一种基于边缘检测和最小有效位替换的图像隐写方案

IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Journal of Internet Technology Pub Date : 2023-09-01 DOI:10.53106/160792642023092405002
Hsing-Han Liu Hsing-Han Liu, Sheng-Chih Ho Hsing-Han Liu, Tai-Hsiu Wu Sheng-Chih Ho
{"title":"一种基于边缘检测和最小有效位替换的图像隐写方案","authors":"Hsing-Han Liu Hsing-Han Liu, Sheng-Chih Ho Hsing-Han Liu, Tai-Hsiu Wu Sheng-Chih Ho","doi":"10.53106/160792642023092405002","DOIUrl":null,"url":null,"abstract":"<p>This work presents a steganographic scheme based on Laplacian-of-Gaussian (LoG) edge detection and least significant bit (LSB) substitution. The cover image is first divided into continuous and non-overlapping 4&amp;times;4-pixel blocks. The pixel at the top left corner of each block (first pixel) is defined as the reference pixel. After the LoG edge detection, the blocks are classified as edge or non-edge blocks, and this information is embedded in the reference pixels. Each non-reference pixel is then embedded with 5 bits and 4 bits of cipher text if it belongs to an edge block or non-edge block, respectively. Compared to the method of Tseng and Leng, Bai et al., and Ghosal et al., proposed method increased the capacity by 39.6%, 7.3%, and 42.7%, respectively, in the &amp;ldquo;Lena&amp;rdquo; cover image. To test the generalizability of our method, an embedding capacity and image quality test were conducted using 10,000 512 &amp;times; 512 sized greyscale images from the BOSSBase dataset. Compared to the aforementioned previous methods, our method improved the capacity by 33.9%, 2.7%, and 36.1%, respectively, while maintaining an acceptable stego-image quality. Finally, proposed method can resist the detection of RS, pixel difference histogram analysis and second order SPAM features.</p> <p>&amp;nbsp;</p>","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.9000,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Image Steganographic Scheme Based on Edge Detection and Least Significant Bit Substitution\",\"authors\":\"Hsing-Han Liu Hsing-Han Liu, Sheng-Chih Ho Hsing-Han Liu, Tai-Hsiu Wu Sheng-Chih Ho\",\"doi\":\"10.53106/160792642023092405002\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>This work presents a steganographic scheme based on Laplacian-of-Gaussian (LoG) edge detection and least significant bit (LSB) substitution. The cover image is first divided into continuous and non-overlapping 4&amp;times;4-pixel blocks. The pixel at the top left corner of each block (first pixel) is defined as the reference pixel. After the LoG edge detection, the blocks are classified as edge or non-edge blocks, and this information is embedded in the reference pixels. Each non-reference pixel is then embedded with 5 bits and 4 bits of cipher text if it belongs to an edge block or non-edge block, respectively. Compared to the method of Tseng and Leng, Bai et al., and Ghosal et al., proposed method increased the capacity by 39.6%, 7.3%, and 42.7%, respectively, in the &amp;ldquo;Lena&amp;rdquo; cover image. To test the generalizability of our method, an embedding capacity and image quality test were conducted using 10,000 512 &amp;times; 512 sized greyscale images from the BOSSBase dataset. Compared to the aforementioned previous methods, our method improved the capacity by 33.9%, 2.7%, and 36.1%, respectively, while maintaining an acceptable stego-image quality. Finally, proposed method can resist the detection of RS, pixel difference histogram analysis and second order SPAM features.</p> <p>&amp;nbsp;</p>\",\"PeriodicalId\":50172,\"journal\":{\"name\":\"Journal of Internet Technology\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.9000,\"publicationDate\":\"2023-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Internet Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.53106/160792642023092405002\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Internet Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.53106/160792642023092405002","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

这项工作提出了一种基于拉普拉斯高斯(LoG)边缘检测和最低有效位(LSB)替换的隐写方案。首先将封面图像划分为连续且不重叠的4次4像素块。每个块的左上角像素(第一个像素)被定义为参考像素。经过LoG边缘检测后,将块分类为边缘块或非边缘块,并将这些信息嵌入到参考像素中。然后,如果每个非参考像素属于边缘块或非边缘块,则分别嵌入5位和4位密文。与Tseng and Leng、Bai et al.和Ghosal et al.的方法相比,该方法在Lena& ldquo;Lena”中容量分别提高了39.6%、7.3%和42.7%。封面图片。为了检验该方法的泛化性,对嵌入容量和图像质量进行了10000 ~ 512次的测试。来自BOSSBase数据集的512个大小的灰度图像。与之前的方法相比,我们的方法分别提高了33.9%,2.7%和36.1%的容量,同时保持了可接受的隐写图像质量。最后,该方法可以抵抗RS检测、像素差直方图分析和二阶SPAM特征。</p>& lt; p>,, & lt; / p>
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
An Image Steganographic Scheme Based on Edge Detection and Least Significant Bit Substitution

This work presents a steganographic scheme based on Laplacian-of-Gaussian (LoG) edge detection and least significant bit (LSB) substitution. The cover image is first divided into continuous and non-overlapping 4&times;4-pixel blocks. The pixel at the top left corner of each block (first pixel) is defined as the reference pixel. After the LoG edge detection, the blocks are classified as edge or non-edge blocks, and this information is embedded in the reference pixels. Each non-reference pixel is then embedded with 5 bits and 4 bits of cipher text if it belongs to an edge block or non-edge block, respectively. Compared to the method of Tseng and Leng, Bai et al., and Ghosal et al., proposed method increased the capacity by 39.6%, 7.3%, and 42.7%, respectively, in the &ldquo;Lena&rdquo; cover image. To test the generalizability of our method, an embedding capacity and image quality test were conducted using 10,000 512 &times; 512 sized greyscale images from the BOSSBase dataset. Compared to the aforementioned previous methods, our method improved the capacity by 33.9%, 2.7%, and 36.1%, respectively, while maintaining an acceptable stego-image quality. Finally, proposed method can resist the detection of RS, pixel difference histogram analysis and second order SPAM features.

&nbsp;

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Journal of Internet Technology
Journal of Internet Technology COMPUTER SCIENCE, INFORMATION SYSTEMS-TELECOMMUNICATIONS
CiteScore
3.20
自引率
18.80%
发文量
112
审稿时长
13.8 months
期刊介绍: The Journal of Internet Technology accepts original technical articles in all disciplines of Internet Technology & Applications. Manuscripts are submitted for review with the understanding that they have not been published elsewhere. Topics of interest to JIT include but not limited to: Broadband Networks Electronic service systems (Internet, Intranet, Extranet, E-Commerce, E-Business) Network Management Network Operating System (NOS) Intelligent systems engineering Government or Staff Jobs Computerization National Information Policy Multimedia systems Network Behavior Modeling Wireless/Satellite Communication Digital Library Distance Learning Internet/WWW Applications Telecommunication Networks Security in Networks and Systems Cloud Computing Internet of Things (IoT) IPv6 related topics are especially welcome.
期刊最新文献
Abnormal Detection Method of Transship Based on Marine Target Spatio-Temporal Data Multidimensional Concept Map Representation of the Learning Objects Ontology Model for Personalized Learning Multiscale Convolutional Attention-based Residual Network Expression Recognition A Dynamic Access Control Scheme with Conditional Anonymity in Socio-Meteorological Observation A Behaviorally Evidence-based Method for Computing Spatial Comparisons of Image Scenarios
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1