DOI QR코드

DOI QR Code

A Model-Based Image Steganography Method Using Watson's Visual Model

  • Fakhredanesh, Mohammad (Department of Computer Engineering and Information Technology, Amirkabir University of Technology) ;
  • Safabakhsh, Reza (Department of Computer Engineering and Information Technology, Amirkabir University of Technology) ;
  • Rahmati, Mohammad (Department of Computer Engineering and Information Technology, Amirkabir University of Technology)
  • Received : 2013.02.18
  • Accepted : 2013.11.05
  • Published : 2014.06.01

Abstract

This paper presents a model-based image steganography method based on Watson's visual model. Model-based steganography assumes a model for cover image statistics. This approach, however, has some weaknesses, including perceptual detectability. We propose to use Watson's visual model to improve perceptual undetectability of model-based steganography. The proposed method prevents visually perceptible changes during embedding. First, the maximum acceptable change in each discrete cosine transform coefficient is extracted based on Watson's visual model. Then, a model is fitted to a low-precision histogram of such coefficients and the message bits are encoded to this model. Finally, the encoded message bits are embedded in those coefficients whose maximum possible changes are visually imperceptible. Experimental results show that changes resulting from the proposed method are perceptually undetectable, whereas model-based steganography retains perceptually detectable changes. This perceptual undetectability is achieved while the perceptual quality - based on the structural similarity measure - and the security - based on two steganalysis methods - do not show any significant changes.

