高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

失真代价动态更新的自适应彩色图像隐写算法

汤光明 姜明明 孙艺

汤光明, 姜明明, 孙艺. 失真代价动态更新的自适应彩色图像隐写算法[J]. 电子与信息学报, 2019, 41(3): 656-665. doi: 10.11999/JEIT180388
引用本文: 汤光明, 姜明明, 孙艺. 失真代价动态更新的自适应彩色图像隐写算法[J]. 电子与信息学报, 2019, 41(3): 656-665. doi: 10.11999/JEIT180388
Guangming TANG, Mingming JIANG, Yi SUN. Adaptive Color Image Steganography Based on Dynamic Distortion Modification[J]. Journal of Electronics & Information Technology, 2019, 41(3): 656-665. doi: 10.11999/JEIT180388
Citation: Guangming TANG, Mingming JIANG, Yi SUN. Adaptive Color Image Steganography Based on Dynamic Distortion Modification[J]. Journal of Electronics & Information Technology, 2019, 41(3): 656-665. doi: 10.11999/JEIT180388

失真代价动态更新的自适应彩色图像隐写算法

doi: 10.11999/JEIT180388
基金项目: 国家自然科学基金(61601517),信息保障技术重点实验室开放基金(KJ-15-106)
详细信息
    作者简介:

    汤光明:女,1963年生,教授,博士生导师,研究方向为网络安全、信息隐藏

    姜明明:女,1994年生,硕士生,研究方向为信息隐藏

    孙艺:女,1993年生,硕士生,研究方向为信息隐藏

    通讯作者:

    姜明明 jiangmingming1994@163.com

  • 中图分类号: TP309

Adaptive Color Image Steganography Based on Dynamic Distortion Modification

Funds: The National Natural Science Foundation of China (61601517), The Foundation of Science and Technology on Information Assurance Laboratory (KJ-15-106)
  • 摘要:

    基于灰度图像隐写算法直接应用于彩色图像引起的安全性问题,该文针对彩色分量提出一种动态更新失真代价的空域隐写算法。首先,分析了彩色分量内容特性与通道间相关性的关系,提出中心元素的失真更新准则。随后,考虑到隐写过程中邻域分量嵌入修改产生的交互影响,得到维持邻域相关性的最优修改方式。最后,提出彩色分量的失真代价动态更新策略(CCMS),并应用该策略设计实现了一种彩色图像的空域自适应隐写算法。实验表明,在5种嵌入率下HILL-CCMS,WOW-CCMS算法对彩色隐写特征CRM,SCCRM的抗检测能力明显高于HILL和WOW算法。

  • 图  1  彩色邻域系统示意图

    图  2  彩色原图像及其各通道图像

    图  3  UCID图像库中的4幅图像示例

    图  4  Sobel算示意图

    图  5  3类邻域划分示意图

    图  6  采样图像块示意图

    图  7  HILL-CCMS抗SRM检测性能图

    图  8  WOW-CCMS抗SRM检测性能

    图  9  HILL-CCMS抗CRM检测性能

    图  10  WOW-CCMS抗CRM检测性能

    图  11  HILL-CCMS抗SCCRM检测性能

    图  12  WOW-CCMS抗SCCRM检测性能

    表  1  UCID图像库中4幅图像的相关性系数值

    序号HHHLLHLL
    R/GR/BG/BR/GR/BG/BR/GR/BG/BR/GR/BG/B
    10.9860.9850.9830.9900.9620.9940.9950.9900.9950.8370.9550.941
    20.9410.9450.9430.9340.9730.9880.9270.9740.9270.4790.8690.972
    30.9820.9780.9680.9890.9830.9850.9270.9750.9270.8850.9090.891
    40.9480.9530.9390.9800.9910.9760.9780.9740.9780.8230.9070.904
    下载: 导出CSV

    表  2  3种修改模式的颜色分量修改组合

    序号123456
    Syn(0, 0, 0)(+1, +1, +1)(–1, –1, –1)
    1-Asyn(+1, 0, 0)(–1, 0, 0)(0, 0, +1)(0, 0, –1)(0, +1, +1)(–1, +1, +1)
    2-Asyn(+1, 0, +1)(+1, 0, –1)(–1, 0, +1)(–1, 0, –1)(0, +1, 0)(–1, +1, –1)
    序号789101112
    Syn
    1-Asyn(+1, +1, 0)(+1, +1, –1)(0, –1, –1)(+1, –1, –1)(+1, –1, –0)(–1, –1, +1)
    2-Asyn(–1, +1, 0)(0, +1, –1)(0, –1, 0)(+1, –1, 0)(0, –1, +1)(+1, –1, +1)
    下载: 导出CSV

    表  3  彩色分量不同修改模式下的抗隐写检测能力

    抗检测性(%)Syn1-Asyn2-Asyn
    SRM31.529031.085030.9980
    CRM35.932019.8730 2.9473
    SCCRM30.453019.9450 3.0272
    GCRM37.766021.6840 5.7357
    下载: 导出CSV

    表  4  4种隐写算法隐写后彩色图像的平均峰值信噪比(dB)

