1. Introduction
Information hiding is a technology of embedding secret data into the media for covert communication [1]. With the rapid development of Internet, a large number of data are transmitted over the Internet. At present, the main media using for data hiding includes images, audio, and video, where digital image is the most widely used media [2]. Researchers have shown a great interest in image steganography for the last decade [3]. LSB replacement [4] is one of the most commonly used steganographic techniques, which makes full use of the characteristics that the human visual system is not sensitive to small changes in pixels and the negligible contribution of the low bit plane of the pixel to the image quality. However, this method can only add 1 or remain unchanged for the even pixels and can only decrease 1 or remain unchanged for the odd pixels. Therefore, this unbalanced embedding distortion leads to the histogram attack to the images [5, 6]. Chan et al. [7] proposed an optima pixel adjustment process (OPAP) method, which adjusted the pixels to reduce the distortion caused by least significant bit (LSB) embedding. The LSB and OPAP methods both employed one pixel as an embedding unit to embed secret message. As the development of steganography, methods using two or more pixels as a basic unit for B-ary secret information embedding were put forward. This kind of stenographic algorithm can improve the embedding capacity and image quality by subtle modifying the pixel.
In 2006, Miekikainen [11] proposed a LSB matching method. It employed two pixels as embedding unit. In this method, when payload was 1 bit per pixel, the mean square error (MSE) is 0.375, while the MSE of LSB [4] was 0.5. Zhang and Wang [12] proposed exploiting modification direction (EMD) method, which added and subtracted 1 in one pixel and embedded 2n + 1-ary secret message in n pixels. When n = 2, a quinary number was embedded in each pair of pixels. The capacity can reach the maximum
Based on the above methods, this paper simplifies the embedding procedure and designs an extraction function to construct a formula adaptive pixel pair matching (FAPPM) method. It does not need to calculate, store, and query the modified neighborhood set table, and it can realize the data hiding in any notional system.
2. A Review of Adaptive Pixel Pair Matching (APPM)
The APPM method [10] used a pair of pixels
(i)
In the neighborhood set
(ii)
In the neighborhood set
(iii)
According to
The way to find the extraction function coefficient
Minimize
According to the above,
Table 1
Extraction Function Coefficient
| | | | | | | | | | | | | | |
| ||||||||||||||
1 | 1 | 2 | 2 | 2 | 2 | 3 | 3 | 3 | 3 | 4 | 5 | 4 | 4 | 6 |
| ||||||||||||||
| | | | | | | | | | | | | | |
| ||||||||||||||
4 | 4 | 4 | 8 | 4 | 5 | 5 | 5 | 5 | 10 | 5 | 5 | 5 | 12 | 12 |
| ||||||||||||||
| | | | | | | | | | | | | | |
| ||||||||||||||
7 | 6 | 6 | 10 | 15 | 6 | 16 | 7 | 7 | 6 | 12 | 12 | 8 | 7 | 7 |
| ||||||||||||||
| | | | | | | | | | | | | | |
| ||||||||||||||
7 | 7 | 14 | 14 | 9 | 22 | 8 | 12 | 21 | 16 | 24 | 22 | 9 | 8 | 8 |
| ||||||||||||||
| | |||||||||||||
| ||||||||||||||
14 | 14 |
[figures omitted; refer to PDF]
Compared with DE and EMD method, APPM has the flexibility to choose a better notational system for data embedding to decrease the image distortion. The selection of B-ary system is determined by the size of the cover image C. Given the size of C is M×N, B is the minimum value satisfying
3. The Proposed Formula Adaptive Pixel Pair Matching Method (FAPPM)
In order to solve the above shortcomings, this paper puts forward a formula adaptive pixel pair matching embedding method to find the stego-pixel pair without a neighborhood set.
3.1. Embedding Procedure
In the embedding procedure, four vectors at most are produced. Two vectors are calculated when D>0, and the other two vectors are calculated when D<0. In Algorithm 1, i represents vectors 1 to 4 in turn. Figure 2 shows the embedding process overview.
Algorithm 1
Input: A pixel pair
Output: Stego pixel pair
Step
Step
Step
Step
Step
Step
End While
Example 1.
For a cover pixels pair
Step 1.
Calculate
Step 2.
Calculate
Step 3.
Calculate
(1)
Round 1:
(2)
(3)
Round 2:
(4)
(5)
Round 3:
(6)
3.2. Extraction Procedure
Through extraction function, secret digits can be extracted from the stego image. The detailed process is given in Algorithm 2.
