Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2022 Aug 16:8:e1062.
doi: 10.7717/peerj-cs.1062. eCollection 2022.

A novel steganography method for binary and color halftone images

Affiliations

A novel steganography method for binary and color halftone images

Efe Çiftci et al. PeerJ Comput Sci. .

Abstract

Digital steganography is the science of establishing hidden communication on electronics; the aim is to transmit a secret message to a particular recipient using unsuspicious carriers such as digital images, documents, and audio files with the help of specific hiding methods. This article proposes a novel steganography method that can hide plaintext payloads on digital halftone images. The proposed method distributes the secret message over multiple output copies and scatters parts of the message randomly within each output copy for increased security. A payload extraction algorithm, where plain carrier is not required, is implemented and presented as well. Results gained from conducted objective and subjective tests prove that the proposed steganography method is secure and can hide large payloads.

Keywords: Halftone image; Image processing; Plaintext payload; Secret sharing; Steganography.

PubMed Disclaimer

Conflict of interest statement

The authors declare that they have no competing interests.

Figures

Figure 1
Figure 1. Colors in a three-channel color halftone image.
Figure 2
Figure 2. (A–J) Binary patterns used for constructing halftone images.
Figure 3
Figure 3. Stages of converting a grayscale image into pattern-based halftone image.
(A) Source image, (B) Simpler image, (C) Final image.
Figure 4
Figure 4. Pattern method results on (A–B) binary and (C–D) color images.
Figure 5
Figure 5. Floyd-Steinberg coefficient filter.
Figure 6
Figure 6. Error diffusion method results on (A–B) binary and (C–D) color images.
Figure 7
Figure 7. Outputs of payload extraction attempts with different numbers of inputs.
Figure 8
Figure 8. Three test images from UC Merced Land Use Dataset.
(A) airplane80, (B) beach09, (C) forest22.
Figure 9
Figure 9. (A–I) SNR, PSNR and SSIM values of pattern-generated binary halftone images.
Figure 10
Figure 10. (A–I) SNR, PSNR and SSIM values of pattern-generated color halftone images.
Figure 11
Figure 11. (A–I) SNR, PSNR and SSIM values of error diffusion-generated binary halftone images.
Figure 12
Figure 12. (A–I) SNR, PSNR and SSIM values of error diffusion-generated color halftone images.
Figure 13
Figure 13. Extracted bytes from forest22 image using (A) three of four shares, (B) seven of eight shares, (C) 11 of 12 shares.

Similar articles

Cited by

References

    1. Al-Amri SS, Kalyankar NV, Khamitkar SD. Image segmentation by using threshold techniques. ArXiv preprint. 2010. - DOI
    1. Analoui M, Allebach JP. Model-based halftoning using direct binary search. Human Vision, Visual Processing, and Digital Display III; International Society for Optics and Photonics; 1992. pp. 96–108.
    1. Askari N, Heys HM, Moloney C. An extended visual cryptography scheme without pixel expansion for halftone images. 2013 26th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE); Piscataway: IEEE; 2013. pp. 1–6.
    1. Chan TC, Chen KS. Method and system for halftoning by tiling subsets of a threshold array over portions of an image. 1998. https://patents.google.com/patent/US5761347 https://patents.google.com/patent/US5761347 US Patent 5,761,347.
    1. Cheddad A, Condell J, Curran K, Mc Kevitt P. Digital image steganography: survey and analysis of current methods. Signal Processing. 2010;90(3):727–752. doi: 10.1016/j.sigpro.2009.08.010. - DOI

LinkOut - more resources