• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Steganography based on quotient value differencing and pixel value correlation

    2022-01-12 07:05:38ReshmaSonarGandharbaSwain

    Reshma Sonar | Gandharba Swain

    Department of Computer Science and Engineering,Koneru Lakshmaiah Education Foundation,Guntur,Andhra Pradesh, India

    Abstract Pixel value differencing (PVD) steganography techniques produce imperceptible stegoimages. Most PVD-based techniques have a fall-off boundary problem (FOBP). To avoid FOBP, a steganographic scheme is presented that combines the quotient value difference(QVD)with pixel value correlation(PVC).It performs data embedding in two stages on 3 × 3 size pixel blocks. The first stage of the embedding procedure performs QVD and remainder substitution on five pixels.These five pixels are central pixel and it's neighbours on the left, right, upper, and lower sides. Based on the new values of these five pixels,the PVC embedding procedure is applied on the remaining four corner pixels of the block. The experimental results are found to be improved. The hiding capacity is high that is 3.92 bits per byte with an acceptable peak signal-to-noise ratio value. A security check was performed using two tests: (i) a regular-singular (RS) test, (ii) a pixel difference histogram (PDH) test. The experimental outcomes demonstrate that PDH curves of the stego-images do not have a zigzag shape, that means the PDH test could not detect this steganography technique. Furthermore, the RS curves show that the RS test could not detect this steganography technique.

    1 | INTRODUCTION

    The Internet is mostly used for data communication. Thus,security approaches are highly essential to safeguard data from unauthorized users. Techniques such as steganography can be useful to transmit data securely by hiding them in image,audio,and video files [1]. Data hiding inside a file such as an image should be done carefully without changing its statistical properties [2]. If the statistical properties are restored, the image will look innocuous and will not attract the attention of attackers. Least significant bit (LSB) substitution is a popular technique in steganography.It is simple but can be detected by the regular-singular (RS) test [3]. Pixel value differencing(PVD)steganography is equally popular.It was initiated by Wu and Tsai in 2003 [4]. This technique uses the pixel value difference in a block of two pixels to measure their hiding capacity (HC), and then hides the secret bits. However, this technique can be detected by a pixel difference histogram(PDH) test [5]. The PDH test is a two-dimensional (2-D)graph that considers the pixel difference and its frequency in the horizontal and vertical axes.If this curve is not smooth(it appears as a zig-zag) it is suspected that the image contains hidden data.The principal objective in the PVD technique is to recognize noise-tolerant pixel groups of the image and embed a larger number of bits in them. To hide relatively larger number of bits, PVD steganography with 2 × 2 size pixel block was described in Lee et al. [6]. To improve the HC and security,the PVD concept is applied on 3×3 size pixel blocks[7]. Furthermore, modified LSB substitution is applied with multi-directional PVD to improve the HC and security [8].

    Luo et al. [9] discussed a PVD steganography mechanism on 1 × 3 size pixel blocks. They used a variable range table unlike Wu and Tsai. The minimum and maximum bounds for a pixel range are decided by considering the pixel values in the block. Thus, it is different for different blocks. Hence, they named it as adaptive PVD. This principle was extended to larger size blocks such as 2 × 2 and 3 × 3 to improve performance [10], but block sizes of 2 × 3 and 3 × 2 yielded optimum performance [11]. In general,these adaptive PVD techniques do not possess appreciable HC. Liao et al. [12] discussed an adaptive LSB substitution scheme in 2 × 2 blocks in which the number of LSBs used depends on the mean pixel value difference in that block.However,the performance could be further improved using 3× 3 size blocks [13].

    Wu et al. showed that in an image, highly textured regions can accommodate greater changes, in which PVD embedding should be applied and smooth regions can also hide larger number of bits,where LSB substitution can be applied[14].As a result, both the HC and peak signal-to-noise ratio (PSNR)could be increased. Yang et al. [15] noticed that the technique in Wu et al.[14]identifies more than 90%of blocks as smooth blocks and less than 10% of blocks as highly textured.Therefore, ultimately, it replaces LSBs in more than 90% of blocks. Hence, the RS test could detect it. Khodaei and Faez[16]considered three consecutive pixels to be a block and used LSB substitution on the pixel in the middle position and PVD on two corner pixels of the block.There are two comments on this technique:(i)it is detected by a PDH test,and(ii)it has a fall-off boundary problem (FOBP). Khodaei and Faez’s principle has been carried ahead and applied with larger-size blocks such as 2×2 and 3×3[17,18]to improve the HC and PSNR and protection against the PDH test.

    A kind of PVD technique known as modulus functionbased PVD (MFPVD), proposed by Wang et al. [19], uses the remainder value instead of the pixel value difference to hide the secret bits. This technique also provides greater HC with minimum distortion. Zhao et al. [20] used indeterminate equations in MFPVD to improve the PSNR. Wang et al.’s mechanism [19] possesses some range mismatch issue. Thus,Swain [21] proposed an MFPVD mechanism in bigger size blocks like 2 × 3 to avoid this problem. This improved technique is superior in terms of HC and PSNR and attack resistance. From a 2 × 2 size block, Yang et al. formed pairs in diagonal, vertical, and horizontal directions and applied PVD to improve performance[22].Pradhan et al.[23]combined the three approaches, (i) LSB substitution, (ii) PVD, and (iii)exploiting modification direction judiciously to achieve better performance. Jung [24] proposed a new steganography approach with 1 × 2-size pixel blocks using LSB substitution in LSB positions and PVD in most significant bits (MSBs)positions to achieve greater HC. Swain [25] extended Jung’s technique to 3 × 3-size blocks to achieve a higher HC.

