高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

一种动态更新失真代价的自适应k隐写算法

汤光明 边媛 韦大伟 高瞻瞻 朱垚臻

汤光明, 边媛, 韦大伟, 高瞻瞻, 朱垚臻. 一种动态更新失真代价的自适应k隐写算法[J]. 电子与信息学报, 2017, 39(1): 58-65. doi: 10.11999/JEIT160254
引用本文: 汤光明, 边媛, 韦大伟, 高瞻瞻, 朱垚臻. 一种动态更新失真代价的自适应k隐写算法[J]. 电子与信息学报, 2017, 39(1): 58-65. doi: 10.11999/JEIT160254
TANG Guangming, BIAN Yuan, WEI Dawei, GAO Zhanzhan, ZHU Yaozhen. Adaptive k Steganography Based on Dynamic Updating Distortion Cost[J]. Journal of Electronics & Information Technology, 2017, 39(1): 58-65. doi: 10.11999/JEIT160254
Citation: TANG Guangming, BIAN Yuan, WEI Dawei, GAO Zhanzhan, ZHU Yaozhen. Adaptive k Steganography Based on Dynamic Updating Distortion Cost[J]. Journal of Electronics & Information Technology, 2017, 39(1): 58-65. doi: 10.11999/JEIT160254

一种动态更新失真代价的自适应k隐写算法

doi: 10.11999/JEIT160254
基金项目: 

国家自然科学基金(61303074),信息保障技术重点实验室开放基金(KJ-14106)

Adaptive k Steganography Based on Dynamic Updating Distortion Cost

Funds: 

The National Natural Science Foundation of China (61303074), The Foundation of Science and Technology on Information Assurance Laboratory (KJ-14106)

  • 摘要: 基于失真函数的自适应隐写技术在嵌入过程中,忽略了嵌入操作相互间的影响,隐写策略无法随载体统计特性的改变自适应地调节。考虑嵌入操作的交互影响,该文提出一种基于动态更新失真代价的k隐写算法。首先分析了中心像素与其邻域的相关性,理论证明了在4-邻域修改情况下中心像素的最优修改方式,进而提出了失真代价更新策略MDS(Modification Degree Strategy);并结合该策略设计实现了一种自适应k隐写算法。实验表明,五元修改方式下算法UNIWARD-MDS(Pentary Version)在高嵌入率下(0.5~1.0 bpp)的抗SRM检测性优于S-UNIWARD(Pentary Version),同时在抵抗maxSRMd2检测时不同嵌入率下均优于S-UNIWARD(Pentary Version);三元修改方式下算法HILL-MDS和UNIWARD-MDS(Ternary Version)抗检测性能优于对应的自适应隐写算法HILL和S-UNIWARD(Ternary Version)。
  • 韩涛, 祝跃飞. 基于 Canny 边缘检测的自适应空域隐写术[J]. 电子与信息学报, 2015, 37(5): 1266-1270. doi: 10.11999/ JEIT141121.
    HAN Tao and ZHU Yuefei. Adaptive spatial steganography based on Cannys edge detection[J]. Journal of Electronics Information Technology, 2015, 37(5): 1266-1270. doi: 10. 11999/JEIT141121.
    FILLER T, JUDAS J, and FRIDRICH J. Minimizing additive distortion in steganography using syndrome-trellis codes[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 920-935. doi: 10.1109/TIFS.2011. 2134094.
    GUL G and KURUGOLLU F. A new methodology in steganalysis: Breaking highly undetectable steganograpy (HUGO)[J]. LNCS, 2011, 6958: 71-84.
    PENVY T, BAS P, and FRIDRICH J. Steganalysis by subtractive pixel adjacency matrix[C]. Proceedings of the 11th ACM Multimedia and Security Workshop, Princeton, NJ, USA, September 2009: 75-84.
    HOLUB V and FRIDRICH J. Designing steganographic distortion using directional filters[C]. Proceedings of the IEEE Workshop on Information Forensic and Security, Tenerife, Spain, 2012: 234-239.
    HOLUB V and FRIDRICH J. Digital image steganography using universal distortion[C]. Proceedings of 1st ACM Workshop on Information Hiding and Multimedia Security, Montpellier, France, 2013: 59-68.
    LI Bin, WANG Ming, HUANG Jiwu, et al. A new cost function for spatial image steganography[C]. Proceedings of the IEEE International Conference on Image Processing, Pairs, France, 2014: 4206-4210.
    LI Bin, TAN Shunquan, WANG Ming, et al. Investigation on cost assignment in spatial image steganography[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(8): 1264-1277. doi: 10.1109/TIFS.2014.2326954.
    FILLER T and FRIDRICH J. Gibbs construction in steganography[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(4): 705-720. doi: 10.1109/ TIFS.2010.2077629.
    TOMAS Denmark and FRIDRICH J. Improving steganographic security by synchronizing the selection channel[C]. Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, Portland, Oregon, USA, 2015: 5-14. doi: 10.1145/2756601.2756620.
    LI Bin, WANG Ming, TAN Shunquan, et al. A strategy of clustering modification directions in spatial image steganography[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(9): 1905-1917. doi: 10.1109/ TIFS.2434600.
    BAS P and PENVY T. Break our steganographic system-the ins and outs of organizing BOSS[J]. LNCS, 2011, 6598: 59-70.
    KODOVSKY J, FRIDRICH J, and HOLUB V. Ensemble classifiers for steganalysis of digital media[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 432-444. doi: 10.1109/TIFS.2011.2175919.
    FRIDRICH J and KODOVSKY J. Rich models for steganalysis of digital images[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(3): 868-882. doi: 10.1109/TIFS.2012.2190402.
    FRIDRICH J. Content-adaptive pentary steganography using the multivariate generalized gaussian cover model[C]. Proceeding of SPIE-The International Society for Optical Engineering, San Francisco, CA, USA, 2015, 9409: 94090H- 94090H-13.
    TOMAS Denmark, SEDIGHI V, HOLUB V, et al. Selection-channel-aware rich model for steganalysis of digital images[C]. IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, CA, USA, 2014: 48-53.
  • 加载中
计量
  • 文章访问数:  1487
  • HTML全文浏览量:  111
  • PDF下载量:  366
  • 被引次数: 0
出版历程
  • 收稿日期:  2016-03-17
  • 修回日期:  2016-08-17
  • 刊出日期:  2017-01-19

目录

    /

    返回文章
    返回