Keywords

References

  1. L.M. Marvel, C.G. Boncelet, and C.T. Retter, "Spread Spectrum Image Steganography," IEEE Trans. Image Process., vol. 8, no. 8, Aug. 1999, pp. 1075-1083. https://doi.org/10.1109/83.777088
  2. A. Cheddad et al., "Digital Image Steganography: Survey and Analysis of Current Methods," Signal Process., vol. 90, no. 3, Mar. 2010, pp. 727-752. https://doi.org/10.1016/j.sigpro.2009.08.010
  3. J. Fridrich and R. Du, "Secure Steganographic Methods for Palette Images," Proc. IH, Dresden, Germany, Sept. 29 - Oct. 1, 1999, pp. 47-60.
  4. A.B. Watson, "DCT Quantization Matrices Visually Optimized for Individual Images," Proc. SPIE, San Jose, CA, USA, vol. 1913, Jan. 31, 1993, pp. 202-216.
  5. I.J. Cox et al., Digital Watermarking and Steganography, 2nd ed., Burlington: Morgan Kaufmann, 2008.
  6. P. Sallee, "Model-Based Steganography," Digit. Watermarking, LNCS, Seoul, Rep. of Korea, vol. 2939, Oct. 20-22, 2004, pp. 154-167.
  7. J. Fridrich, "Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes," Proc. IH, LNCS, Toronto, Canada, vol. 3200, May 23-25, 2005, pp. 67-81.
  8. R. Bohme and A. Westfeld, "Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics," Proc. ESORICS, LNCS, vol. 3193, 2004, pp. 125-140.
  9. G. Wallace, "The JPEG Still Picture Compression Standard," IEEE Trans. Consum. Electron., vol. 38, no. 1, Feb. 1992, pp. 18-34.
  10. A.J. Ahumada and H.A. Peterson, "Luminance-Model-Based DCT Quantization for Color Image Compression," Proc. SPIE, Human Vis., Visual Process. Digital Display III, San Jose, CA, USA, vol. 1666, Aug. 27, 1992, pp. 365-374.
  11. H.A. Peterson et al., "Quantization of Color Image Components in the DCT Domain," Proc. SPIE, Human Vis., Visual Process., Digital Display II, San Jose, CA, USA vol. 1453, June 1, 1991, pp. 210-222.
  12. C.I. Podilchuk and W. Zeng, "Perceptual Watermarking of Still Images," Proc. IEEE Multimedia Signal Process., Princeton, NJ, USA, June 23-25, 1997, pp. 363-368.
  13. M.S. Kankanhalli, Rajmohan, and K.R. Ramakrishnan, "Content Based Watermarking of Images," Proc. MULTIMEDIA, Bristol, UK, Sept. 1998, pp. 61-70.
  14. M. Awrangjeb and M. Kankanhalli, "Reversible Watermarking Using a Perceptual Model," J. Electron. Imag., vol. 14, no. 1, Mar. 30, 2005, pp. 1-8.
  15. J.F. Delaigle, C. de Vleeschouwer, and B. Macq, "Watermarking Algorithm Based on a Human Visual Model," Signal Process., vol. 66, no. 3, May 28, 1998, pp. 319-335. https://doi.org/10.1016/S0165-1684(98)00013-9
  16. M. Awrangjeb and M.S. Kankanhalli, "Lossless Watermarking Considering the Human Visual System," Digit. Watermarking, LNCS, Seoul, Rep. of Korea, vol. 2939, Oct. 20-22, 2003, pp. 581-592.
  17. G. Zhu and N. Sang, "An Adaptive Quantitative Information Hiding Algorithm Based on DCT Domain of New Visual Model," Proc. ISISE, Shanghai, China, vol. 1, Dec. 20-22, 2008, pp. 546-550.
  18. N. Ahmidi and A.L. Neyestanak, "A Human Visual Model for Steganography," Proc. CCECE, Niagara Falls, ON, USA, May 4-7, 2008, pp. 1077-1080.
  19. R. Hu, F. Chen, and H. Yu, "Incorporating Watson's Perceptual Model into Patchwork Watermarking for Digital Images," Proc. ICIP, Hong Kong, China, Sept. 26-29, 2010, pp. 3705-3708.
  20. T.H. Chen, G. Horng, and S.H. Wang, "A Robust Wavelet-Based Watermarking Scheme Using Quantization and Human Visual System Model," Pakistan J. Inf. Technol., vol. 2, no. 3, 2003, pp. 213-230. https://doi.org/10.3923/itj.2003.213.230
  21. Y.J. Jung, M. Hahn, and Y.M. Ro, "Spatial Frequency Band Division in Human Visual System Based Watermarking," Proc. IWDW, Seoul, Rep. of Korea, vol. 2613, Nov. 21-22, 2003, pp. 224-234.
  22. J. Porter and P. Rajan, "Image Adaptive Watermarking Techniques Using Models of the Human Visual System," Proc. SSST, Cookeville, TN, USA, Mar. 5-7, 2006, pp. 354-357.
  23. M. Jayalakshmi, S.N. Merchant, and U.B. Desai, "Significant Pixel Watermarking Using Human Visual System Model in Wavelet Domain," Proc. ICVGIP, Madurai, India, Dec. 13-16, 2006, pp. 206-215.
  24. O.H. Kwon, Y.S. Kim, and R.H. Park, "Watermarking for Still Images Using the Human Visual System in the DCT Domain," Proc. ISCAS, Orlando, FL, USA, vol. 4, July 1999, pp. 76-79.