    When hiding data in color images, we generally treat each color component of a pixel independently and hide data in them.By doing this, correlations among the three channels will be disturbed,To avoid this problem,Tang et al.[26]proposed that different color channels of the same pixel should be changed towards an increasing or decreasing direction consistently.Furthermore,Li et al.[27]said that if in textured regions of image modifications of differentpixelvalues are done towards the same direction, security can be improved. Sahu et al. [28] presented dual stego-image embedding, in which data are hidden in two mirror images based on LSB matching. Elhoseny et al. [29]proposed applying steganography for the secure transfer of health care data.Li et al.[30]also proposed hiding data inside a set of images in social networks.

    Watermarking is another aspect of hiding data in which the main concern is copyright protection and authentication.Singh reviewed potential challenges and applications in data hiding techniques[31].Some important applications of watermarking are mobile devices, 3D objects, telemedicine, hardware protection, and cyber-physical systems. Singh et al. proposed an encryption and compression-based watermarking scheme to improve the security of digital documents [32]. Furthermore,Singh and Kumar proposed an encryption and compressionbased watermarking scheme to verify content along with copyright protection in e-governance [33]. To achieve authentication and integrity, multiple-watermarks can be embedded in an image[34],so that the required bandwidth will be decreased and security will be improved.

    2 | RELATED WORK, PROBLEM STATEMENT, AND CONTRIBUTION BY AUTHORS

    2.1 | Jung’s [24] LSB + PVD technique

    Jung [24] divided the image into disjoint blocks, each containing two adjacent pixels(P1, P2).He divided the eight bits of a pixel into two parts, with the k LSBs as one part and the remaining (8-k) MSBs as another part. Then, he performed substitution on k LSBs and PVD on (8-k) MSBs. The procedure of embedding is detailed next.

    The integer equivalent of k LSBs of P1is computed as R1= P1mod 2k. Similarly, the integer equivalent of k LSBs of P2is computed as R2= P2mod 2k. Furthermore, the integer equivalent of (8-k) MSBs of P1is computed as Q1=P1div 2k. Similarly, the integer equivalent of (8-k) MSBs of P2is computed as Q2= P2div 2k. Suppose, R′1, R′2, Q′1and Q′2are the stego-values of R1, R2, Q1and Q2, respectively. R′1is computed by taking k secret data bits and converting them into a decimal value. Similarly, R′2is computed by taking the next k secret data bits and converting them into a decimal value.

    To perform data hiding in Q1and Q2, compute d =|Q1- Q2|. The range table is composed of four ranges:{0, 7}, {8, 15}, {16, 31}, and {32, 63}. These ranges are represented in the form of{L,U},where L is the lower bound(LB) and U is the upper bound of a range. The embedding capacity in a range is determined as n = log2(U-L+1).

    2.2 | Problem statement

    2.3 | Contribution of this paper

    Most PVD steganography techniques have FOBP, including that of Jung. To avoid FOBP, this work proposes a steganography technique by exploring 3×3-size pixel blocks.The idea of Jung is adopted to divide a pixel into two parts.A pixel value correlation (PVC) is intertwined with the quotient value differencing (QVD). The main contribution is an appropriate intertwining of QVD and PVC such that the FOBP is avoided.In addition, advantages are achieved:

    · The RS test could not detect the proposed QVD + PVC technique.

    · The PDH test could not detect the proposed QVD+PVC technique.

    · A fair balance between HC, and PSNR is achieved.

    Section 3 represents the proposed work(the QVD+PVC scheme), and Section 4 discusses a numerical example of it.The results and performance analysis are presented in Section 5 and the conclusions are drawn in Section 6.

    3 | PROPOSED QVD + PVC SCHEME

    3.1 | Data hiding procedure

    The original image is accessed in raster-scan order and 3 × 3 size dis-joint pixel blocks are formed as shown in Figure 1a.The data hiding in a block are done in two stages. In stage 1,QVD and remainder substitution is performed,and in stage 2,PVC is performed.

    FIGURE 1 (a) Sample block; (b) Stego-block after quotient value differencing; (c) Four clusters; (d) Stego-block after pixel value correlation

    In stage 1 of the hiding procedure, a QVD approach is applied on pixels Pc, P2, P4, P6, and P8. If FOBP occurs,then the QVD procedure is undone and 4-bit LSB substitution is applied on Pc, P2, P4, P6, and P8. Steps 1–8 describes stage 1 of the embedding procedure.

    Step 1 From each of pixels Pc, P2, P4, P6, and P8two sets of values,(i)remainders,and(ii)quotients,are calculated using Equations (1) and (2), respectively.

    In Equation(1),Ri=Pimod 4,for,i=2,4,6,and 8.This means that R2= P2mod 4, R4= P4mod 4, R6= P6mod 4,and R8=P8mod 4.In Equation(2),Qi= Pidiv 4,for,i=2,4, 6, and 8. This means that Q2= P2div 4, Q4= P4div 4,Q6= P6div 4,and Q8= P8div 4.Here mod and div stand for remainder and quotient division respectively. For example,35 mod 4 = 3, and 35 div 4 = 8.

    Step 2 One data bit is taken from the secret binary bit stream, and appended to the left of indicator bit 1. These two bits are transformed to a decimal digit and are treated as the stego-value for Rc. Let it be represented as R′c. Take next two data bits, convert them to decimal and denote this as R′2. Again, take the next two data bits, convert them to decimal, and denote this as R′4. Similarly for R′6, and R′8. These are the stego-values for R2, R4, R6, and R8,respectively.

    TABLE 1 Range table

    Step 3 Four quotient value differences are calculated using Equation (3).The meaning of Equation(3)is that d2=(Q2- Qc),d4=(Q4- Qc), d6= (Q6- Qc), and d8= (Q8- Qc).

    Now consider the range in Table 1. Suppose the absolute difference value |di|,for i = 2, 4, 6, 8 should fall into a specific range out of the four ranges.Let Liand nidenote the LB, and the HC of that range.

    For i = 3, this statement means, take n3data bits and convert them to a decimal digit b3.After hiding b3in P3,the stego-value is P′3= P3- P3mod 2n3+ b3.

