SlideShare a Scribd company logo
SECURE BINARY IMAGE STEGANOGRAPHY BASED ON MINIMIZING THE
DISTORTION ON THE TEXTURE
ABSTRACT
Most state-of-the-art binary image Stefano graphic techniques only consider the flipping
distortion according to thehuman visual system, which will be not secure when they are attacked
by steg analyzers. In this paper, a binary image Stefano graphic scheme that aims to minimize
the embedding distortionon the texture is presented. We extract the complement, rotation,and
mirroring-invariant local texture patterns (crmiLTPs)from the binary image first. The weighted
sum of crmi LTP changes when flipping one pixel is then employed to measurethe flipping
distortion corresponding to that pixel. By testingon both simple binary images and the
constructed image dataset, we show that the proposed measurement can well describethe
distortions on both visual quality and statistics. Based onthe proposed measurement, a practical
stegano graphic scheme is developed. The stegano graphic scheme generates the cover vectorby
dividing the scrambled image into superpixels. Thereafter,the syndrome-trellis code is employed
to minimize the designedembedding distortion. Experimental results have demonstrated that the
proposed stegano graphic scheme can achieve statisticalsecurity without degrading the image
quality or the embeddingcapacity.

More Related Content

PDF
Steganography using reversible texture synthesis
PPTX
Texture Synthesis
DOCX
Density maximization for improving graph matching with its applications
DOCX
Hierarchical prediction and context adaptive coding for lossless color image ...
DOCX
An adaptive image dehazing algorithm based on dark channel prior
PPTX
High resolution textured models for engineering applications
PDF
IEEE 2013 Matlab titles
PPTX
Woral
Steganography using reversible texture synthesis
Texture Synthesis
Density maximization for improving graph matching with its applications
Hierarchical prediction and context adaptive coding for lossless color image ...
An adaptive image dehazing algorithm based on dark channel prior
High resolution textured models for engineering applications
IEEE 2013 Matlab titles
Woral

Similar to Secure binary image steganography based on minimizing the distortion on the texture (17)

PDF
G017444651
PDF
O017429398
PDF
Design of an adaptive JPEG Steganalysis with UED
PDF
Minimum image disortion of reversible data hiding
PDF
Uncompressed Image Steganography using BPCS: Survey and Analysis
PDF
Security and imperceptibility improving of image steganography using pixel al...
PDF
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
PDF
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
PDF
www.ijerd.com
PDF
www.ijerd.com
PDF
Image to Image Encoder using Least Significant Bit
PDF
Steganography based on random pixel selection for efficient data hiding 2
PDF
Comparative Study of Spatial Domain Image Steganography Techniques
PDF
R04405103106
PPT
Image stegnogrpahy(muqeed)
PDF
Av4102350358
PDF
STEGSIGN: A DIGITAL IMAGE AUTHENTICATION MODEL USING STEGANOGRAPHY AND AES EN...
G017444651
O017429398
Design of an adaptive JPEG Steganalysis with UED
Minimum image disortion of reversible data hiding
Uncompressed Image Steganography using BPCS: Survey and Analysis
Security and imperceptibility improving of image steganography using pixel al...
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
www.ijerd.com
www.ijerd.com
Image to Image Encoder using Least Significant Bit
Steganography based on random pixel selection for efficient data hiding 2
Comparative Study of Spatial Domain Image Steganography Techniques
R04405103106
Image stegnogrpahy(muqeed)
Av4102350358
STEGSIGN: A DIGITAL IMAGE AUTHENTICATION MODEL USING STEGANOGRAPHY AND AES EN...
Ad

More from I3E Technologies (20)