Algorithm 2
Input: stego image
Output: Secret data.
Step
Step
Step
3.3. Overflow Problem and Solution
If an overflow or underflow problem occurs, that is,
4. Experimental Results and Analysis
4.1. Experimental Results
The experiments are performed using Matlab R2013a, and eight
[figures omitted; refer to PDF]
[figures omitted; refer to PDF]
As seen from Figures 3 and 4, the difference between the cover images and the corresponding stego images is very little and can not be distinguished by human’s eyes. It illustrated the good imperceptibility of the proposed method.
As message embedding, it will introduce the distortion in the image. Peak signal-to-noise ratio (PSNR) is usually used to measure the quality of image. The definition of PSNR is as follows:
As the proposed method can embed secret digit in any notional system, experiments are done to test the relationship between embedding payload and image quality, and the results are shown in Figure 5. It can be found that the PSNR is decreased as the embedding capacity is increased. However, the PSNR still achieved a high value when the embedding capacity reached 1%.
[figure omitted; refer to PDF]4.2. Comparison with Other Methods
Here EMD [8], EMD-3 [9], APPM, and FAPPM are compared from six aspects: the embedding method, the national system, payload, capacity, PSNR, and the storage space. The results are listed in Table 2. As seen from Table 2, FAPPM method uses a mathematical method to embed secret data and it does not need any space to store neighbor table; furthermore, it does not affect the capacity and image quality.
Table 2
Comparison of results.
Contents of comparison | EMD[8] | EMD-3[9] | APPM[10] | Proposed FAPPM |
---|---|---|---|---|
Embedding method | Matrix and search | Matrix and search | table look-up | Mathematic method |
Notational systems of B-ary | fixed | fixed | arbitrary | arbitrary |
Payload (bpp) B=25 | 2.471 | 2.471 | 2.32 | 2.32 |
PSNR (dB) | 43.9 | 42.9 | 48.1 | 48.1 |
Need the storage space | Yes | Yes | Yes | No |
4.3. Analysis of the Security
Anti-steganalysis is one of the most important criteria to measure the performance of a steganographic method. In this paper, a detection method based on histogram differential statistics analysis proposed by Zhao [18] is used to test the security of the FAPPM method. Normally, in an image with no hiding message, the horizontal difference histogram
[figures omitted; refer to PDF]
The RS attack method can detect LSB secret data embedding in grayscale or color images. Each pixel block is classified into the regular group
5. Conclusion
This paper proposed a simple and convenient data embedding method based on APPM. Compared with the APPM method, it has the advantage of no needing to compute and store the neighborhood set. Compared with the FDEMD method, the secret data of any notional system is realized by the FAPPM method, which makes the embedding notational system selection more flexible. The experimental results showed that FAPPM method has high image quality and the strong anti-steganalysis ability. Our future work will be concentrated on the use of the formula method of the adjacent three pixels as the embedding unit.
Conflicts of Interest
The authors declare that they have no conflicts of interest.
Acknowledgments
This work was supported in part by project supported by National Natural Science Foundation of China (Grant no. 61572182, no. 61370225) and project supported by Hunan Provincial Natural Science Foundation of China (Grant no. 15JJ2007).
[1] J. Fridrich, Steganography in Digital Media: Principles, Algorithms, and Applications, 2009.
[2] A. Cheddad, J. Condell, K. Curran, P. Mc Kevitt, "Digital image steganography: survey and analysis of current methods," Signal Processing, vol. 90 no. 3, pp. 727-752, DOI: 10.1016/j.sigpro.2009.08.010, 2010.
[3] M. Hussain, A. W. Wahab, Y. I. Idris, A. T. Ho, K. Jung, "Image steganography in spatial domain: A survey," Signal Processing: Image Communication, vol. 65, pp. 46-66, DOI: 10.1016/j.image.2018.03.012, 2018.
[4] N. Provos, P. Honeyman, "Hide and seek: an introduction to steganography," IEEE Security & Privacy, vol. 1 no. 3, pp. 32-44, DOI: 10.1109/msecp.2003.1203220, 2003.
[5] J. Fridrich, M. Goljan, R. Du, "Reliable Detection of LSB Steganography in Color and Grayscale Images," The Workshop on Multimedia & Security: New Challenges ACM, pp. 22-28, 2002.
