Towards improving the security of image steganography via minimizing the spatial embedding impact

被引:4
作者
Su, Wenkang [1 ]
Ni, Jiangqun [1 ,2 ]
Hu, Xianglei [3 ]
Huang, Fangjun [4 ]
机构
[1] Sun Yat Sen Univ, Sch Comp Sci & Engn, Guangzhou, Peoples R China
[2] Peng Cheng Lab, Cyberspace Secur Res Ctr, Shenzhen, Peoples R China
[3] Guangdong Polytech Normal Univ, Sch Comp Sci, Guangzhou, Peoples R China
[4] Sun Yat Sen Univ, Sch Cyber Sci & Technol, Shenzhen, Peoples R China
基金
中国国家自然科学基金;
关键词
Information hiding; Image steganography; Spatial embedding impact; Non -additive distortion; ADAPTIVE STEGANOGRAPHY; STEGANALYSIS;
D O I
10.1016/j.dsp.2022.103758
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the continuous advances in computer technology and electronics, image steganography, an important branch of information hiding aimed at hiding secret information in innocent digital images for covert communication, has also been developed significantly in recent years. Recent studies on image steganography have shown that non-additive distortion steganography schemes, e.g., Synch, CMD and Dejoin-J, can improve the security of additive steganographic distortion functions. These schemes are basically designed based on some heuristic experiences, whose essence can be attributed to implicitly reducing the spatial embedding impact. In view this, we develop a general Intra-block Modification Optimization (IbMO) strategy to improve the security of both spatial and JPEG image steganography via directly minimizing the spatial embedding impact, wherein the metric for spatial embedding impact is explicitly defined as the summation of absolute difference of noise residuals between cover and stego image. Note that, to apply it to JPEG image steganography, the IbMO strategy will be integrated into a newly proposed BBC-based Intra-block Joint Modification (IbJM) scheme with five-element crossing neighborhood. Experimental results indicate that the proposed IbMO strategy can obviously improve the security performances of additive distortion steganography schemes. Specifically, the IbMO strategy significantly outperforms Synch and rivals CMD on HiLL and MiPOD. The newly proposed IbJM scheme also shows better overall performance with less computational overhead than DeJoin-J on JUNIWARD, GUED, and BET, and its security performance can be further improved after integration with IbMO strategy.(c) 2022 Elsevier Inc. All rights reserved.
引用
收藏
页数:14
相关论文
共 38 条
[21]  
Li B, 2014, IEEE IMAGE PROC, P4206, DOI 10.1109/ICIP.2014.7025854
[22]   A Strategy of Clustering Modification Directions in Spatial Image Steganography [J].
Li, Bin ;
Wang, Ming ;
Li, Xiaolong ;
Tan, Shunquan ;
Huang, Jiwu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (09) :1905-1917
[23]   Defining Joint Distortion for JPEG Steganography [J].
Li, Weixiang ;
Zhang, Weiming ;
Chen, Kejiang ;
Zhou, Wenbo ;
Yu, Nenghai .
PROCEEDINGS OF THE 6TH ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY (IH&MMSEC'18), 2018, :5-16
[24]   PROBE VEHICLE TRACK-MATCHING ALGORITHM BASED ON SPATIAL SEMANTIC FEATURES [J].
Luo, Y. ;
Song, X. ;
Zheng, L. ;
Yang, C. ;
Yu, M. ;
Sun, M. .
ISPRS INTERNATIONAL WORKSHOP ON SPATIOTEMPORAL COMPUTING, 2015, :19-23
[25]   Backward movement oriented shark smell optimization-based audio steganography using encryption and compression strategies [J].
Manjunath, K. ;
Ramaiah, G. N. Kodanda ;
GiriPrasad, M. N. .
DIGITAL SIGNAL PROCESSING, 2022, 122
[26]  
Pevny T, 2010, LECT NOTES COMPUT SC, V6387, P161, DOI 10.1007/978-3-642-16435-4_13
[27]  
Pevny T, 2009, MM&SEC'09: PROCEEDINGS OF THE 2009 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, P75
[28]  
Pevny T, 2008, LECT NOTES COMPUT SC, V5284, P251
[29]   Content-Adaptive Steganography by Minimizing Statistical Detectability [J].
Sedighi, Vahid ;
Cogranne, Remi ;
Fridrich, Jessica .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (02) :221-234
[30]   Content-Adaptive Pentary Steganography Using the Multivariate Generalized Gaussian Cover Model [J].
Sedighi, Vahid ;
Fridrich, Jessica ;
Cogranne, Remi .
MEDIA WATERMARKING, SECURITY, AND FORENSICS 2015, 2015, 9409