    For i = 7, this statement means, take n7data bits and convert them to a decimal digit b7.After hiding b7in P7,the stego-value is P′7= P7- P7mod 2n7+ b7.

    For i = 9, this statement means, take n9data bits and convert them to a decimal digit b9.After hiding b9in P9,the stego-value is P′9= P9- P9mod 2n9+ b9.

    Figure 1d is the resultant stego-block for the original block shown in Figure 1a.

    3.2 | The extraction procedure

    Figure 1d represents a block from which we need to extract hidden data.It is performed in two stages.Stage 1 is the QVD and remainder extraction procedure, and stage 2 is the PVC extraction procedure.

    Step 5 For i = 1, 3, 7, and 9, compute ni, as shown in Equation (24). Furthermore, set ni=4, if ni≥4:

    4 | A STEP‐BY‐STEP EXAMPLE

    Let us embed secret binary data (0 01 10 10 11 011 001 110 111 101 1010 0111 1000)2into a pixel block shown in Figure 2a.The pixel values are P1= 150, P2= 155, P3= 156,P4= 151, Pc= 157, P6= 158, P7= 152,P8= 160, and P9=162.

    Step 1 Using Equation(1),Rc= Pcmod 4=157 mod 4=1,R2=P2mod 4=155 mod 4=3,R4=P4mod 4=151 mod 4=3,R6=P6mod 4=158 mod 4=2,and R8= P8mod 4 = 160 mod 4 = 0.

    FIGURE 2 (a) A 3 × 3 size original block, (b) The intermediate 3×3 size stego-block, (c) grouping of pixels, (d) final stego-block

    Thus,we get Rc=1, R2=3, R4=3,R6=2,and R8=0.

    Using Equation(2),Qc= Pcdiv 4=157 div 4=39,Q2=P2div 4=155 div 4=38,Q4= P4div 4=151 div 4=37,Q6=P6div 4=158 div 4=39,and Q8= P8div 4=160 div 4=40.

    Thus, we get Qc=39, Q2= 38, Q4= 37, Q6= 39,and Q8= 40.

    Step 2 The first bit from the secret binary data stream is taken and concatenated on left of indicator bit 1. Thus, we get 012. Transforming these two bits to decimal, we get R′c= 1. Taking next two bits of secret data and converting to decimal value we get R′2= 1. Taking the next two bits of secret data and converting to decimal value, we get R′4= 2. Similarly,we get R′6= 2, and R′8= 3. These values will be used as stego-values for Rc, R2, R4, R6, and R8accordingly.

    Step 3 Using Equation (3), d2= (Q2- Qc)=(38-39)=-1, d4= (Q4- Qc)=(37-39)=-2,d6= (Q6- Qc)=(39-39)=0, and d8= (Q8-Qc)=(40-39)=1.

    Thus,we obtain d2=-1, d4=-2, d6=0, and d8=1.

    Furthermore,|d2|=1, |d4|=2,|d6|=0,and|d8|=1. Referring to Table 1, all |di| values (for i = 2, 4, 6, and 8)fall in range{0,7},so we get L2=0, n2=3, L4=0, n4=3,L6=0, n6=3, L8=0, and n8=3.

    Step 4 Now taking next n2bits of secret data and converting them to decimal value, we get b2=3.Taking the next n4bits of secret data and converting them to decimal value,we get b4=1.Similarly,we get b6=6, and b8=7.

    Step 10 Using Equation (14), because d1>1, so n1=log2d1=log212 = 3. Similarly, d3>1,n3=log2d3=log237 = 5. d7>1, n7=log2d7=log233 = 5. and d9>1, n9=log2d9=log230 = 4.

    Thus, we get n1=3, n3=5, n7=5, and n9=4. Because n5≥4, and n7≥4, we can set n5=4, and n7=4. Finally, we have n1=3, n3=4, n7=4, and n9=4.

    Step 11 Taking the next n1bits of data, we take 1012, and convert it to decimal value; then, we get b1=5. Similarly, take the next n3bits of data.We take 10102and convert it to decimal value, and we get b3=10. Take the next n7bits of data; we take 01112and convert it to decimal value, and we get b7=7. Take the next n9bits of data; we take 10002and convert it to decimal value, and then we get b9=8.

    Thus, we got b2= 3, b4= 1, b6= 6, and b8= 7.

    Now transforming b2to n2binary bits we get 0112. Similarly, transforming b4to n4binary bits, we get 0012. Transforming b6to n6binary bits,we get 1102,and transforming b8to n8binary bits, we get 1112. After appending these bits to EBDS, we get EBDS = 0 01 10 10 11 011 001 110 1112.

    Transforming b1to n1binary bits we get 1012. Transforming b3to n3binary bits we get 10102.Transforming b7to n7binary bits we get 01112. Transforming b9ton9binary bits we get 10002. Append all of these bits to EBDS.

    Hence,weobtainEBDS=0 01 10 10 11 011 001 110 111 101 1010 0111 10002.These are same as the embedded bits.

    5 | EXPERIMENTAL RESULTS

    This proposed QVD + PVC scheme is programmed in MATLAB and executed on a laptop computer. The configuration of the laptop computer is a i3 processor (2.30 GHz), 4 GB RAM, and 1000 GB hard disk. The operating system is Windows 10. The images fetched from SIPI data-base are utilized as test images. Figure 3 shows eight original images.Figure 4 represents the stego-images with their PSNR values.In each stego-images seven lakhs (700,000) bits of secret data are hidden. The results for these images are analyzed and compared with related existing techniques. These images are imperceptible and no visible marks are available in them to be detected as stego-images.

