A robust steganography algorithm based on texture similarity using Gabor filter

Z.Z. Kermani, M. Jamzad
{"title":"A robust steganography algorithm based on texture similarity using Gabor filter","authors":"Z.Z. Kermani, M. Jamzad","doi":"10.1109/ISSPIT.2005.1577161","DOIUrl":null,"url":null,"abstract":"The main concern of steganography (image hiding) methods is to embed a secret image into a host image in such a way that the host should remain as similar as possible to its original version. In addition the host image should remain robust with respect to usual attacks. In this paper we present a method that tries to cover all above mentioned concerns. The secret and host images are divided into blocks of size 4 times 4. Each block in secret image is taken as a texture pattern for which the most similar block is found among the blocks of the host image. The embedding procedure is carried on by replacing these small blocks of the secret image with blocks in host image in such a way that least distortion would be imposed on it. We have used Gabor filter to measure the similarity between texture patterns. The location addresses of blocks in host image which are replaced by blocks of secret image are saved. This data is converted to a bit string and then modified by Hamming code. This bit string is embedded in DCT coefficients of the modified host image using a key which is the seed of a random number generator. Our experimental results showed a high level of capacity, robustness and minimum distortion on standard images","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"32","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISSPIT.2005.1577161","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 32

Abstract

The main concern of steganography (image hiding) methods is to embed a secret image into a host image in such a way that the host should remain as similar as possible to its original version. In addition the host image should remain robust with respect to usual attacks. In this paper we present a method that tries to cover all above mentioned concerns. The secret and host images are divided into blocks of size 4 times 4. Each block in secret image is taken as a texture pattern for which the most similar block is found among the blocks of the host image. The embedding procedure is carried on by replacing these small blocks of the secret image with blocks in host image in such a way that least distortion would be imposed on it. We have used Gabor filter to measure the similarity between texture patterns. The location addresses of blocks in host image which are replaced by blocks of secret image are saved. This data is converted to a bit string and then modified by Hamming code. This bit string is embedded in DCT coefficients of the modified host image using a key which is the seed of a random number generator. Our experimental results showed a high level of capacity, robustness and minimum distortion on standard images
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于纹理相似度的Gabor滤波鲁棒隐写算法
隐写术(图像隐藏)方法的主要关注点是将秘密图像嵌入到主机图像中,使主机尽可能保持与其原始版本相似。此外,对于通常的攻击,主机映像应该保持健壮性。在本文中,我们提出了一种方法,试图涵盖上述所有问题。秘密图像和主机图像被分成大小为4 × 4的块。将秘密图像中的每个块作为一个纹理模式,在宿主图像的块中找到最相似的块。嵌入过程是将秘密图像中的这些小块替换为宿主图像中的块,以使其受到的失真最小。我们使用Gabor滤波器来度量纹理图案之间的相似性。保存主机映像中块的位置地址,这些块被秘密映像块替换。该数据被转换为位字符串,然后由汉明码修改。该位串使用密钥嵌入到修改后的主机图像的DCT系数中,密钥是随机数生成器的种子。实验结果表明,该方法在标准图像上具有较高的容量、鲁棒性和最小的失真
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A butterfly structure for rate k/n convolutional codes Mode decision optimization issues in H.264 video coding Implementation procedure of wireless signal map matching for location-based services Speech synthesis from surface electromyogram signal A text summarizer based on meta-search
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1