Constructing Immunized Stego-Image for Secure Steganography via Artificial Immune System

被引:16
作者
Li, Wanjie [1 ]
Wang, Hongxia [1 ,2 ]
Chen, Yijing [1 ]
Abdullahi, Sani M. [3 ]
Luo, Jie [1 ]
机构
[1] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu 610065, Peoples R China
[2] Zhengzhou Xinda Inst Adv Technol, Zhengzhou 450001, Peoples R China
[3] China Three Gorges Univ, Coll Comp & Informat Technol, Yichang 443002, Peoples R China
基金
中国国家自然科学基金;
关键词
Image steganography; steganalysis; artificial immune system; antibody affinity; LEARNING FRAMEWORK; STEGANALYSIS; OPTIMIZATION; DISTORTION;
D O I
10.1109/TMM.2023.3234812
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Adaptive image steganography is the process of embedding secret messages into undetectable regions of a cover image through the design of a distortion function by a steganographer. Since the state-of-the-art steganalyzers are mainly based on image residual analysis, it is reasonable to modify stego image for withstanding steganalysis by reducing or eliminating the image residual distance between cover and stego image. However, simply modifying stego images may lead to message extraction failure and the introduction of additional detectable artifacts. In this paper, we propose a novel secure steganography strategy by constructing immunized stego-image via an artificial immune system, called ISteg, which ensures the accurate extraction of hidden data while enhancing the security against steganalyzers. Inspired by the biological immune system, we use an artificial immune system (AIS) to build ISteg. Specifically, ISteg generates the immunized stego-image by automatically modifying the stego to maximize the affinity of the antibody. The affinity is developed to evaluate antibody quality according to the Euclidean distance between the residual co-occurrence matrix features of the cover image and the modified stego image. In this manner, the so-called immunized stego-image is generated. Extensive experimental results demonstrate that the proposed ISteg strategy can effectively improve the security performance of existing steganography.
引用
收藏
页码:8320 / 8333
页数:14
相关论文
共 50 条
[11]  
Dasgupta D, 1997, IEEE SYS MAN CYBERN, P873, DOI 10.1109/ICSMC.1997.626212
[12]   Recent Advances in Artificial Immune Systems: Models and Applications [J].
Dasgupta, Dipankar ;
Yu, Senhua ;
Nino, Fernando .
APPLIED SOFT COMPUTING, 2011, 11 (02) :1574-1587
[13]   Learning and optimization using the clonal selection principle [J].
de Castro, LN ;
Von Zuben, FJ .
IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2002, 6 (03) :239-251
[14]   Approximate statistical tests for comparing supervised classification learning algorithms [J].
Dietterich, TG .
NEURAL COMPUTATION, 1998, 10 (07) :1895-1923
[15]   Applications of artificial immune systems to computer security: A survey [J].
Fernandes, Diogo A. B. ;
Freire, Mario M. ;
Fazendeiro, Paulo A. P. ;
Inacio, Pedro R. M. .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 35 :138-159
[16]   Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes [J].
Filler, Tomas ;
Judas, Jan ;
Fridrich, Jessica .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :920-935
[17]  
Fridrich J., 2009, Steganography in digital media: principles, algorithms, and applications
[18]  
Fridrich J, 2013, INT CONF ACOUST SPEE, P2949, DOI 10.1109/ICASSP.2013.6638198
[19]   Rich Models for Steganalysis of Digital Images [J].
Fridrich, Jessica ;
Kodovsky, Jan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) :868-882
[20]  
Holub V., 2013, P 1 ACM WORKSH INF H, DOI DOI 10.1145/2482513.2482514