    The efficacy of this proposed technique has been measured in terms of HC, PSNR, and quality index (QI).After embedding the secret bits inside the image, the distortion is measured in PSNR. It is calculated using Equation (25). In this equation m and n represents the image size, Pijis the original pixel, and Qijis the corresponding stego-pixel. For a color image, every byte can be assumed to be a unit of calculation, and then Equation (25)can be applied. The m value is 512 and the n value is 1536 for the test images:

    The HC represents the number of data bits that the carrier image can conceal. The average number of bits that a pixel conceals is termed as bits per byte (BPB). The resemblance between the image before hiding and the image after hiding is termed the QI. Equation (26) can be used to measure QI.

    where ˉP stands for the mean value of all pixels in the original image before hiding, and ˉQ is the mean value of all pixels of the stego-image.

    Table 2 presents the computed values of quality parameters(PSNR, HC, QI, BPB, data hiding time, and data extraction time) of the proposed QVD + PVC scheme. The proposed scheme uses a combination of QVD and PVC for the first time in the literature.An HC of 3.92 BPB with an acceptable PSNR value greater than 30 decibels (dB) is remarkable. The proposed steganography scheme is a novel technique. The time complexity depends on,n(the length of secret data).Thus,it is an order of n,that is,O(n).Moreover,the time to hide 700,000 bits in different test images and extracting 700,000 bits from the stego-images is shown in last 2 columns of Table 2. The average embedding time is 15 s, and the average extraction time is 10.5 s.

    Tables 3–5 present the values of the quality parameters(PSNR, HC, QI, and BPB) of the existing techniques[7, 16, 24, 25], and the proposed QVD + PVC scheme. Table 6 presents the average value of parameters of existing techniques [7, 16, 25], and that of Jung [24] along with the proposed QVD + PVC scheme. The technique of Pradhan et al. [7] is an eight-directional PVD based on the PVD of Wu and Tsai [4]. The HC of the proposed QVD + PVC scheme is higher than the technique of Pradhan et al. with a slight decrease in PSNR. The average estimated HC of the technique of Pradhan et al. is 1885371 bits (2.39 BPB),

    whereas for the proposed QVD + PVC scheme it is 3088513 bits (3.92 BPB). Khodaei and Faez's [16] PVD technique is based on addition-subtraction logic; it is not based on Wu and Tsai's [4] PVD. The technique of Khodaei and Faez possesses higher PSNR, but it has a lower HC than the proposed QVD + PVC scheme. Swain's QVD technique [25]is also based on Wu and Tsai's [4] PVD. It operates on ninepixel blocks and performs the embedding operation in two different planes: (i) a remainder plane, and (ii) a quotient plane. Thus, the HC of this technique is slightly higher than the HC of the proposed QVD + PVC scheme. However, the proposed QVD + PVC scheme possesses higher PSNR than Swain's QVD technique. The average estimated PSNR of Swain's QVD technique is 33.06 dB, whereas for the proposed QVD + PVC scheme it is 35.94 dB. Jung's technique[24] is also based on Wu and Tsai's [4] PVD. The PSNR of Jung's technique is 50 dB, higher than the proposed QVD +PVC scheme, but the HC of Jung's technique is 3.39, lower than the proposed QVD + PVC scheme. Moreover, Jung's technique has FOBP, so extraction cannot be done correctly.This PSNR estimations is performed with 700,000 bits of data hidden in the stego-images for all of the discussed techniques.

    FIGURE 3 Original images

    FIGURE 4 Stego-images

    Figure 5 presents a bar chart distinguishing the PSNR and BPB of the proposed QVD + PVC scheme with the other schemes. The proposed QVD + PVC scheme fairly balances the PSNR and BPB.However, the technique of Pradhan et al.[7] possesses higher PSNR with lower BPB and the technique of Swain [25] possesses higher BPB with lower PSNR. The PSNR of Khodaei and Faez[16]is higher,but the HC is lower.Similarly,the PSNR of Jung[24]is higher,but the HC is lower.

    TABLE 2 Results of proposed QVD + PVC scheme

    TABLE 3 Results of PVD of Pradhan et al. [7] and QVD of Swain technique [25]

    TABLE 4 Results for Khodaei and Faez's technique [16]

    Table 7 represents the PSNR values of different stegoimages when different amounts of data are hidden. It can be noticed that when 140,000 bits of data is hidden in each of the images, the average PSNR is 42.80 dB. Similarly,when 280,000 bits are hidden, the average PSNR is 39.88 dB. When 560,000 bits of data is hidden, the average PSNRis 36.92 dB. When 1,120,000 bits of data is hidden, the average PSNR is 33.92 dB. When 16,80,000 bits of data is hidden, the average PSNR is 32.17 dB. When 2,240,000 bits of data is hidden, the average PSNR is 30.96 dB. When 2,800,000 bits of data is hidden, the average PSNR is 30.01 dB. When 2,940,000 bits of data is hidden, the average PSNR is 29.81 dB. Furthermore, Figure 6 represents capacity versus PSNR graph for Lena, Baboon, Tiffany, and Peppers images. From these graphs we can observe that the minimum PSNR value is nearly 30 dB.

    TABLE 5 Results of Jung's technique [24]

    TABLE 6 Comparison of results

    FIGURE 5 Comparison of PSNR (series 1) and BPB (series 2) of proposed technique with existing techniques. BPB, bits per byte; QVD, quotient value difference; PSNR, peak signal-to-noise ratio; PVD, pixel value differencing

    The robustness of the proposed QVD + PVC scheme is verified by performing PDH and RS tests. The PDH test has been performed by referring to the procedure in Sahu and Sahu [35]. The PDH test is performed by plotting PDH graphs. The PDH graph is a 2D curve with pixel difference on X-axis and frequency on Y-axis. The literature says that the PDH graph for the original images will be smooth in nature, but the PDH graph for stego-images generated by PVD techniques will be zigzag [35]. For the proposed scheme, the PDH test for Lena, Baboon, Tiffany, and Peppers images are in Figure 7. In all four subfigures, the solid line curve represents the original image, and the dotted line curve represents the stego-image. The four subfigures show that there are no zigzags appearances in the PDHcurves of the four stego-images. Thus, the PDH test is unable to detect the proposed scheme.

