501–0517
Kodovský J, Fridrich JJ, Holub V (2012). IEEE Trans Inf Forensics Secur 7(2):432
Lerch-Hostalot D., Megías D (2012) Comput Secur
Liu Q, Sung AH, Qiao M (2011). ACM Trans Intell Syst Technol 2(2):1
Luo W, Huang F, Huang J (2010). IEEE Trans Inf Forensic Secur 5(2):201
Mielikainen J (2006). IEEE Sig Process Lett 13:285–287
Mitsuo G, Cheng R (1997) Genetic algorithms and engineering design, 1st edn. Wiley-Interscience, New York
Munuera C (2013) Algebraic geometry modelling in information theory, coding theory and cryptology, vol 8. World Scientific Publishing Co. Pte. Ltd.
Nozaki K, Noda H, Kawaguchi E, Eason R (2005) Information modelling and knowledge bases XVI, p 2034210
Pevný Tomás̆ PB, Fridrich J (2010). IEEE Trans Inf Forensics Secur 5(2):215
Pevný T, Filler T, Bas P (2010) In: Böhme, R, Fong, PWL, Safavi-Naini, R (eds) Information Hiding, vol 6387. Springer, pp 161–177
Sachnev V, Kim HJ (2012). EURASIP J Adv Signal Process 2012:89
Sloane NJ, Conway J, et al. (1999) Sphere packings, lattices and groups, vol 290. Springer
Voloshynovskiy S, Herrigel A, Baumgaertner N, Pun T (2000) Information hiding. Springer, pp 211–236
Wang J, Sun Y, Xu H, Chen K, Kim HJ, Joo SH (2010). Signal Process 90(11):2954
Wu K, Tan H, Liu Y, Zhang J, Zhang Q, Ni LM (2012). IEEE Trans Mobile Comput 11(8):1317
Yang CH (2008). Pattern Recognit 41(8):2674C2683
Zhang X, Wang S (2006). IEEE Commun Lett 10(11):781
Author information
Authors and Affiliations
Corresponding authors
Rights and permissions
About this article
Cite this article
Feng, B., Lu, W. & Sun, W. Novel steganographic method based on generalized K-distance N-dimensional pixel matching. Multimed Tools Appl 74, 9623–9646 (2015). https://doi.org/10.1007/s11042-014-2140-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-014-2140-x