Double-Layered Dual-Syndrome Trellis Codes Utilizing Channel Knowledge for Robust Steganography

被引:15
作者
Guan, Qingxiao [1 ]
Liu, Peng [2 ]
Zhang, Weiming [3 ]
Lu, Wei [4 ]
Zhang, Xinpeng [5 ]
机构
[1] Jimei Univ, Comp Engn Coll, Xiamen 361021, Peoples R China
[2] Guangdong Univ Technol, Sch Comp Sci & Technol, Guangzhou 510006, Peoples R China
[3] Univ Sci & Technol China, CAS Key Lab Electromagnet Space Informat, Hefei 230026, Peoples R China
[4] Sun Yat sen Univ, Sch Comp Sci & Engn, Guangdong Prov Key Lab Informat Secur Technol, Key Lab Machine Intelligence & Adv Comp,Minist Edu, Guangzhou, Peoples R China
[5] Fudan Univ, Sch Comp Sci, Shanghai 200433, Peoples R China
基金
中国国家自然科学基金;
关键词
Robust steganography; STCs; steganalysis; information hiding; JPEG; STEGANALYSIS; DISTRIBUTIONS; PERFORMANCE; DISTORTION;
D O I
10.1109/TIFS.2022.3226904
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Robust steganography aims to hide message in cover data with high security and guarantee the success of its message extraction although it is disturbed in transmission channel. In this paper we propose a framework of coding scheme extended from Dual-Syndrome Trellis Codes (Dual-STCs) for robust adaptive steganography. We use the conditional probability distribution of correct stego bits conditioned on disturbed stego data as channel knowledge, and formulate error-correcting as maximizing this probability. By extending Dual-STCs to double-layered embedding, we design an iteratively decoding scheme for error-correcting two layer stego bits from their joint conditional probabilities, and strictly prove its convergence. Besides, we design a method to estimate these probability distributions from stego data pairs uploaded/downloaded from the lossy transmission channel. The channel knowledge can also be used by steganographer, and we propose a universal method to revise steganographic distortion values for higher robustness under the guidance of the channel knowledge. Compared with existing coding methods for robust steganography, our method can make use of channel knowledge to improve error correcting ability and meanwhile maintain high security, which is demonstrated by experimental results.
引用
收藏
页码:501 / 516
页数:16
相关论文
共 46 条
  • [1] OPTIMAL DECODING OF LINEAR CODES FOR MINIMIZING SYMBOL ERROR RATE
    BAHL, LR
    COCKE, J
    JELINEK, F
    RAVIV, J
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1974, 20 (02) : 284 - 287
  • [2] Bas Patrick, 2011, Information Hiding. 13th International Conference, IH 2011. Revised Selected Papers, P59, DOI 10.1007/978-3-642-24178-9_5
  • [4] Deep Residual Network for Steganalysis of Digital Images
    Boroumand, Mehdi
    Chen, Mo
    Fridrich, Jessica
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (05) : 1181 - 1193
  • [5] Reverse JPEG Compatibility Attack
    Butora, Jan
    Fridrich, Jessica
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 1444 - 1454
  • [6] MULTILEVEL CODES AND MULTISTAGE DECODING
    CALDERBANK, AR
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 1989, 37 (03) : 222 - 229
  • [7] Cogranne R., 2020, IH MMSEC 2020 PROC 2, P161, DOI DOI 10.1145/3369412.3395075
  • [8] Efficient Steganography in JPEG Images by Minimizing Performance of Optimal Detector
    Cogranne, Remi
    Giboulot, Quentin
    Bas, Patrick
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1328 - 1343
  • [9] Cover Thomas M, 1999, Elements of information, DOI [DOI 10.1002/0471200611, 10.1002/0471200611]
  • [10] Steganalysis Features for Content-Adaptive JPEG Steganography
    Denemark, Tomas
    Boroumand, Mehdi
    Fridrich, Jessica
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (08) : 1747 - 1757