    TABLE 7 Capacity vs PSNR for various images in the proposed scheme

    ?

    FIGURE 6 Capacity versus PSNR graph for the proposed QVD + PVC scheme: (a) Lena: capacity versus PSNR; (b) Baboon: capacity versus PSNR;(c)Tiffany:capacity versus PSNR,and(d)Peppers:capacity versus PSNR.QVD,quotient value difference;PSNR,peak signal-to-noise ratio;PVD,pixel value differencing

    FIGURE 7 Pixel difference histogram test

    FIGURE 8 Regular-singular test

    The RS test has been performed on the proposed scheme by referring to the procedure in Sahu and Sahu [35].The four parameters,Rm,R-m,Sm and S-m,were used.According to the RS test, if R-m- S-m>Rm - Sm, the RS test detects the steganography technique. If Rm ≈R-m>Sm ≈S-mis true,the steganography technique is undetected by the RS test.For the proposed QVD + PVC scheme, the RS test for the Lena, Baboon, Tiffany, and Peppers images have been shown in Figure 8, which shows in all four subfigures that Rm ≈R-m>Sm ≈S-mis true.Among these four images,Tiffany is a smooth image and Baboon is a textured image.Peppers and Lena are moderately smooth. Thus, from these observations it is evident that the RS test is incapable of detecting the proposed QVD + PVC scheme.

    6 | CONCLUSION

    A steganography scheme is described using the principles of QVD, and PVC. The proposed scheme splits the image into 3×3-size disjoint pixel blocks,and applies QVD and remainder replacement approach on five pixels: the central pixel and its neighbours in left,right,upper and lower positions.The stegovalues of these five pixels are used to apply the PVC approach on the four corner pixels. The experimental results are satisfactory. The HC is high with acceptable PSNR. The recorded BPB value is 3.95.In the proposed technique,the RS and PDH tests are applied to verify its security and robustness. The experimental results show that stego-image curvesare as smooth as that of the corresponding original image,so the PDH test is incapable of detecting this scheme.Furthermore,the RS curves demonstrate that Rm ≈R-m>Sm ≈S-mis true,so the RS test is also incapable of detecting this scheme.

