Abstract
Tradition reference table based (RTB) methods employ two pixels to conceal a secret digit according to a two-dimensional reference table. In this paper, x-dimensional reference table framework is defined, which can be regarded as generalization of the prior works. The available pixels to be embedded are limited in two-dimensional space, so the proposed methods extend the dimensional space of reference table. Theoretical analyses are given to justify the effectiveness of the proposed construction. Two novel RTB methods named CRT (cubic reference table) and CRT-PVD (cubic reference table and pixel value differencing) are presented. The former is independent of image contents while embedding, and the latter is depended on the discriminated image smoothness. Experimental results show that two proposed methods can achieve better performance compared with the prior works.
Similar content being viewed by others
References
Anderson R, Petitcolas F (1998) On the limits of steganography. IEEE J Sel Areas Commun 16(4):474–481
Cai K, Li X, Zeng T, et al (2010) Reliable histogram features for detecting LSB matching. In: Proceedings of IEEE international conference on image processing, pp 26–29
Chang CC, Chou YC, Kieu TD (2008) An information hiding scheme using sudoku. In: Proceedings of IEEE international conference on innovative computing information and control, pp 17–17
Chao RM, Wu HC, Lee CC, et al (2009) A novel image data hiding scheme with diamond encoding. EURASIP J Inf Secur 1:658047
Felgenhauer B, Jarvis F (2006) Mathematics of sudoku I. Math Spectr 39(1):15–22
Feng B, Lu W, Dai L et al (2014) Steganography based on high-dimensional reference table. In: Proceedings of the international workshop on digital watermarking, pp 574–587
Feng B, Lu W, Sun W (2015) Novel steganographic method based on generalized K-distance N-dimensional pixel matching. Multimedia Tools and Applications 74 (21):9623–9646
Fridrich J, Goljan M, Du R (2001) Reliable detection of LSB steganography in color and grayscale images. In: Proceedings of IEEE international workshop on multimedia and security, pp 27–30
Hong W (2013) Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique. Inf Sci 221(1):473–489
Hong W, Chen TS (2012) A novel data embedding method using adaptive pixel pair matching. IEEE Trans Inf Forensics Secur 7(1):176–184
Hong W, Chen TS, Shiu CW (2008) A minimal euclidean distance searching technique for sudoku steganography. In: Proceedings of IEEE international symposium on information science and engineering, vol 1, pp 515–518
Hong W, Chen TS, Shiu CW (2008) Steganography using sudoku revisited. In: Proceedings of IEEE international symposium on intelligent information technology application, vol 2, pp 935–939
Liao X, Li K, Yin J (2016) Separable data hiding in encrypted image based on compressive sensing and discrete Fourier transform. Multimedia Tools and Applications doi:10.1007/s11042-016-3971-4
Liao X, Shu C (2015) Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J Vis Commun Image Represent 28(4):21–27
Liao X, Wen Q, Zhang J (2011) A steganographic method for digital images with four-pixel differencing and modified LSB substitution. J Vis Commun Image Represent 22(1):1–8
Liao X, Wen Q, Zhang J (2012) A novel steganographic method with fourpixel differencing and exploiting modification direction. IEICE Transactions on Fundamentals E95-A(7):1189–1192
Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensics Secur 5(2):201–214
Mao Q, Bharanitharan K, Chang CC (2015) Multi-round dynamic swap optimisation for table-based steganography. IET Image Process 9(12):1073–1082
Peng F, Zhou D, Long M, et al (2017) Discrimination of natural images and computer generated graphics based on multi-fractal and regression analysis. AEU-Int J Electron C 71(1):72–81
Schaefer G, Stich M (2004) UCID-an uncompressed colour image database. In: Proceedings of SPIE, storage and retrieval methods and applications for multimedia, pp 472–480
Wang CM, Wu NI, Tsai CS, Hwang MS (2008) A high quality steganography method with pixel-value differencing and modulus function. J Syst Softw 81(1):150–158
Wang H, Wang S (2004) Cyber warfare: steganography vs. steganalysis. Commun ACM 47(10):76–82
Wang Z, Bovik AC, Sheikh HR, et al (2014) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612
Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(9-10):1613–1626
Wu HC, Wu NI, Tsai CS, Hwang MS (2005) Image steganographic scheme based on pixel-value differencing and LSB replacement methods. In: Proceedings of IEEE proceedings on vision, image and signal processing, vol 152, no 5, pp 611–615
Xia Z, Wang X, Sun X, et al (2016) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimedia Tools and Applications 75(4):1947–1962
Xia Z, Wang X, Zhang L, et al (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(11):2594–2608
Yang CH, Weng CY, Wang SJ, Sun HM (2008) Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans Inf Forensics Secur 3(3):488–497
Zhan W, Peng Z, Hong W, et al (2015) A secure data hiding method based on patched reference table and pixel value differencing technique. In: Proceedings of IEEE international conference on computational intelligence and communication networks, pp 1199–1202
Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781–783
Zhu X, Ding J, Dong H, et al (2014) Normalized correlation based quantization modulation for robust watermarking. IEEE Trans Multimedia 16(7):1888–1904
Acknowledgments
This work is supported by National Natural Science Foundation of China (Grant Nos. 61402162, 61370225, 61472131, 61272546), Hunan Provincial Natural Science Foundation of China (Grant No. 2017JJ3040), Opening Project of Shanghai Key Laboratory of Integrated Administration Technologies for Information Security (Grant No. AGK201605), CCF-Venustech Research Fund, Specialized Research Fund for the Doctoral Program of Higher Education (Grant No. 20130161120004), Science and Technology Key Projects of Hunan Province (Grant Nos. 2015TP1004, 2016JC2012).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Liao, X., Guo, S., Yin, J. et al. New cubic reference table based image steganography. Multimed Tools Appl 77, 10033–10050 (2018). https://doi.org/10.1007/s11042-017-4946-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-4946-9