Investigation on Cost Assignment in Spatial Image Steganography

被引:131
作者
Li, Bin [1 ,2 ]
Tan, Shunquan [3 ]
Wang, Ming [1 ]
Huang, Jiwu [1 ,4 ]
机构
[1] Shenzhen Univ, Coll Informat Engn, Shenzhen 518060, Peoples R China
[2] Shenzhen Key Lab Adv Commun & Informat Proc, Shenzhen 518060, Peoples R China
[3] Shenzhen Univ, Coll Comp Sci & Software Engn, Shenzhen 518060, Peoples R China
[4] Shenzhen Key Lab Media Secur, Shenzhen 518060, Peoples R China
基金
美国国家科学基金会;
关键词
Cost-value distribution; distortion function; priority profile; steganalysis; steganography; FISHER INFORMATION;
D O I
10.1109/TIFS.2014.2326954
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Relating the embedding cost in a distortion function to statistical detectability is an open vital problem in modern steganography. In this paper, we take one step forward by formulating the process of cost assignment into two phases: 1) determining a priority profile and 2) specifying a cost-value distribution. We analytically show that the cost-value distribution determines the change rate of cover elements. Furthermore, when the cost-values are specified to follow a uniform distribution, the change rate has a linear relation with the payload, which is a rare property for content-adaptive steganography. In addition, we propose some rules for ranking the priority profile for spatial images. Following such rules, we propose a five-step cost assignment scheme. Previous steganographic schemes, such as HUGO, WOW, S-UNIWARD, and MG, can be integrated into our scheme. Experimental results demonstrate that the proposed scheme is capable of better resisting steganalysis equipped with high-dimensional rich model features.
引用
收藏
页码:1264 / 1277
页数:14
相关论文
共 44 条
[11]  
Chonev V. K., 2011, P SOC PHOTO-OPT INS, V7880
[12]   Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes [J].
Filler, Tomas ;
Judas, Jan ;
Fridrich, Jessica .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :920-935
[13]   Gibbs Construction in Steganography [J].
Filler, Tomas ;
Fridrich, Jessica .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (04) :705-720
[14]  
Filler T, 2009, LECT NOTES COMPUT SC, V5806, P31, DOI 10.1007/978-3-642-04431-1_3
[15]   Writing on wet paper [J].
Fridrich, J ;
Goljan, M ;
Lisonek, P ;
Soukal, D .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2005, 53 (10) :3923-3935
[16]  
Fridrich J., 2012, P SOC PHOTO-OPT INS, V8303, P0901
[17]  
Fridrich J, 2013, INT CONF ACOUST SPEE, P2949, DOI 10.1109/ICASSP.2013.6638198
[18]   Rich Models for Steganalysis of Digital Images [J].
Fridrich, Jessica ;
Kodovsky, Jan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) :868-882
[19]  
Fridrich Jessica., 2006, MMSEC 06, P2
[20]  
Fridrich Jessica., 2009, Steganography in digital media: principles, algorithms, and applications