    ORCID

    Gandharba Swain https://orcid.org/0000-0001-6586-1432

    女的被弄到高潮叫床怎么办| 欧美人与善性xxx| 亚洲人成77777在线视频| 亚洲激情五月婷婷啪啪| 精品午夜福利在线看| 大片免费播放器 马上看| 亚洲人与动物交配视频| 日韩欧美一区视频在线观看| 久久99一区二区三区| www.色视频.com| 国产成人av激情在线播放| 狂野欧美激情性bbbbbb| 两个人免费观看高清视频| av.在线天堂| 亚洲国产精品专区欧美| 亚洲高清免费不卡视频| 99久久人妻综合| 人人妻人人爽人人添夜夜欢视频| 亚洲一区二区三区欧美精品| 爱豆传媒免费全集在线观看| 99久国产av精品国产电影| 久久久久久人妻| 人人妻人人爽人人添夜夜欢视频| 中文欧美无线码| 久久精品国产自在天天线| 亚洲欧洲国产日韩| 亚洲欧美成人综合另类久久久| 色婷婷av一区二区三区视频| 99香蕉大伊视频| 欧美精品一区二区免费开放| 91国产中文字幕| 精品久久久久久电影网| 亚洲伊人久久精品综合| 美国免费a级毛片| 丝瓜视频免费看黄片| 黄色一级大片看看| 亚洲欧美成人综合另类久久久| 日日摸夜夜添夜夜爱| 国产精品久久久久久精品古装| 国产成人午夜福利电影在线观看| 亚洲美女黄色视频免费看| 狂野欧美激情性xxxx在线观看| 2021少妇久久久久久久久久久| 我要看黄色一级片免费的| 欧美日韩国产mv在线观看视频| 精品久久蜜臀av无| 大码成人一级视频| 色哟哟·www| 国产片特级美女逼逼视频| tube8黄色片| 一级毛片黄色毛片免费观看视频| 日韩中文字幕视频在线看片| a级毛片黄视频| 在线观看一区二区三区激情| 纵有疾风起免费观看全集完整版| 国产亚洲午夜精品一区二区久久| 亚洲精品第二区| 亚洲丝袜综合中文字幕| 国产黄色免费在线视频| 久久午夜综合久久蜜桃| 超碰97精品在线观看| 亚洲国产精品999| 国产精品国产三级专区第一集| 久久久久人妻精品一区果冻| 国产精品久久久久久精品古装| 欧美激情国产日韩精品一区| 国产精品秋霞免费鲁丝片| av卡一久久| 亚洲图色成人| 亚洲人成77777在线视频| 亚洲国产精品专区欧美| 成年人午夜在线观看视频| 亚洲欧美色中文字幕在线| 香蕉丝袜av| av免费在线看不卡| 精品一区二区三区视频在线| 尾随美女入室| 26uuu在线亚洲综合色| 亚洲,一卡二卡三卡| 亚洲成人一二三区av| 乱码一卡2卡4卡精品| 久久久久久人人人人人| 亚洲人成网站在线观看播放| 久久毛片免费看一区二区三区| 制服丝袜香蕉在线| 成人亚洲欧美一区二区av| 国产白丝娇喘喷水9色精品| 免费看光身美女| 久久久久国产网址| 精品福利永久在线观看| 少妇被粗大猛烈的视频| 2018国产大陆天天弄谢| 国产精品女同一区二区软件| 国产乱来视频区| 熟女av电影| 男人操女人黄网站| av国产久精品久网站免费入址| 十八禁高潮呻吟视频| 五月开心婷婷网| 日本黄大片高清| 蜜桃在线观看..| 国产伦理片在线播放av一区| 久久鲁丝午夜福利片| 永久免费av网站大全| 中国三级夫妇交换| 欧美国产精品一级二级三级| 精品一区在线观看国产| 国产亚洲最大av| 在线观看免费高清a一片| 97人妻天天添夜夜摸| 国产精品嫩草影院av在线观看| 精品午夜福利在线看| 一区二区三区乱码不卡18| 婷婷成人精品国产| 日日啪夜夜爽| 亚洲成av片中文字幕在线观看 | 国产男女内射视频| 黄色怎么调成土黄色| 国产片特级美女逼逼视频| 日韩制服丝袜自拍偷拍| 晚上一个人看的免费电影| kizo精华| 纵有疾风起免费观看全集完整版| 各种免费的搞黄视频| 中文乱码字字幕精品一区二区三区| 午夜免费观看性视频| 婷婷色麻豆天堂久久| 久久综合国产亚洲精品| 精品人妻一区二区三区麻豆| 交换朋友夫妻互换小说| 精品少妇久久久久久888优播| 日韩制服丝袜自拍偷拍| 日韩人妻精品一区2区三区| 欧美精品av麻豆av| 久久精品国产a三级三级三级| 日本-黄色视频高清免费观看| 国产一区亚洲一区在线观看| 天堂俺去俺来也www色官网| 不卡视频在线观看欧美| 国产精品国产三级国产av玫瑰| 国产老妇伦熟女老妇高清| 午夜视频国产福利| 日韩精品有码人妻一区| 热99国产精品久久久久久7| 精品人妻在线不人妻| 国产精品成人在线| 一本久久精品| 少妇的逼水好多| 日本av免费视频播放| 精品卡一卡二卡四卡免费| 亚洲第一av免费看| 亚洲熟女精品中文字幕| 99久久精品国产国产毛片| 热99久久久久精品小说推荐| 亚洲av男天堂| 国产乱来视频区| 成人免费观看视频高清| 亚洲av福利一区| 国产精品一二三区在线看| 国产欧美亚洲国产| 亚洲内射少妇av| 久久精品夜色国产| 女的被弄到高潮叫床怎么办| 亚洲丝袜综合中文字幕| 久久久久久久久久人人人人人人| 亚洲精品乱码久久久久久按摩| av免费观看日本| 爱豆传媒免费全集在线观看| 国产成人av激情在线播放| av电影中文网址| 在线观看人妻少妇| 国产精品 国内视频| 国产成人av激情在线播放| 乱人伦中国视频| 高清黄色对白视频在线免费看| 国产精品女同一区二区软件| 精品人妻一区二区三区麻豆| a级片在线免费高清观看视频| 狠狠婷婷综合久久久久久88av| 亚洲人成77777在线视频| 日韩人妻精品一区2区三区| 亚洲综合色惰| 日日摸夜夜添夜夜爱| 日本欧美视频一区| 精品国产乱码久久久久久小说| 国产在视频线精品| 久久鲁丝午夜福利片| 少妇的丰满在线观看| 韩国高清视频一区二区三区| 久久人妻熟女aⅴ| 美女xxoo啪啪120秒动态图| 老熟女久久久| 久久99精品国语久久久| 春色校园在线视频观看| 精品酒店卫生间| 一边亲一边摸免费视频| 国产精品蜜桃在线观看| 成人毛片a级毛片在线播放| 国产综合精华液| tube8黄色片| 亚洲美女黄色视频免费看| 中文字幕精品免费在线观看视频 | www.