Constructing Immune-Cover for Improving Holistic Security of Spatial Adaptive Steganography

被引:0
作者
Chen, Yijing [1 ,2 ]
Wang, Hongxia [1 ,2 ]
Li, Wanjie [1 ,2 ]
机构
[1] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu 610065, Peoples R China
[2] Sichuan Univ, Key Lab Data Protect & Intelligent Management, Minist Educ, Chengdu 610207, Peoples R China
基金
中国国家自然科学基金;
关键词
Steganography; Distortion; Security; Immune system; Antibodies; Artificial intelligence; Antigens; Adaptive steganography; artificial immune system; steganalysis; LEARNING FRAMEWORK; COST REASSIGNMENT; IMAGE;
D O I
10.1109/TDSC.2024.3376815
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The cover image with strong resistance against embedding distortion has promise for improving the holistic security of steganography. However, existing methods use the vulnerability of Convolutional Neural Network (CNN) to construct the enhanced cover which can only deceive the target CNN-based steganalyzer, but is not more suitable for steganography. When resisting steganalysis outside the target steganalyzer, its performance drops significantly. In this paper, we propose an immune-cover construction scheme via Artificial Immune System (AIS). By the association between the steganography and immune theory, we regard the cover as the organism, the distortion introduced by steganography as the pathogenic factor, and the immunoprocessing for optimizing the original cover as the antibody. Based on AIS, the optimal immunoprocessing is dynamically searched and performed on the original cover to construct an immune-cover which is most suitable for steganography. Besides, the proposed method carefully selects the immunoprocessing region to prevent artifacts, and guarantees the visual quality of the immune-cover through the constraint of the immunoprocessing intensity. Extensive experimental results demonstrate that the proposed immune-cover has much stronger resistance against embedding distortion compared with the related methods, thus significantly improving the holistic security of the adaptive steganography evaluated on both traditional and CNN-based steganalyzers.
引用
收藏
页码:5403 / 5419
页数:17
相关论文
共 48 条
  • [1] Bas Patrick, 2011, Information Hiding. 13th International Conference, IH 2011. Revised Selected Papers, P59, DOI 10.1007/978-3-642-24178-9_5
  • [2] Bas P, 2007, Bows-2
  • [3] Chang C.-C., 2023, IEEE Access, V11
  • [4] Enhancing Steganography via Stego Post-processing by Reducing Image Residual Difference
    Chen, Bolin
    Luo, Weiqi
    Zheng, Peijia
    [J]. IH&MMSEC '19: PROCEEDINGS OF THE ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, 2019, : 63 - 68
  • [5] Adaptive Video Data Hiding through Cost Assignment and STCs
    Chen, Yanli
    Wang, Hongxia
    Wu, Han-Zhou
    Wu, Zhiqiang
    Li, Tao
    Malik, Asad
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1320 - 1335
  • [6] Cost Reassignment for Improving Security of Adaptive Steganography Using an Artificial Immune System
    Chen, Yijing
    Wang, Hongxia
    Li, Wanjie
    Luo, Jie
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2022, 29 : 1564 - 1568
  • [7] A perceptually tuned subband image coder based on the measure of just-noticeable-distortion profile
    Chou, CH
    Li, YC
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 1995, 5 (06) : 467 - 476
  • [8] Cogranne R, 2019, IH&MMSEC '19: PROCEEDINGS OF THE ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, P125
  • [9] Learning and optimization using the clonal selection principle
    de Castro, LN
    Von Zuben, FJ
    [J]. IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2002, 6 (03) : 239 - 251
  • [10] Denemark T., 2016, ELECT IMAGING, V2016, P1, DOI [10.2352/ISSN.2470-1173.2016.8.MWSF-080, DOI 10.2352/ISSN.2470-1173.2016.8.MWSF-080]