Towards improving the security of image steganography via minimizing the spatial embedding impact

被引:4
作者
Su, Wenkang [1 ]
Ni, Jiangqun [1 ,2 ]
Hu, Xianglei [3 ]
Huang, Fangjun [4 ]
机构
[1] Sun Yat Sen Univ, Sch Comp Sci & Engn, Guangzhou, Peoples R China
[2] Peng Cheng Lab, Cyberspace Secur Res Ctr, Shenzhen, Peoples R China
[3] Guangdong Polytech Normal Univ, Sch Comp Sci, Guangzhou, Peoples R China
[4] Sun Yat Sen Univ, Sch Cyber Sci & Technol, Shenzhen, Peoples R China
基金
中国国家自然科学基金;
关键词
Information hiding; Image steganography; Spatial embedding impact; Non -additive distortion; ADAPTIVE STEGANOGRAPHY; STEGANALYSIS;
D O I
10.1016/j.dsp.2022.103758
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the continuous advances in computer technology and electronics, image steganography, an important branch of information hiding aimed at hiding secret information in innocent digital images for covert communication, has also been developed significantly in recent years. Recent studies on image steganography have shown that non-additive distortion steganography schemes, e.g., Synch, CMD and Dejoin-J, can improve the security of additive steganographic distortion functions. These schemes are basically designed based on some heuristic experiences, whose essence can be attributed to implicitly reducing the spatial embedding impact. In view this, we develop a general Intra-block Modification Optimization (IbMO) strategy to improve the security of both spatial and JPEG image steganography via directly minimizing the spatial embedding impact, wherein the metric for spatial embedding impact is explicitly defined as the summation of absolute difference of noise residuals between cover and stego image. Note that, to apply it to JPEG image steganography, the IbMO strategy will be integrated into a newly proposed BBC-based Intra-block Joint Modification (IbJM) scheme with five-element crossing neighborhood. Experimental results indicate that the proposed IbMO strategy can obviously improve the security performances of additive distortion steganography schemes. Specifically, the IbMO strategy significantly outperforms Synch and rivals CMD on HiLL and MiPOD. The newly proposed IbJM scheme also shows better overall performance with less computational overhead than DeJoin-J on JUNIWARD, GUED, and BET, and its security performance can be further improved after integration with IbMO strategy.(c) 2022 Elsevier Inc. All rights reserved.
引用
收藏
页数:14
相关论文
共 38 条
[1]  
[Anonymous], PHIL SALLEES MATLAB
[2]  
Bas Patrick, 2011, Information Hiding. 13th International Conference, IH 2011. Revised Selected Papers, P59, DOI 10.1007/978-3-642-24178-9_5
[3]  
Chaumont M., 2020, Digital Media Steganography, P321, DOI [DOI 10.1016/B978-0-12-819438-6.00022-0, 10.1016/B978-0-12-819438-6.00022-0]
[4]  
Cox IJ, 2008, MKS MULTIMED INFORM, P1
[5]  
Denemark T., 2015, PROC ACM WORKSHOP IN, P5
[6]   Steganalysis Features for Content-Adaptive JPEG Steganography [J].
Denemark, Tomas ;
Boroumand, Mehdi ;
Fridrich, Jessica .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (08) :1747-1757
[7]  
Denemark T, 2014, IEEE INT WORKS INFOR, P48, DOI 10.1109/WIFS.2014.7084302
[8]   Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes [J].
Filler, Tomas ;
Judas, Jan ;
Fridrich, Jessica .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :920-935
[9]   Rich Models for Steganalysis of Digital Images [J].
Fridrich, Jessica ;
Kodovsky, Jan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) :868-882
[10]   Calibrated steganalysis of mp3stego in multi-encoder scenario [J].
Ghasemzadeh, Hamzeh .
INFORMATION SCIENCES, 2019, 480 :438-453