  25. S.W. Jung, L.T. Ha, and S.J. Ko, "A New Histogram Modification Based Reversible Data Hiding Algorithm Considering the Human Visual System," IEEE Signal Process. Lett., vol. 18, no. 2, Feb. 2011, pp. 95-98. https://doi.org/10.1109/LSP.2010.2095498
  26. X. Zhang and S. Wang, "Steganography Using Multiple-base Notational System and Human Vision Sensitivity," IEEE Signal Process. Lett., vol. 12, no. 1, Jan. 2005, pp. 67-70. https://doi.org/10.1109/LSP.2004.838214
  27. Y. Li et al., "An Adaptive Blind Watermarking Algorithm Based on DCT and Modified Watson's Visual Model," Proc. ISECS, Guangzhou, China, Aug. 3-5, 2008, pp. 904-907.
  28. D.C. Lou, J.L. Liu, and M.C. Hu, "Adaptive Digital Watermarking Using Neural Network Technique," Proc. IEEE, ICCST, Oct. 14-16, 2003, pp. 325-332.
  29. Y. Zhang, "Blind Watermark Algorithm Based on HVS, and RBF Neural Network in DWT Domain," WSEAS, Stevens Point, WI, USA, vol. 8, no. 1, Jan. 2009, pp. 174-183.
  30. S. Oueslati, A. Cherif, and B. Solaiman, "A Fuzzy Watermarking Approach Based on the Human Visual System," Int. J. Image Process., vol. 4, no. 3, 2010, pp. 218-231.
  31. D. Levicky and P. Foris, "Human Visual System Models in Digital Image Watermarking," Radioeng., vol. 13, no. 4, Dec. 2004, pp. 38-43.
  32. G. Xie, M. Swamy, and M.O. Ahmad, "Perceptual-Shaping Comparison of DWT-Based Pixel-Wise Masking Model with DCT-Based Watson Model," Proc. IEEE, ICIP, Atlanta, GA, USA, Oct. 8-11, 2006, pp. 1381-1384.
  33. F. Pan et al., "Steganography Based on Minimizing Embedding Impact Function and HVS," Proc. ICECC, Zhejiang, China, Sept. 9-11, 2011, pp. 490-493.
  34. Z. Shu et al., "Watermarking Algorithm Based on Contourlet Transform and Human Visual Model," Proc. ICESS, Sichuan, China, July 29-31, 2008, pp. 348-352.
  35. Z. Shu et al., "Watermarking Algorithm Based on Curvelet Transform and Human Visual Model," Proc. ISECS, Nanchang, China, vol. 1, May 22-24, 2009, pp. 208-212.
  36. Y.S. Kim, O.H. Kwon, and R.H. Park, "Wavelet Based Watermarking Method for Digital Images Using the Human Visual System," Proc. IEEE, ISCAS, Orlando, FL, USA, vol. 4, July 1999, pp. 80-83.
  37. A. Westfeld, "F5-A Steganographic Algorithm," Proc. IH, Pittsburgh, PA, USA, Apr. 25-27, 2001, pp. 289-302.
  38. N. Provos, "Defending Against Statistical Steganalysis," Proc. USENIX Security Symp., Washington, WA, USA, Aug. 13-17, 2001, pp. 323-335.
  39. T. Cover and J. Thomas, Elements of Information Theory, NY: Wiley, New York, 1991.
  40. "BOSSBase (v1.01)." Accessed Jan. 2013. http://exile.felk.cvut.cz/boss/BOSS Final/index.php?mode=VIEW&tmpl=materials
  41. Z. Wang et al., "Image Quality Assessment: From Error Visibility to Structural Similarity," IEEE Trans. Image Process., vol. 13, no. 4, Apr. 2004, pp. 600-612. https://doi.org/10.1109/TIP.2003.819861
  42. T. Pevny and J. Fridrich, "Merging Markov and DCT Features for Multi-class JPEG Steganalysis," Proc. SPIE, San Jose, CA, USA, vol. 6505, Jan. 28, 2007.
  43. J. Kodovsky and J. Fridrich, "Calibration Revisited," Proc. ACM MM & Sec., Princeton, NJ, USA, Sept. 7-8, 2009, pp. 63-74.
  44. J. Kodovsky, J. Fridrich, and V. Holub, "Ensemble Classifiers for Steganalysis of Digital Media," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, Apr. 2012, pp. 432-444. https://doi.org/10.1109/TIFS.2011.2175919
  45. H. Farid, "Detecting Hidden Messages Using Higher-Order Statistical Models," Proc. ICIP, Rochester, NY, USA, vol. 2, Sept. 22-25, 2002, pp. 905-908.
  46. Accessed Nov. 2012. www.cs.dartmouth.edu/farid/downloads/research/steg.m

Cited by

  1. A new steganography method which preserves histogram: Generalization of LSB++ vol.277, pp.None, 2014, https://doi.org/10.1016/j.ins.2014.02.007
  2. A Visual Model-Based Perceptual Image Hash for Content Authentication vol.10, pp.7, 2014, https://doi.org/10.1109/tifs.2015.2407698
  3. PSW statistical LSB image steganalysis vol.77, pp.1, 2018, https://doi.org/10.1007/s11042-016-4273-6
  4. USAD: undetectable steganographic approach in DCT domain vol.67, pp.5, 2014, https://doi.org/10.1080/13682199.2019.1620525
  5. Steganography in discrete wavelet transform based on human visual system and cover model vol.78, pp.13, 2014, https://doi.org/10.1007/s11042-019-7238-8
  6. MKIPS: MKI-based protocol steganography method in SRTP vol.43, pp.3, 2021, https://doi.org/10.4218/etrij.2018-0410