熟女人妻精品国产 | 亚洲国产欧美在线一区| 黑人巨大精品欧美一区二区蜜桃 | 丝袜在线中文字幕| 亚洲精品乱码久久久久久按摩| 亚洲国产毛片av蜜桃av| 国产精品偷伦视频观看了| 精品国产国语对白av| 两个人免费观看高清视频| 日韩不卡一区二区三区视频在线| 亚洲欧美日韩另类电影网站| 你懂的网址亚洲精品在线观看| 成人18禁高潮啪啪吃奶动态图| 国产69精品久久久久777片| 久久国产精品大桥未久av| 97在线视频观看| 久久精品国产亚洲av天美| 国产免费一级a男人的天堂| 黄色怎么调成土黄色| 国产色婷婷99| 日日撸夜夜添| 999精品在线视频| 免费观看av网站的网址| 大片免费播放器 马上看| 亚洲精华国产精华液的使用体验| 大码成人一级视频| 精品人妻一区二区三区麻豆| 国产精品国产三级专区第一集| 午夜老司机福利剧场| 97超碰精品成人国产| 少妇人妻久久综合中文| 女的被弄到高潮叫床怎么办| 亚洲精品,欧美精品| 99久久精品国产国产毛片| 国产在线视频一区二区| 国产片内射在线| av在线app专区| 蜜臀久久99精品久久宅男| 欧美人与性动交α欧美软件 | 欧美日韩国产mv在线观看视频| 宅男免费午夜| 久久久国产一区二区| 欧美日韩亚洲高清精品| 中文欧美无线码| 欧美 亚洲 国产 日韩一| 日韩精品免费视频一区二区三区 | 精品国产一区二区久久| 亚洲,一卡二卡三卡| 亚洲精品456在线播放app| 成年女人在线观看亚洲视频| 国产永久视频网站| 亚洲综合色网址| 一二三四在线观看免费中文在 | 纵有疾风起免费观看全集完整版| 亚洲精品国产色婷婷电影| 精品一区二区三区视频在线| 国产日韩欧美亚洲二区| 久久精品人人爽人人爽视色| 免费观看a级毛片全部| 国产精品久久久久久av不卡| 久久久国产欧美日韩av| 交换朋友夫妻互换小说| av一本久久久久| 亚洲精品456在线播放app| 精品福利永久在线观看| 热99国产精品久久久久久7| 伦理电影大哥的女人| 国产精品一区二区在线不卡| 欧美变态另类bdsm刘玥| 日韩三级伦理在线观看| 91成人精品电影| 最黄视频免费看| 一边摸一边做爽爽视频免费| 一级片免费观看大全| 一级毛片我不卡| 成年人免费黄色播放视频| 欧美另类一区| 一区二区日韩欧美中文字幕 | 妹子高潮喷水视频| 亚洲一区二区三区欧美精品| 高清欧美精品videossex| 国产在线视频一区二区| 久久午夜综合久久蜜桃| 18+在线观看网站| 国产一区亚洲一区在线观看| 久久久a久久爽久久v久久| 免费在线观看黄色视频的| 亚洲五月色婷婷综合| 狠狠婷婷综合久久久久久88av| 久久国产亚洲av麻豆专区| 97超碰精品成人国产| 久久久国产一区二区| videos熟女内射| 69精品国产乱码久久久| 性色av一级| 国产女主播在线喷水免费视频网站| 成人无遮挡网站| 欧美激情极品国产一区二区三区 | 欧美激情极品国产一区二区三区 | 人体艺术视频欧美日本| 美女福利国产在线| 亚洲国产精品999| 多毛熟女@视频| 天天影视国产精品| 大码成人一级视频| 夜夜爽夜夜爽视频| 国产欧美另类精品又又久久亚洲欧美| 精品人妻一区二区三区麻豆| 日本vs欧美在线观看视频| 国产欧美日韩一区二区三区在线| 只有这里有精品99| 久久精品久久久久久久性| av网站免费在线观看视频| av电影中文网址| 色94色欧美一区二区| 天美传媒精品一区二区| 国产成人一区二区在线| 国产综合精华液| a级片在线免费高清观看视频| 男女边吃奶边做爰视频| 国产色婷婷99| 少妇的逼好多水| 欧美精品高潮呻吟av久久| 波多野结衣一区麻豆| 大片免费播放器 马上看| 国产成人av激情在线播放| 国语对白做爰xxxⅹ性视频网站| 婷婷成人精品国产| 成人免费观看视频高清| av又黄又爽大尺度在线免费看| 国产精品一区www在线观看| 91精品三级在线观看| 日韩大片免费观看网站| 最近的中文字幕免费完整| 久久鲁丝午夜福利片| 成人国语在线视频| 久久人人爽人人片av| 久久久久精品人妻al黑| 亚洲综合色惰| 在线免费观看不下载黄p国产| 久久久久精品人妻al黑| 成人国产av品久久久| 春色校园在线视频观看| 成人午夜精彩视频在线观看| 免费在线观看黄色视频的| 丝袜脚勾引网站| 伦理电影大哥的女人| 免费av中文字幕在线| 美女中出高潮动态图| 777米奇影视久久| 久久久国产欧美日韩av| 在线观看三级黄色| 亚洲精品久久成人aⅴ小说| 黑人高潮一二区| 亚洲国产毛片av蜜桃av| 国产国拍精品亚洲av在线观看| 少妇精品久久久久久久| 国产国拍精品亚洲av在线观看| 精品国产一区二区三区四区第35| 欧美日韩精品成人综合77777| 欧美3d第一页| 国产一区二区在线观看日韩| 久久精品国产亚洲av天美| 亚洲av成人精品一二三区| 久久人人97超碰香蕉20202| 精品国产乱码久久久久久小说| 国产欧美日韩一区二区三区在线| 国产 一区精品| 建设人人有责人人尽责人人享有的| 国产女主播在线喷水免费视频网站| 国产片特级美女逼逼视频| 国产成人精品无人区| 欧美国产精品va在线观看不卡| av.在线天堂| 亚洲av免费高清在线观看| 国产成人精品久久久久久| 99久久精品国产国产毛片| 日本-黄色视频高清免费观看| 欧美 亚洲 国产 日韩一| 制服丝袜香蕉在线| 国产成人aa在线观看| 欧美精品人与动牲交sv欧美| 51国产日韩欧美| 亚洲激情五月婷婷啪啪| 欧美丝袜亚洲另类| 免费在线观看黄色视频的| 自线自在国产av| 国产国语露脸激情在线看| 99久久人妻综合| 久久久久久伊人网av| 亚洲国产精品国产精品| 国产精品国产三级国产av玫瑰| 在线观看一区二区三区激情| 国产精品欧美亚洲77777| 日韩欧美一区视频在线观看| 9色porny在线观看| 国产成人精品福利久久| 18禁在线无遮挡免费观看视频| 色94色欧美一区二区| 99九九在线精品视频| 香蕉丝袜av| 国产精品嫩草影院av在线观看| 男的添女的下面高潮视频| 9热在线视频观看99| 