Advanced Search
Volume 39 Issue 1
Jan.  2017
Turn off MathJax
Article Contents
TANG Guangming, BIAN Yuan, WEI Dawei, GAO Zhanzhan, ZHU Yaozhen. Adaptive k Steganography Based on Dynamic Updating Distortion Cost[J]. Journal of Electronics & Information Technology, 2017, 39(1): 58-65. doi: 10.11999/JEIT160254
Citation: TANG Guangming, BIAN Yuan, WEI Dawei, GAO Zhanzhan, ZHU Yaozhen. Adaptive k Steganography Based on Dynamic Updating Distortion Cost[J]. Journal of Electronics & Information Technology, 2017, 39(1): 58-65. doi: 10.11999/JEIT160254

Adaptive k Steganography Based on Dynamic Updating Distortion Cost

doi: 10.11999/JEIT160254
Funds:

The National Natural Science Foundation of China (61303074), The Foundation of Science and Technology on Information Assurance Laboratory (KJ-14106)

  • Received Date: 2016-03-17
  • Rev Recd Date: 2016-08-17
  • Publish Date: 2017-01-19
  • Adaptive steganography ignores the interactive impact introduced by the embedding operation during the embedding operation. Considering the cross impact of the embedding operation, an adaptive k steganography is put forward based on the dynamic distortion cost updating strategy Modification Degree Strategy (MDS). First, the analysis is conducted to prove the optimizing modification of the central pixel under the condition of the neighborhoods modifications. Then the MDS of updating the distortion cost is presented to adjust the distortion cost according to the modification of neighborhood. Finally, the steganography scheme is proposed using the MDS. The experimental result illustrates that the UNIWARD-MDS (Pentary Version) has a better performance than S-UNIWARD (Pentary Version) at the embedding rate 0.5~1.0 bpp when resisting the steganalysis SRM. Meanwhile the UNIWARD-MDS (Pentary Version) is better than the S-UNIWARD (Pentary Version) at the embedding rate 0.05~1.0 bpp when resisting the maxSRMd2 detection. The HILL-MDS and UNIWARD-MDS (Ternary Version) perform better than the corresponding schemes HILL and S-UNIWARD (Ternary Version).
  • loading
  • 韩涛, 祝跃飞. 基于 Canny 边缘检测的自适应空域隐写术[J]. 电子与信息学报, 2015, 37(5): 1266-1270. doi: 10.11999/ JEIT141121.
    HAN Tao and ZHU Yuefei. Adaptive spatial steganography based on Cannys edge detection[J]. Journal of Electronics Information Technology, 2015, 37(5): 1266-1270. doi: 10. 11999/JEIT141121.
    FILLER T, JUDAS J, and FRIDRICH J. Minimizing additive distortion in steganography using syndrome-trellis codes[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 920-935. doi: 10.1109/TIFS.2011. 2134094.
    GUL G and KURUGOLLU F. A new methodology in steganalysis: Breaking highly undetectable steganograpy (HUGO)[J]. LNCS, 2011, 6958: 71-84.
    PENVY T, BAS P, and FRIDRICH J. Steganalysis by subtractive pixel adjacency matrix[C]. Proceedings of the 11th ACM Multimedia and Security Workshop, Princeton, NJ, USA, September 2009: 75-84.
    HOLUB V and FRIDRICH J. Designing steganographic distortion using directional filters[C]. Proceedings of the IEEE Workshop on Information Forensic and Security, Tenerife, Spain, 2012: 234-239.
    HOLUB V and FRIDRICH J. Digital image steganography using universal distortion[C]. Proceedings of 1st ACM Workshop on Information Hiding and Multimedia Security, Montpellier, France, 2013: 59-68.
    LI Bin, WANG Ming, HUANG Jiwu, et al. A new cost function for spatial image steganography[C]. Proceedings of the IEEE International Conference on Image Processing, Pairs, France, 2014: 4206-4210.
    LI Bin, TAN Shunquan, WANG Ming, et al. Investigation on cost assignment in spatial image steganography[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(8): 1264-1277. doi: 10.1109/TIFS.2014.2326954.
    FILLER T and FRIDRICH J. Gibbs construction in steganography[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(4): 705-720. doi: 10.1109/ TIFS.2010.2077629.
    TOMAS Denmark and FRIDRICH J. Improving steganographic security by synchronizing the selection channel[C]. Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, Portland, Oregon, USA, 2015: 5-14. doi: 10.1145/2756601.2756620.
    LI Bin, WANG Ming, TAN Shunquan, et al. A strategy of clustering modification directions in spatial image steganography[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(9): 1905-1917. doi: 10.1109/ TIFS.2434600.
    BAS P and PENVY T. Break our steganographic system-the ins and outs of organizing BOSS[J]. LNCS, 2011, 6598: 59-70.
    KODOVSKY J, FRIDRICH J, and HOLUB V. Ensemble classifiers for steganalysis of digital media[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 432-444. doi: 10.1109/TIFS.2011.2175919.
    FRIDRICH J and KODOVSKY J. Rich models for steganalysis of digital images[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(3): 868-882. doi: 10.1109/TIFS.2012.2190402.
    FRIDRICH J. Content-adaptive pentary steganography using the multivariate generalized gaussian cover model[C]. Proceeding of SPIE-The International Society for Optical Engineering, San Francisco, CA, USA, 2015, 9409: 94090H- 94090H-13.
    TOMAS Denmark, SEDIGHI V, HOLUB V, et al. Selection-channel-aware rich model for steganalysis of digital images[C]. IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, CA, USA, 2014: 48-53.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1497) PDF downloads(366) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return