Skip to main content
Log in

Novel steganographic method based on generalized K-distance N-dimensional pixel matching

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, a steganographic scheme adopting the concept of the generalized K d -distance N-dimensional pixel matching is proposed. The generalized pixel matching embeds a B-ary digit (B is a function of K and N) into a cover vector of length N, where the order-d Minkowski distance-measured embedding distortion is no larger than K. In contrast to other pixel matching-based schemes, a N-dimensional reference table is used. By choosing d, K, and N adaptively, an embedding strategy which is suitable for arbitrary relative capacity can be developed. Additionally, an optimization algorithm, namely successive iteration algorithm (SIA), is proposed to optimize the codeword assignment in the reference table. Benefited from the high dimensional embedding and the optimization algorithm, nearly maximal embedding efficiency is achieved. Compared with other content-free steganographic schemes, the proposed scheme provides better image quality and statistical security. Moreover, the proposed scheme performs comparable to state-of-the-art content-based approaches after combining with image models.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Abdel-Aziz B, Chouinard JY (2004) Digital watermarking. Springer, pp 277–288

  2. Bas P, Furon T (2007) BOWS-2. [Online]. Available: http://bows2.gipsa-lab.inpg.fr/

  3. Bierbrauer J, Fridrich J (2008). Trans Data Hiding Multimedia Secur III 4920:1

    Article  Google Scholar 

  4. Chao RM, Wu HC, Lee CC, Chu YP (2009) EURASIP J Inf Secur 2009. doi:10.1155/2009/658047

    Google Scholar 

  5. Chan CK (2004) Cheng, LM. Pattern Recognit 37(3):469

    Article  Google Scholar 

  6. Chang CC, Lin CJ (2011). ACM Trans Intell Syst Technol (TIST) 2(3):27

    Google Scholar 

  7. Chang CC, Lin CJ (2011). ACM Trans Intell Syst Technol (TIST) 2(3):27

    Google Scholar 

  8. Chang CC, Chou YC, Kieu TD (2008) Innovative computing information and control, 2008. ICICIC’08, 3rd International Conference on. IEEE, p 17

  9. Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography. Morgan Kaufmann

  10. Fillatre L (2012). IEEE Trans Sig Process 60(2):556

    Article  MathSciNet  Google Scholar 

  11. Fridrich J, Filler T (2007) Proceedings SPIE, EI, Security, Steganography, and Watermarking of Multimedia Contents IX, vol 6505, pp 2–3

  12. Fridrich JJ, Kodovský J (2012). IEEE Trans Inf Forensic Secur 7(3):868

    Article  Google Scholar 

  13. Fridrich J, Goljan M, Lisonĕk P, Soukal D (2005) Security, steganography, and watermarking of multimedia contents, Proceedings of SPIE. Delp EJ, Wong PW (eds) Proceedings of SPIE, vol 5681. SPIE, pp 328–340

  14. Holub V, Fridrich J (2012) Information Forensics and Security (WIFS), 2012 IEEE International Workshop on (IEEE), pp 234–239

  15. Hong W (2013). Inf Sci 221:473C489

    Article  Google Scholar 

  16. Hong W, Chen TS (2012). IEEE Trans Inf Forensic Secur 7(1):176

    Article  Google Scholar 

  17. Ker AD, Böhme R (2008) Security, forensics, steganography, and watermarking of multimedia contents X, Proceedings of SPIE electronic imaging, vol 6819. SPIE, pp 0501–0517

  18. Kodovský J, Fridrich JJ, Holub V (2012). IEEE Trans Inf Forensics Secur 7(2):432

    Article  Google Scholar 

  19. Lerch-Hostalot D., Megías D (2012) Comput Secur

  20. Liu Q, Sung AH, Qiao M (2011). ACM Trans Intell Syst Technol 2(2):1

    Article  Google Scholar 

  21. Luo W, Huang F, Huang J (2010). IEEE Trans Inf Forensic Secur 5(2):201

    Article  MathSciNet  Google Scholar 

  22. Mielikainen J (2006). IEEE Sig Process Lett 13:285–287

    Article  Google Scholar 

  23. Mitsuo G, Cheng R (1997) Genetic algorithms and engineering design, 1st edn. Wiley-Interscience, New York

    Google Scholar 

  24. Munuera C (2013) Algebraic geometry modelling in information theory, coding theory and cryptology, vol 8. World Scientific Publishing Co. Pte. Ltd.

  25. Nozaki K, Noda H, Kawaguchi E, Eason R (2005) Information modelling and knowledge bases XVI, p 2034210

  26. Pevný Tomás̆ PB, Fridrich J (2010). IEEE Trans Inf Forensics Secur 5(2):215

    Article  Google Scholar 

  27. Pevný T, Filler T, Bas P (2010) In: Böhme, R, Fong, PWL, Safavi-Naini, R (eds) Information Hiding, vol 6387. Springer, pp 161–177

  28. Sachnev V, Kim HJ (2012). EURASIP J Adv Signal Process 2012:89

    Article  Google Scholar 

  29. Sloane NJ, Conway J, et al. (1999) Sphere packings, lattices and groups, vol 290. Springer

  30. Voloshynovskiy S, Herrigel A, Baumgaertner N, Pun T (2000) Information hiding. Springer, pp 211–236

  31. Wang J, Sun Y, Xu H, Chen K, Kim HJ, Joo SH (2010). Signal Process 90(11):2954

    Article  Google Scholar 

  32. Wu K, Tan H, Liu Y, Zhang J, Zhang Q, Ni LM (2012). IEEE Trans Mobile Comput 11(8):1317

    Article  Google Scholar 

  33. Yang CH (2008). Pattern Recognit 41(8):2674C2683

    Google Scholar 

  34. Zhang X, Wang S (2006). IEEE Commun Lett 10(11):781

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Bingwen Feng or Wei Sun.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Feng, B., Lu, W. & Sun, W. Novel steganographic method based on generalized K-distance N-dimensional pixel matching. Multimed Tools Appl 74, 9623–9646 (2015). https://doi.org/10.1007/s11042-014-2140-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-014-2140-x

Keywords

Navigation