Investigation on Cost Assignment in Spatial Image Steganography

被引:131
作者
Li, Bin [1 ,2 ]
Tan, Shunquan [3 ]
Wang, Ming [1 ]
Huang, Jiwu [1 ,4 ]
机构
[1] Shenzhen Univ, Coll Informat Engn, Shenzhen 518060, Peoples R China
[2] Shenzhen Key Lab Adv Commun & Informat Proc, Shenzhen 518060, Peoples R China
[3] Shenzhen Univ, Coll Comp Sci & Software Engn, Shenzhen 518060, Peoples R China
[4] Shenzhen Key Lab Media Secur, Shenzhen 518060, Peoples R China
基金
美国国家科学基金会;
关键词
Cost-value distribution; distortion function; priority profile; steganalysis; steganography; FISHER INFORMATION;
D O I
10.1109/TIFS.2014.2326954
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Relating the embedding cost in a distortion function to statistical detectability is an open vital problem in modern steganography. In this paper, we take one step forward by formulating the process of cost assignment into two phases: 1) determining a priority profile and 2) specifying a cost-value distribution. We analytically show that the cost-value distribution determines the change rate of cover elements. Furthermore, when the cost-values are specified to follow a uniform distribution, the change rate has a linear relation with the payload, which is a rare property for content-adaptive steganography. In addition, we propose some rules for ranking the priority profile for spatial images. Following such rules, we propose a five-step cost assignment scheme. Previous steganographic schemes, such as HUGO, WOW, S-UNIWARD, and MG, can be integrated into our scheme. Experimental results demonstrate that the proposed scheme is capable of better resisting steganalysis equipped with high-dimensional rich model features.
引用
收藏
页码:1264 / 1277
页数:14
相关论文
共 44 条
[1]  
[Anonymous], 2010, Advanced Statistical Steganalysis
[2]  
[Anonymous], 2001, Information hiding, DOI 10.1007/3-540-
[3]  
[Anonymous], P SPIE ELECTRON IMAG
[4]  
[Anonymous], P SPIE SEC FOR STEG
[5]  
[Anonymous], 2013, P 1 ACM WORKSH INF H, DOI DOI 10.1145/2482513.2482514
[6]   The duality between information embedding and source coding with side information and some applications [J].
Barron, RJ ;
Chen, B ;
Wornell, GW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (05) :1159-1180
[7]  
Bas Patrick, 2011, Information Hiding. 13th International Conference, IH 2011. Revised Selected Papers, P59, DOI 10.1007/978-3-642-24178-9_5
[8]  
Cachin C, 1998, LECT NOTES COMPUT SC, V1525, P306
[9]  
Chen L., 2013, International Workshop on Digital Forensics and Watermaking, volume 7809 of LNCS, V7809, P19
[10]  
Chonev V. K., 2010, IMPROVED STEGANOGRAP