Constructing Immunized Stego-Image for Secure Steganography via Artificial Immune System

被引:16
作者
Li, Wanjie [1 ]
Wang, Hongxia [1 ,2 ]
Chen, Yijing [1 ]
Abdullahi, Sani M. [3 ]
Luo, Jie [1 ]
机构
[1] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu 610065, Peoples R China
[2] Zhengzhou Xinda Inst Adv Technol, Zhengzhou 450001, Peoples R China
[3] China Three Gorges Univ, Coll Comp & Informat Technol, Yichang 443002, Peoples R China
基金
中国国家自然科学基金;
关键词
Image steganography; steganalysis; artificial immune system; antibody affinity; LEARNING FRAMEWORK; STEGANALYSIS; OPTIMIZATION; DISTORTION;
D O I
10.1109/TMM.2023.3234812
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Adaptive image steganography is the process of embedding secret messages into undetectable regions of a cover image through the design of a distortion function by a steganographer. Since the state-of-the-art steganalyzers are mainly based on image residual analysis, it is reasonable to modify stego image for withstanding steganalysis by reducing or eliminating the image residual distance between cover and stego image. However, simply modifying stego images may lead to message extraction failure and the introduction of additional detectable artifacts. In this paper, we propose a novel secure steganography strategy by constructing immunized stego-image via an artificial immune system, called ISteg, which ensures the accurate extraction of hidden data while enhancing the security against steganalyzers. Inspired by the biological immune system, we use an artificial immune system (AIS) to build ISteg. Specifically, ISteg generates the immunized stego-image by automatically modifying the stego to maximize the affinity of the antibody. The affinity is developed to evaluate antibody quality according to the Euclidean distance between the residual co-occurrence matrix features of the cover image and the modified stego image. In this manner, the so-called immunized stego-image is generated. Extensive experimental results demonstrate that the proposed ISteg strategy can effectively improve the security performance of existing steganography.
引用
收藏
页码:8320 / 8333
页数:14
相关论文
共 50 条
[1]  
Ahmadi SD, 2017, 2017 ARTIFICIAL INTELLIGENCE AND ROBOTICS (IRANOPEN), P45, DOI 10.1109/RIOS.2017.7956442
[2]  
[Anonymous], 2007, Bows-2
[3]  
[Anonymous], 2016, Electron. Imag.
[4]  
[Anonymous], 2015, P 3 ACM WORKSH INF H
[5]  
Bas Patrick, 2011, Information Hiding. 13th International Conference, IH 2011. Revised Selected Papers, P59, DOI 10.1007/978-3-642-24178-9_5
[6]   Enhancing Steganography via Stego Post-processing by Reducing Image Residual Difference [J].
Chen, Bolin ;
Luo, Weiqi ;
Zheng, Peijia .
IH&MMSEC '19: PROCEEDINGS OF THE ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, 2019, :63-68
[7]   Defining Cost Functions for Adaptive JPEG Steganography at the Microscale [J].
Chen, Kejiang ;
Zhou, Hang ;
Zhou, Wenbo ;
Zhang, Weiming ;
Yu, Nenghai .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (04) :1052-1066
[8]   Adaptive Video Data Hiding through Cost Assignment and STCs [J].
Chen, Yanli ;
Wang, Hongxia ;
Wu, Han-Zhou ;
Wu, Zhiqiang ;
Li, Tao ;
Malik, Asad .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) :1320-1335
[9]   DDCA: A Distortion Drift-Based Cost Assignment Method for Adaptive Video Steganography in the Transform Domain [J].
Chen, Yi ;
Wang, Hongxia ;
Choo, Kim-Kwang Raymond ;
He, Peisong ;
Salcic, Zoran ;
Kaafar, Dali ;
Zhang, Xuyun .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) :2405-2420
[10]  
Cogranne R, 2019, IH&MMSEC '19: PROCEEDINGS OF THE ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, P125