    嵌入率(bpc)0.10.20.30.40.5
    WOW-CMD39.03437.51635.37133.24630.617
    HILL-CMD38.91537.48235.26832.19229.781
    WOW-CCMS40.23138.64737.14335.07131.726
    HILL-CCMS39.87338.53436.89434.73531.084
    下载: 导出CSV

    表  5  6种算法对一幅尺寸为$256 \times 256$的彩色图像进行隐写的平均执行时间(s)

    嵌入率(bpc)0.10.20.30.40.5
    WOW0.40530.50120.59450.69310.8967
    HILL0.30180.38670.47330.55910.7078
    WOW-CMD0.61230.71080.81260.91281.4204
    HILL-CMD0.37420.48060.57680.69320.8974
    WOW-CCMS0.63970.74030.84310.94481.4532
    HILL-CCMS0.40270.51060.60930.72730.9356
    下载: 导出CSV
  • DENEMARK T D, BOROUMAND M, and FRIDRICH J. Steganalysis features for content-adaptive JPEG steganography[J]. IEEE Transactions on Information Forensics & Security, 2017, 11(8): 1736–1746. doi: 10.1109/TIFS.2016.2555281
    汤光明, 边媛, 韦大伟, 等. 一种动态更新失真代价的自适应±k隐写算法[J]. 电子与信息学报, 2017, 39(1): 58–65. doi: 10.11999/JEIT160254

    TANG Guangming, BIAN Yuan, WEI Dawei, et al. Adaptive ±k steganography based on dynamic updating distortion cost[J]. Journal of Electronics &Information Technology, 2017, 39(1): 58–65. doi: 10.11999/JEIT160254
    TANG Weixuan, LI Bin, LUO Weiqi, et al. Clustering steganographic modification directions for color components[J]. IEEE Signal Processing Letters, 2016, 23(2): 197–201. doi: 10.1109/LSP.2015.2504583
    PEVNÝ T, FILLER T, and BAS P. Using high-dimensional image models to perform highly undetectable steganography[J]. Lecture Notes in Computer Science, 2010, 6(6387): 161–177. doi: 10.1007/978-3-642-16435-4_13
    HOLUB V and FRIDRICH J. Designing steganographic distortion using directional filters[C]. IEEE International Workshop on Information Forensics and Security, Costa Adeje, Spain, 2012: 234–239.
    FRIDRICH J and KODOVSKY J. Rich models for steganalysis of digital images[J]. IEEE Transactions on Information Forensics & Security, 2012, 7(3): 868–882. doi: 10.1109/TIFS.2012.2190402
    FRIDRICH J. Digital image steganography using universal distortion[C]. ACM Workshop on Information Hiding and Multimedia Security, Montpellier, France, 2013: 59–68.
    LI Bin, WANG Ming, HUANG Jiwu, et al. A new cost function for spatial image steganography[C]. IEEE International Conference on Image Processing, Quebec City, Canada, 2015: 4206–4210.
    GOLJAN M, FRIDRICH J, and COGRANNE R. Rich model for steganalysis of color images[C]. IEEE International Workshop on Information Forensics and Security, Roma, Italy, 2015: 185–190.
    ABDULRAHMAN H, CHAUMONT M, MONTESINOS P, et al. Color image stegananalysis using correlations between RGB channels[C]. International Conference on Availability, Reliability and Security, Toulouse, France, 2015: 448–454.
    ABDULRAHMAN H, CHAUMONT M, MONTESINOS P, et al. Color image steganalysis based on steerable Gaussian filters bank[C]. ACM Workshop on Information Hiding and Multimedia Security, Vigo, Spain, 2016: 109–114.
    LI Bin, WANG Ming, LI Xiaolong, et al. A strategy of clustering modification directions in spatial image steganography[J]. IEEE Transactions on Information Forensics & Security, 2015, 10(9): 1905–1917. doi: 10.1109/TIFS.2015.2434600
    GUNTURK B K, ALTUNBASAK Y, and MERSEREAU R M. Color plane interpolation using alternating projections[J]. IEEE Transactions on Image Processing, 2002, 11(9): 997–1013. doi: 10.1109/TIP.2002.801121
    SCHAEFER G and STICH M. UCID - An uncompressed colour image database[J]. Storage & Retrieval Methods & Applications for Multimedia, 2003, 5307: 472–480. doi: 10.1117/12.525375
    DING Yong, ZHAO Yang, and ZHAO Xinyu. Image quality assessment based on multi-feature extraction and synthesis with support vector regression[J]. Signal Processing Image Communication, 2017, 54(3): 81–92. doi: 10.1016/j.image.2017.03.001
    KODOVSKY J, FRIDRICH J, and HOLUB V. Ensemble classifiers for steganalysis of digital media[J]. IEEE Transactions on Information Forensics & Security, 2012, 7(2): 432–444. doi: 10.1109/TIFS.2011.2175919
  • 加载中
图(12) / 表(5)
计量
  • 文章访问数:  2230
  • HTML全文浏览量:  820
  • PDF下载量:  67
  • 被引次数: 0
出版历程
  • 收稿日期:  2018-04-26
  • 修回日期:  2018-09-26
  • 网络出版日期:  2018-11-01
  • 刊出日期:  2019-03-01

目录

    /

    返回文章
    返回