ADAPTIVE STEGANOGRAPHY BY ORACLE (ASO)

被引:0
作者
Kouider, Sarra [1 ]
Chaumont, Marc [1 ]
Puech, William [1 ]
机构
[1] Univ Montpellier 2, CNRS, LIRMM Lab, UMR 5506, F-34095 Montpellier 05, France
来源
2013 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME 2013) | 2013年
关键词
Steganography; Steganalysis; Oracle; Detectability map; Security;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
HUGO [1] and MOD [2] are the most secure adaptive embedding algorithms of 2011. These algorithms strive to hide a secret message, while minimizing an ad hoc embedding impact. They use a detectability map, which, if properly defined, is correlated to the security. In this paper, we present a new adaptive embedding scheme: Adaptive Steganography by Oracle (ASO). It is based on an oracle used to calculate the detectability map, and this oracle use the Kodovsky's ensemble classifiers [3]. Our approach preserves both cover image and sender's database distributions during the embedding process, which improves the security. In addition, it offers to the sender the opportunity to choose the most reliable image(s), during his secret communication. Experimental results show that our embedding scheme presents good security performances, since the detection error of ASO is much higher than that of HUGO.
引用
收藏
页数:6
相关论文
共 11 条
[1]  
[Anonymous], 2012, IEEE T INF FORENSICS
[2]  
Bas P., 2011, P 13 INF HID C PRAG, V6958, DOI 10.1007/978-3-642- 24178-9_5
[3]  
Cancelli G, 2008, 2008 IEEE 10TH WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, VOLS 1 AND 2, P795, DOI 10.1109/MMSP.2008.4665182
[4]  
Filler T., 2011, MED WAT SEC FOR 13 P, V7880, pF 1
[5]   Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes [J].
Filler, Tomas ;
Judas, Jan ;
Fridrich, Jessica .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :920-935
[6]  
Fridrich J., 2011, LECT NOTES COMPUTER, V6958
[7]   Practical methods for minimizing embedding impact in steganography [J].
Fridrich, Jessica ;
Filler, Tomas .
SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS IX, 2007, 6505
[8]   Rich Models for Steganalysis of Digital Images [J].
Fridrich, Jessica ;
Kodovsky, Jan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) :868-882
[9]  
Kodovsky J, 2011, MM&SEC 11: PROCEEDINGS OF THE 2011 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, P69
[10]  
Kodovsky J, 2008, MM&SEC'08: PROCEEDINGS OF THE MULTIMEDIA & SECURITY WORKSHOP 2008, P123, DOI 10.1145/1411328.1411352