日韩av在线免费看完整版不卡| 99热全是精品| 中文字幕人妻熟女乱码| 乱人伦中国视频| 亚洲一级一片aⅴ在线观看| 日本欧美视频一区| 欧美精品av麻豆av| 成年人免费黄色播放视频| 男男h啪啪无遮挡| 亚洲成色77777| 午夜91福利影院| 九九在线视频观看精品| 中文乱码字字幕精品一区二区三区| 一级片免费观看大全| 人妻系列 视频| 一区在线观看完整版| 自线自在国产av| 七月丁香在线播放| h视频一区二区三区| 精品久久蜜臀av无| 99久久人妻综合| 两性夫妻黄色片 | 久久久精品免费免费高清| 日韩大片免费观看网站| 久久精品国产亚洲av天美| 最新的欧美精品一区二区| 精品少妇内射三级| 人人妻人人爽人人添夜夜欢视频| 久久久精品94久久精品| 免费看不卡的av| 日韩中文字幕视频在线看片| 免费黄网站久久成人精品| 丝袜人妻中文字幕| a级毛片黄视频| 国产一区二区三区综合在线观看 | 乱码一卡2卡4卡精品| 亚洲精品视频女| 国产免费一区二区三区四区乱码| 亚洲久久久国产精品| 国产精品三级大全| 制服人妻中文乱码| 又黄又爽又刺激的免费视频.| 有码 亚洲区| av视频免费观看在线观看| 中文字幕最新亚洲高清| 伦理电影大哥的女人| 一本大道久久a久久精品| 精品人妻偷拍中文字幕| 成人二区视频| 女人精品久久久久毛片| 午夜视频国产福利| 亚洲精品av麻豆狂野| 熟女电影av网| 熟妇人妻不卡中文字幕| 婷婷色综合大香蕉| 国产亚洲精品第一综合不卡 | 99re6热这里在线精品视频| av卡一久久| 亚洲国产精品一区二区三区在线| 久久99热6这里只有精品| 日韩精品有码人妻一区| 成人综合一区亚洲| 夫妻午夜视频| 欧美激情极品国产一区二区三区 | 汤姆久久久久久久影院中文字幕| 国产精品久久久久久精品古装| 亚洲av成人精品一二三区| 日本欧美视频一区| 国产精品女同一区二区软件| 大陆偷拍与自拍| 午夜激情av网站| 国产精品偷伦视频观看了| 国产深夜福利视频在线观看| 免费久久久久久久精品成人欧美视频 | 香蕉精品网在线| 精品久久久久久电影网| 一区二区日韩欧美中文字幕 | 热99久久久久精品小说推荐| 啦啦啦视频在线资源免费观看| 肉色欧美久久久久久久蜜桃| 国产日韩欧美视频二区| 99热国产这里只有精品6| 在线观看人妻少妇| 中国国产av一级| 亚洲成色77777| 久久久久精品性色| 欧美日韩精品成人综合77777| tube8黄色片| 久久影院123| 免费av不卡在线播放| 国产片特级美女逼逼视频| 黄片无遮挡物在线观看| 久久久国产欧美日韩av| 久久影院123| 亚洲人成77777在线视频| 黄色视频在线播放观看不卡| 哪个播放器可以免费观看大片| 午夜福利视频在线观看免费| 亚洲内射少妇av| 午夜福利乱码中文字幕| √禁漫天堂资源中文www| 成人综合一区亚洲| 自拍欧美九色日韩亚洲蝌蚪91| 涩涩av久久男人的天堂| 99热国产这里只有精品6| 妹子高潮喷水视频| 久久免费观看电影| 水蜜桃什么品种好| 大话2 男鬼变身卡| 欧美 亚洲 国产 日韩一| 在线天堂最新版资源| videossex国产| 欧美日韩综合久久久久久| 午夜激情av网站| 国产欧美日韩综合在线一区二区| 夜夜爽夜夜爽视频| 一区二区三区四区激情视频| 亚洲av日韩在线播放| 欧美丝袜亚洲另类| 一本色道久久久久久精品综合| 欧美激情 高清一区二区三区| 久久人人爽av亚洲精品天堂| 99国产精品免费福利视频| 欧美日韩视频高清一区二区三区二| 国产精品不卡视频一区二区| 精品一区在线观看国产| 亚洲人成网站在线观看播放| 国产精品欧美亚洲77777| 日韩欧美一区视频在线观看| 夫妻午夜视频| 国产不卡av网站在线观看| 国产高清国产精品国产三级| 国产一区有黄有色的免费视频| 自拍欧美九色日韩亚洲蝌蚪91| 久久精品熟女亚洲av麻豆精品| 一边亲一边摸免费视频| 亚洲人成网站在线观看播放| 成人漫画全彩无遮挡| 欧美激情国产日韩精品一区| 国产亚洲精品久久久com| 极品少妇高潮喷水抽搐| 中文字幕最新亚洲高清| 99国产综合亚洲精品| 亚洲精品第二区| 亚洲综合色惰| 国产成人一区二区在线| 国产亚洲精品久久久com| 男人操女人黄网站| 日韩电影二区| av卡一久久| 婷婷色麻豆天堂久久| 男女午夜视频在线观看 | 波野结衣二区三区在线| a级毛色黄片| 国产成人免费观看mmmm| 欧美+日韩+精品| 中文字幕精品免费在线观看视频 | 一级爰片在线观看| av在线播放精品| 精品人妻偷拍中文字幕| 十八禁高潮呻吟视频| 黑人欧美特级aaaaaa片| 永久网站在线| 久久久久久久国产电影| 国产亚洲最大av| 中文字幕另类日韩欧美亚洲嫩草| 激情视频va一区二区三区| 亚洲一级一片aⅴ在线观看| 久久精品国产亚洲av涩爱| 曰老女人黄片| 精品久久久久久电影网| 国产毛片在线视频| 在线 av 中文字幕| 看非洲黑人一级黄片| 成年女人在线观看亚洲视频| 好男人视频免费观看在线| 久久99蜜桃精品久久| 日韩视频在线欧美| 热re99久久国产66热| 国产精品偷伦视频观看了| 日本欧美视频一区| 91精品伊人久久大香线蕉| 亚洲一区二区三区欧美精品| 久久久a久久爽久久v久久| av国产精品久久久久影院| 男女啪啪激烈高潮av片| 丝袜喷水一区| 日本爱情动作片www.在线观看| 22中文网久久字幕| 乱码一卡2卡4卡精品| 91在线精品国自产拍蜜月| 男女边摸边吃奶| av在线老鸭窝| 中文字幕av电影在线播放| 亚洲精品久久久久久婷婷小说| 在线观看一区二区三区激情| 在线观看免费高清a一片| 大香蕉久久成人网| 国产淫语在线视频| 午夜91福利影院| 亚洲天堂av无毛| 国产午夜精品一二区理论片| 大香蕉97超碰在线| 人人妻人人澡人人看| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 国产精品99久久99久久久不卡 | 视频区图区小说| 18+在线观看网站| 五月天丁香电影|