New design paradigm of distortion cost function for efficient JPEG steganography

被引:15
作者
Su, Wenkang [1 ]
Ni, Jiangqun [1 ,2 ]
Hu, Xianglei [1 ]
Huang, Jiwu [3 ]
机构
[1] Sun Yat Sen Univ, Sch Comp Sci & Engn, Guangzhou, Peoples R China
[2] Peng Cheng Lab, Cyberspace Secur Res Ctr, Shenzhen, Peoples R China
[3] Shenzhen Univ, Coll Informat Engn, Shenzhen, Peoples R China
基金
中国国家自然科学基金;
关键词
Information hiding; JPEG steganography; Distortion cost function; Domain transformation; Exponential model;
D O I
10.1016/j.sigpro.2021.108319
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recently, with the introduction of JPEG (Joint Photographic Experts Group) phase-aware steganalysis features, e.g., GFR, the design of JPEG steganographic distortion cost function turns to maintain not only the statistical undetectability in DCT (Discrete Cosine Transform) domain but also in spatial domain. To tackle this issue, this paper presents a novel paradigm for the design of JPEG steganographic distortion cost function, which calculates the distortion cost via a generalized Distortion Cost Domain Transformation (DCDT) function. The proposed function comprises the decompressed pixel block embedding changes and their corresponding embedding distortion costs for unit change, where the pixel embedding distortion costs are represented in a more general exponential model, aiming to flexibly allocate the embedding data. In this way, the JPEG steganography could be formulated as the optimization problem of minimizing the overall distortion cost in its decompressed spatial domain, which is equivalent to maximizing its statistical undetectability against JPEG phase-aware steganalysis features. Experimental results show that the proposed DCDT equipped with HiLL (a spatial steganographic distortion cost function) is superior to other state-of-the-art JPEG steganographic schemes, e.g., UERD, J-UNIWARD, and GUED in resisting the detection of JPEG phase-aware feature-based steganalyzers GFR and SCA-GFR, and rivals BET-HiLL with one order of magnitude lower computational complexity, along with the possibility of being further improved by considering the mutually dependent embedding interactions. In addition, the proposed DCDT is also verified to be effective for different image databases and quality factors. (c) 2021 Published by Elsevier B.V.
引用
收藏
页数:10
相关论文
共 32 条
[1]  
Bas Patrick, 2011, Information Hiding. 13th International Conference, IH 2011. Revised Selected Papers, P59, DOI 10.1007/978-3-642-24178-9_5
[2]  
Bas P., 2007, BOWS 2 JULY
[3]  
Denemark T., 2015, P 3 ACM WORKSH INF H, P5
[4]   Steganalysis Features for Content-Adaptive JPEG Steganography [J].
Denemark, Tomas ;
Boroumand, Mehdi ;
Fridrich, Jessica .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (08) :1747-1757
[5]   Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes [J].
Filler, Tomas ;
Judas, Jan ;
Fridrich, Jessica .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :920-935
[6]   Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited [J].
Guo, Linjie ;
Ni, Jiangqun ;
Su, Wenkang ;
Tang, Chengpei ;
Shi, Yun-Qing .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (12) :2669-2680
[7]   Uniform Embedding for Efficient JPEG Steganography [J].
Guo, Linjie ;
Ni, Jiangqun ;
Shi, Yun Qing .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (05) :814-825
[8]   Universal distortion function for steganography in an arbitrary domain [J].
Holub, Vojtech ;
Fridrich, Jessica ;
Denemark, Tomas .
EURASIP JOURNAL ON INFORMATION SECURITY, 2014, 2014 (01)
[9]  
Holub V, 2012, IEEE INT WORKS INFOR, P234, DOI 10.1109/WIFS.2012.6412655
[10]   Model-based image steganography using asymmetric embedding scheme [J].
Hu, Xianglei ;
Ni, Jiangqun ;
Su, Wenkang ;
Huang, Junwen .
JOURNAL OF ELECTRONIC IMAGING, 2018, 27 (04)