Table of Content

Open Access iconOpen Access

ARTICLE

crossmark

Constructive Texture Steganography Based on Compression Mapping of Secret Messages

Fengyong Li1, *, Zongliang Yu1, Chuan Qin2

1 College of Computer Science and Technology, Shanghai University of Electric Power, Shanghai, China.
2 School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai, China.

* Corresponding Author: Fengyong Li. Email: email.

(This article belongs to this Special Issue: Information Hiding and Multimedia Security)

Computer Modeling in Engineering & Sciences 2020, 124(1), 393-410. https://doi.org/10.32604/cmes.2020.09452

Abstract

This paper proposes a new constructive texture synthesis steganographic scheme by compressing original secret messages. First, we divide the original message into multiple bit blocks, which are transferred to decimal values and compressed into small decimal values by recording their interval sign characters. Then, a candidate pattern is generated by combining the given source pattern and boundary extension algorithm. Furthermore, we segment the candidate pattern into multiple candidate patches and use affine transformation algorithm to locate secret positions on a blank canvas, which are used to hide the sign characters by mapping the candidate patches. Finally, we select the candidate patches with minimal mean square error to represent secret bits to generate stego image by image quilting. Extensive experiments demonstrate that compared with existing texture steganographic methods, our method has a better visual quality, higher embedding capacity and security performance, while maintaining strong anti-steganalysis capability.

Keywords


Cite This Article

Li, F., Yu, Z., Qin, C. (2020). Constructive Texture Steganography Based on Compression Mapping of Secret Messages. CMES-Computer Modeling in Engineering & Sciences, 124(1), 393–410.

Citations




cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 3001

    View

  • 2178

    Download

  • 0

    Like

Share Link