|
|
Adaptive ±k Steganography Based on Dynamic Updating Distortion Cost |
TANG Guangming BIAN Yuan WEI Dawei GAO Zhanzhan ZHU Yaozhen |
(PLA Information Engineering University, Zhengzhou 450001, China) |
|
|
Abstract Adaptive steganography ignores the interactive impact introduced by the embedding operation during the embedding operation. Considering the cross impact of the embedding operation, an adaptive ±k steganography is put forward based on the dynamic distortion cost updating strategy Modification Degree Strategy (MDS). First, the analysis is conducted to prove the optimizing modification of the central pixel under the condition of the neighborhood’s modifications. Then the MDS of updating the distortion cost is presented to adjust the distortion cost according to the modification of neighborhood. Finally, the steganography scheme is proposed using the MDS. The experimental result illustrates that the UNIWARD-MDS (Pentary Version) has a better performance than S-UNIWARD (Pentary Version) at the embedding rate 0.5~1.0 bpp when resisting the steganalysis SRM. Meanwhile the UNIWARD-MDS (Pentary Version) is better than the S-UNIWARD (Pentary Version) at the embedding rate 0.05~1.0 bpp when resisting the maxSRMd2 detection. The HILL-MDS and UNIWARD-MDS (Ternary Version) perform better than the corresponding schemes HILL and S-UNIWARD (Ternary Version).
|
Received: 17 March 2016
Published: 30 September 2016
|
|
Fund: The National Natural Science Foundation of China (61303074), The Foundation of Science and Technology on Information Assurance Laboratory (KJ-14106) |
Corresponding Authors:
BIAN Yuan
E-mail: bianyuanlara@163.com
|
|
|
|
[1] |
韩涛, 祝跃飞. 基于 Canny 边缘检测的自适应空域隐写术[J]. 电子与信息学报, 2015, 37(5): 1266-1270. doi: 10.11999/ JEIT141121.
|
|
HAN Tao and ZHU Yuefei. Adaptive spatial steganography based on Canny’s edge detection[J]. Journal of Electronics & Information Technology, 2015, 37(5): 1266-1270. doi: 10. 11999/JEIT141121.
|
[2] |
FILLER T, JUDAS J, and FRIDRICH J. Minimizing additive distortion in steganography using syndrome-trellis codes[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 920-935. doi: 10.1109/TIFS.2011. 2134094.
|
[3] |
GUL G and KURUGOLLU F. A new methodology in steganalysis: Breaking highly undetectable steganograpy (HUGO)[J]. LNCS, 2011, 6958: 71-84.
|
[4] |
PENVY T, BAS P, and FRIDRICH J. Steganalysis by subtractive pixel adjacency matrix[C]. Proceedings of the 11th ACM Multimedia and Security Workshop, Princeton, NJ, USA, September 2009: 75-84.
|
[5] |
HOLUB V and FRIDRICH J. Designing steganographic distortion using directional filters[C]. Proceedings of the IEEE Workshop on Information Forensic and Security, Tenerife, Spain, 2012: 234-239.
|
[6] |
HOLUB V and FRIDRICH J. Digital image steganography using universal distortion[C]. Proceedings of 1st ACM Workshop on Information Hiding and Multimedia Security, Montpellier, France, 2013: 59-68.
|
[7] |
LI Bin, WANG Ming, HUANG Jiwu, et al. A new cost function for spatial image steganography[C]. Proceedings of the IEEE International Conference on Image Processing, Pairs, France, 2014: 4206-4210.
|
[8] |
LI Bin, TAN Shunquan, WANG Ming, et al. Investigation on cost assignment in spatial image steganography[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(8): 1264-1277. doi: 10.1109/TIFS.2014.2326954.
|
[9] |
FILLER T and FRIDRICH J. Gibbs construction in steganography[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(4): 705-720. doi: 10.1109/ TIFS.2010.2077629.
|
[10] |
TOMAS Denmark and FRIDRICH J. Improving steganographic security by synchronizing the selection channel[C]. Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, Portland, Oregon, USA, 2015: 5-14. doi: 10.1145/2756601.2756620.
|
[11] |
LI Bin, WANG Ming, TAN Shunquan, et al. A strategy of clustering modification directions in spatial image steganography[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(9): 1905-1917. doi: 10.1109/ TIFS.2434600.
|
[12] |
BAS P and PENVY T. Break our steganographic system-the ins and outs of organizing BOSS[J]. LNCS, 2011, 6598: 59-70.
|
[13] |
KODOVSKY J, FRIDRICH J, and HOLUB V. Ensemble classifiers for steganalysis of digital media[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 432-444. doi: 10.1109/TIFS.2011.2175919.
|
[14] |
FRIDRICH J and KODOVSKY J. Rich models for steganalysis of digital images[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(3): 868-882. doi: 10.1109/TIFS.2012.2190402.
|
[15] |
FRIDRICH J. Content-adaptive pentary steganography using the multivariate generalized gaussian cover model[C]. Proceeding of SPIE-The International Society for Optical Engineering, San Francisco, CA, USA, 2015, 9409: 94090H- 94090H-13.
|
[16] |
TOMAS Denmark, SEDIGHI V, HOLUB V, et al. Selection-channel-aware rich model for steganalysis of digital images[C]. IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, CA, USA, 2014: 48-53.
|
|
|
|