PPTX
Design of a low voltage low-dropout regulator
PPTX
An efficient constant multiplier architecture based on vertical horizontal bi...
PPTX
Aging aware reliable multiplier design with adaptive hold logic
PPTX
A high performance fir filter architecture for fixed and reconfigurable appli...
PPTX
A generalized algorithm and reconfigurable architecture for efficient and sca...
PPTX
A combined sdc sdf architecture for normal i o pipelined radix-2 fft
PPTX
Reverse converter design via parallel prefix adders novel components, method...
PPTX
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
PPTX
Energy optimized subthreshold vlsi logic family with unbalanced pull up down ...
PPTX
Variable form carrier-based pwm for boost-voltage motor driver with a charge-...
PPTX
Ultrasparse ac link converters
PPTX
Single inductor dual-output buck–boost power factor correction converter
PPTX
Ripple minimization through harmonic elimination in asymmetric interleaved mu...
PPTX
Resonance analysis and soft switching design of isolated boost converter with...
PPTX
Reliability evaluation of conventional and interleaved dc–dc boost converters
PPTX
Power factor corrected zeta converter based improved power quality switched m...
PPTX
Pfc cuk converter fed bldc motor drive
PPTX
Optimized operation of current fed dual active bridge dc dc converter for pv ...
PPTX
Online variable topology type photovoltaic grid-connected inverter
Design of a low voltage low-dropout regulator
An efficient constant multiplier architecture based on vertical horizontal bi...
Aging aware reliable multiplier design with adaptive hold logic
A high performance fir filter architecture for fixed and reconfigurable appli...
A generalized algorithm and reconfigurable architecture for efficient and sca...
A combined sdc sdf architecture for normal i o pipelined radix-2 fft
Reverse converter design via parallel prefix adders novel components, method...
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Energy optimized subthreshold vlsi logic family with unbalanced pull up down ...
Variable form carrier-based pwm for boost-voltage motor driver with a charge-...
Ultrasparse ac link converters
Single inductor dual-output buck–boost power factor correction converter
Ripple minimization through harmonic elimination in asymmetric interleaved mu...
Resonance analysis and soft switching design of isolated boost converter with...
Reliability evaluation of conventional and interleaved dc–dc boost converters
Power factor corrected zeta converter based improved power quality switched m...
Pfc cuk converter fed bldc motor drive
Optimized operation of current fed dual active bridge dc dc converter for pv ...
Online variable topology type photovoltaic grid-connected inverter
Ad

Recently uploaded (20)

PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Lecture Notes Electrical Wiring System Components
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
Artificial Intelligence
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
UNIT 4 Total Quality Management .pptx
PPT
introduction to datamining and warehousing
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
DOCX
573137875-Attendance-Management-System-original
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
web development for engineering and engineering
PPTX
additive manufacturing of ss316l using mig welding
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPT
Project quality management in manufacturing
PPT
Mechanical Engineering MATERIALS Selection
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Model Code of Practice - Construction Work - 21102022 .pdf
CH1 Production IntroductoryConcepts.pptx
Automation-in-Manufacturing-Chapter-Introduction.pdf
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Lecture Notes Electrical Wiring System Components
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Artificial Intelligence
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
UNIT 4 Total Quality Management .pptx
introduction to datamining and warehousing
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
573137875-Attendance-Management-System-original
Embodied AI: Ushering in the Next Era of Intelligent Systems
Foundation to blockchain - A guide to Blockchain Tech
web development for engineering and engineering
additive manufacturing of ss316l using mig welding
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Project quality management in manufacturing
Mechanical Engineering MATERIALS Selection
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT

Secure binary image steganography based on minimizing the distortion on the texture

  • 1. SECURE BINARY IMAGE STEGANOGRAPHY BASED ON MINIMIZING THE DISTORTION ON THE TEXTURE ABSTRACT Most state-of-the-art binary image Stefano graphic techniques only consider the flipping distortion according to thehuman visual system, which will be not secure when they are attacked by steg analyzers. In this paper, a binary image Stefano graphic scheme that aims to minimize the embedding distortionon the texture is presented. We extract the complement, rotation,and mirroring-invariant local texture patterns (crmiLTPs)from the binary image first. The weighted sum of crmi LTP changes when flipping one pixel is then employed to measurethe flipping distortion corresponding to that pixel. By testingon both simple binary images and the constructed image dataset, we show that the proposed measurement can well describethe distortions on both visual quality and statistics. Based onthe proposed measurement, a practical stegano graphic scheme is developed. The stegano graphic scheme generates the cover vectorby dividing the scrambled image into superpixels. Thereafter,the syndrome-trellis code is employed to minimize the designedembedding distortion. Experimental results have demonstrated that the proposed stegano graphic scheme can achieve statisticalsecurity without degrading the image quality or the embeddingcapacity.