A Strategy of Clustering Modification Directions in Spatial Image Steganography

被引:194
作者
Li, Bin [1 ,2 ]
Wang, Ming [1 ,2 ]
Li, Xiaolong [3 ]
Tan, Shunquan [2 ,4 ]
Huang, Jiwu [1 ,2 ]
机构
[1] Shenzhen Univ, Coll Informat Engn, Shenzhen 518060, Peoples R China
[2] Shenzhen Key Lab Media Secur, Shenzhen 518060, Peoples R China
[3] Peking Univ, Inst Comp Sci & Technol, Beijing 100871, Peoples R China
[4] Shenzhen Univ, Coll Comp Sci & Software Engn, Shenzhen 518060, Peoples R China
关键词
Cost adjustment; distortion function; modification direction; steganalysis; steganography; CODES; ALGORITHM;
D O I
10.1109/TIFS.2015.2434600
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Most of the recently proposed steganographic schemes are based on minimizing an additive distortion function defined as the sum of embedding costs for individual pixels. In such an approach, mutual embedding impacts are often ignored. In this paper, we present an approach that can exploit the interactions among embedding changes in order to reduce the risk of detection by steganalysis. It employs a novel strategy, called clustering modification directions (CMDs), based on the assumption that when embedding modifications in heavily textured regions are locally heading toward the same direction, the steganographic security might be improved. To implement the strategy, a cover image is decomposed into several subimages, in which message segments are embedded with well-known schemes using additive distortion functions. The costs of pixels are updated dynamically to take mutual embedding impacts into account. Specifically, when neighboring pixels are changed toward a positive/negative direction, the cost of the considered pixel is biased toward the same direction. Experimental results show that our proposed CMD strategy, incorporated into existing steganographic schemes, can effectively overcome the challenges posed by the modern steganalyzers with high-dimensional features.
引用
收藏
页码:1905 / 1917
页数:13
相关论文
共 36 条
[1]  
[Anonymous], 2010, ADV STAT STEGANALYSI
[2]  
[Anonymous], 2012, P INT WORKSH INF HID
[3]  
[Anonymous], 2013, P 1 ACM WORKSH INF H
[4]  
[Anonymous], P SPIE
[5]  
Bas Patrick, 2011, Information Hiding. 13th International Conference, IH 2011. Revised Selected Papers, P59, DOI 10.1007/978-3-642-24178-9_5
[6]  
Bohme R., 2008, PhD thesis,
[7]   Non-uniform Quantization in Breaking HUGO [J].
Chen, Licong ;
Shi, Yun Q. ;
Sutthiwan, Patchara ;
Niu, Xinxin .
DIGITAL-FORENSICS AND WATERMARKING, IWDW 2013, 2014, 8389 :48-62
[8]  
Denemark T., 2014, P SPIE ELECT IMAG ME, V9028
[9]  
Denemark T, 2014, IEEE INT WORKS INFOR, P48, DOI 10.1109/WIFS.2014.7084302
[10]   Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes [J].
Filler, Tomas ;
Judas, Jan ;
Fridrich, Jessica .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :920-935