[6] A. D. Ker, "Steganalysis of LSB matching in grayscale images," IEEE Signal Processing Letters, vol. 12 no. 6, pp. 441-444, DOI: 10.1109/LSP.2005.847889, 2005.
[7] C.-K. Chan, L. M. Cheng, "Hiding data in images by simple LSB substitution," Pattern Recognition, vol. 37 no. 3, pp. 469-474, DOI: 10.1016/j.patcog.2003.08.007, 2004.
[8] C. Kim, "Data hiding by an improved exploiting modification direction," Multimedia Tools and Applications, vol. 69 no. 3, pp. 569-584, DOI: 10.1007/s11042-012-1114-0, 2014.
[9] X. Niu, M. Ma, R. Tang, Z. Yin, "Image steganography via fully exploiting modification direction," International Journal of Security and Its Applications, vol. 9 no. 5, pp. 243-254, 2015.
[10] W. Hong, T.-S. Chen, "A novel data embedding method using adaptive pixel pair matching," IEEE Transactions on Information Forensics and Security, vol. 7 no. 1, pp. 176-184, DOI: 10.1109/TIFS.2011.2155062, 2012.
[11] J. Mielikainen, "LSB matching revisited," IEEE Signal Processing Letters, vol. 13 no. 5, pp. 285-287, DOI: 10.1109/LSP.2006.870357, 2006.
[12] X. Zhang, S. Wang, "Efficient steganographic embedding by exploiting modification direction," IEEE Communications Letters, vol. 10 no. 11, pp. 781-783, DOI: 10.1109/LCOMM.2006.060863, 2006.
[13] R. Chao, H. Wu, C. Lee, Y. Chu, "A Novel Image Data Hiding Scheme with Diamond Encoding," EURASIP Journal on Information Security, vol. 2009 no. 1,DOI: 10.1186/1687-417X-2009-658047, 2009.
[14] W.-C. Kuo, P.-Y. Lai, C.-C. Wang, L.-C. Wuu, "A formula diamond encoding data hiding scheme," Journal of Information Hiding and Multimedia Signal Processing, vol. 6 no. 6, pp. 1167-1176, 2015.
[15] W. Hong, M. Chen, T. Chen, C. Huang, "An efficient authentication method for AMBTC compressed images using adaptive pixel pair matching," Multimedia Tools & Applications, vol. 77 no. 4, pp. 4677-4695, DOI: 10.1007/s11042-017-4899-z, 2018.
[16] T. Edwina Alias, D. Mathew, A. Thomas, "Steganographic Technique Using Secure Adaptive Pixel Pair Matching for Embedding Multiple Data Types in Images," Proceedings of the 5th International Conference on Advances in Computing and Communications, ICACC 2015, pp. 426-429, .
[17] J. Pappachan, J. Baby, "Transformed adaptive pixel pair matching technique for colour images," Proceedings of the International Conference on Control, Instrumentation, Communication and Computational Technologies, ICCICCT 2015, pp. 192-196, .
[18] H. Zhao, H. Wang, M. Khurram Khan, "Statistical analysis of several reversible data hiding algorithms," Multimedia Tools and Applications, vol. 52 no. 2-3, pp. 277-290, DOI: 10.1007/s11042-009-0380-y, 2011.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Copyright © 2018 Min Long and Fenfang Li. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0/
Abstract
Pixel pair matching (PPM) is widely used in digital image steganography. As an important derivation, adaptive pixel pair matching method (APPM) offers low distortion and allows embedded digits in any notational system. However, APPM needs additional space to store, calculate, and query neighborhood set, which needs extra cost. To solve these problems, a formula adaptive pixel pair matching (FAPPM) method is proposed in this paper. The basic idea of FAPPM is to use the formula to get the stego image pixel pair without searching the neighborhood set for the given image pixel pair. This will allow users to embed secret message directly without storing and searching the look-up table. Experimental results and analysis show that the proposed method could embed secret data directly without searching the neighborhood sets by using a formula and it still maintains flexibility in the selection of notional system, high image quality, and strong anti-steganalysis ability.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details

1 College of Computer and Communication Engineering, Changsha University of Science and Technology, 410114, China; Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation, Changsha University of Science and Technology, Changsha, Hunan Province 410114, China
2 College of Computer and Communication Engineering, Changsha University of Science and Technology, 410114, China