Secure steganography based on embedding capacity

被引:0
作者
Hedieh Sajedi
Mansour Jamzad
机构
[1] Sharif University of Technology,Department of Computer Engineering
来源
International Journal of Information Security | 2009年 / 8卷
关键词
Steganalysis; Steganography; Embedding capacity; Support vector machine; Ensemble method; Image complexity;
D O I
暂无
中图分类号
学科分类号
摘要
Mostly the embedding capacity of steganography methods is assessed in non-zero DCT coefficients. Due to unequal distribution of non-zero DCT coefficients in images with different contents, images with the same number of non-zero DCT coefficients may have different actual embedding capacities. This paper introduces embedding capacity as a property of images in the presence of multiple steganalyzers, and discusses a method for computing embedding capacity of cover images. Using the capacity constraint, embedding can be done more secure than the state when the embedder does not know how much data can be hidden securely in an image. In our proposed approach, an ensemble system that uses different steganalyzer units determines the security limits for embedding in cover images. In this system, each steganalyzer unit is formed by a combination of multiple steganalyzers from the same type, which are sensitive to different payloads. The confidence of each steganalyzer on an image leads us to determine the upper bound of embedding rate for the image. Considering embedding capacity, the steganographer can minimize the risk of detection by selecting a proper cover image that is secure for a certain payload. Moreover, we analyzed the relation between complexity and embedding capacity of images. Experimental results showed the effectiveness of the proposed approach in enhancing the security of stego images.
引用
收藏
页码:433 / 445
页数:12
相关论文
共 23 条
[1]  
Chandramouli R.(2003)Steganography capacity: a steganalysis perspective Proc. SPIE Secur. Watermarking Multimed. Contents 5020 173-177
[2]  
Memon N.D.(2002)A framework for evaluating the data hiding capacity of image sources IEEE Trans. Image Process. 11 1029-1042
[3]  
Moulin P.(2006)A Batch steganography and pooled steganalysis Proc. Inf. Hiding Workshop 4437 265-281
[4]  
Mihcak M.K.(2007)A capacity result for batch steganography IEEE Signal Process. Let. 14 525-528
[5]  
Ker A.D.(1999)A short introduction to boosting J. Jpn. Soc. Artif. Intell. 14 771-780
[6]  
Ker A.D.(2004)A new fuzzy support vector machine based on the weighted margin Neural Process. Lett. 20 139-150
[7]  
Freund Y.(1998)A tutorial on support vector machines for pattern recognition Data Min. Knowl. Discov. 2 121-167
[8]  
Schapire R.(2003)The support vector machine under test Neurocomputing 55 169-186
[9]  
Qing T.(2004)Perceptual image quality assessment: from error visibility to structural similarity IEEE Trans. Image Process. 13 600-612
[10]  
Jue W.(2001)Adaptive skin-color filter Pattern Recognit. 34 1067-1073