Information Hiding Based on Morphological Component

作者: Linlin Zhang , Jianjun Wang

DOI: 10.1007/978-3-642-53778-3_48

关键词:

摘要: Steganography in sparse domain has drawn more and attention the past few years due to its high security. In this paper, we propose a steganography based on morphological component for grayscale images. Images are composed of two components—piecewise smooth (cartoon-like) parts textures. Complex contents images harder be modeled, such as textures, thus cannot easily detected when embed secret data them. By properly select dictionaries, content-adaptive can have rather large payloads low statistical detectability. We combine dictionaries obtain coefficients components an image, separately. When embedding domain, give top priority present ways construct these kinds our work, using mathematical models well wisely learned by K-SVD algorithm. Experiments show better visual quality stego-images undetectability messages comparison with other methods domain.

参考文章(9)
Giacomo Cancelli, Mauro Barni, MPSteg-color: a new steganographic technique for color images information hiding. ,vol. 4567, pp. 1- 15 ,(2007) , 10.1007/978-3-540-77370-2_1
Miroslav Goljan, Jessica Fridrich, Taras Holotyak, New blind steganalysis and its implications conference on security steganography and watermarking of multimedia contents. ,vol. 6072, pp. 607201- ,(2006) , 10.1117/12.643254
M Jalal Fadili, Jean-Luc Starck, Jerome Bobin, Yassir Moudden, Image Decomposition and Separation Using Sparse Representations: An Overview Proceedings of the IEEE. ,vol. 98, pp. 983- 994 ,(2010) , 10.1109/JPROC.2009.2024776
Gerald Schaefer, Michal Stich, UCID: an uncompressed color image database electronic imaging. ,vol. 5307, pp. 472- 480 ,(2003) , 10.1117/12.525375
Tomáš Pevny, Patrick Bas, Jessica Fridrich, Steganalysis by Subtractive Pixel Adjacency Matrix IEEE Transactions on Information Forensics and Security. ,vol. 5, pp. 215- 224 ,(2010) , 10.1109/TIFS.2010.2045842
G. Cancelli, M. Barni, MPSteg-Color: Data Hiding Through Redundant Basis Decomposition IEEE Transactions on Information Forensics and Security. ,vol. 4, pp. 346- 358 ,(2009) , 10.1109/TIFS.2009.2024028
T. Filler, J. Judas, J. Fridrich, Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes IEEE Transactions on Information Forensics and Security. ,vol. 6, pp. 920- 935 ,(2011) , 10.1109/TIFS.2011.2134094
Xiaochuan Chen, Yunhong Wang, Tieniu Tan, Lei Guo, Blind Image Steganalysis Based on Statistical Analysis of Empirical Matrix international conference on pattern recognition. ,vol. 3, pp. 1107- 1110 ,(2006) , 10.1109/ICPR.2006.332
M. Aharon, M. Elad, A. Bruckstein, $rm K$ -SVD: An Algorithm for Designing Overcomplete Dictionaries for Sparse Representation IEEE Transactions on Signal Processing. ,vol. 54, pp. 4311- 4322 ,(2006) , 10.1109/TSP.2006.881199