为了提高隐写的安全性,提出了基于一种新失真代价函数的自适应JPEG 隐写算
法. 考虑到纹理区域更有利于信息嵌入,本算法通过非零量化DCT 系数的绝对值加权和来
度量DCT 子块的纹理程度,并引入均匀嵌入思想,设计出了一种新的失真代价度量函数;同
时利用STC(syndrome trellis codes)编码将嵌入修改均匀地分散在任意数量级的非零量化
DCT 系数上,实现了秘密信息自适应地嵌入到载体的纹理区域中. 实验结果表明,在同等低
嵌入率下,该方法的安全性优于同类隐写算法.
To improve security of steganography, this paper proposes an adaptive steganographic
scheme for JPEG images based on a new distortion cost function. As texture areas
in a cover image are more suitable for information embedding, the sum of absolute values
of all non-zero quantized DCT coefficients in a DCT block is used to measure texture of
the block. Combining the previous uniform embedding scheme, a new distortion cost function
is defined. With syndrome trellis codes, embedding modification spreads uniformly
over DCT coefficients of all possible magnitudes, embedding secret data adaptively into
the texture areas in the cover. Experimental results show that the proposed scheme out
performs the prior arts in terms of security with the same low payload.
[1] SALLEE P. Model-basedsteganography[M]. In: Proceedings of International Workshop on Digital Watermarking. Springer-Verlag, LNCS 2939, 2004: 154-167.
[2] CRANDALL R. Some notes on steganography[J]. Posted on Steganography Mailing List, 1998.
[3] WESTFELD A. F5—A steganographic algorithm high capacity despite better steganalysis[C]// In: Proceedings of Information Hiding 4th International Workshop. Springer-Verlag, LNCS 2137, 2001: 289-302.
[4] KIM Y, DURIC Z, RICHARDS D. Modified matrix encoding technique for minimal distortion steganography[C]//In: Proceedings of 6th International Workshop on Information Hiding. Springer-Verlag, LNCS 4437, 2006: 314-327.
[5] FRIDRICH J, GOLJAN M, LISONEK P, SOUKAL D. Writing on wet paper[J]. IEEE Transactions on Signal Processing,Special Issue on Media Security.2004, 54(10): 3923-3935.
[6] FRIDRICH J, PEVNY T, KODOVSKY J. Statistically undetectableJPEG steganography: dead ends, challenges, and opportunities[C]//In: Proceedings of the 9th ACM Workshop on Multimedia & Security. New York: ACM Press, 2007: 3-14.
[7] FILLER T, JUDAS J, FRIDRICH J. Minimizing embedding impact in steganography using trellis-coded quantization[C]//In: Proceedings of SPIE, Electronic Imaging, Media Forensics and Security XII. San Jose, CA, 2010, 7541(5): 1-14.
[8] SACHNEV V, KIM H, ZHANG R. Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding[C]//In: Proceedings of the 11th ACM Multimedia & Security Workshop. New Jersey, 2009: 131-139.
[9] GUO L J, NI J Q, SHI Y Q.Uniform embedding for efficient JPEG steganography[J].IEEE Transactions on Information Forensics and Security. 2014, 9(5): 814-825.
[10] GUO L J, NI J Q, SHI Y Q. An efficient JPEG steganographic scheme using uniform embedding[C]//IEEE International Workshop on Information Forensics and Security, Tenerife, 2012: 169 – 174.
[11] FILLER T, FRIDRICH J. Design of adaptive steganographic schemes for digital images[C]// In: Proceedings of SPIE Electronic Imaging, Media Watermarking, Security, and Forensics XIII. Bellingham: SPIE Press, 2011, 7880: 1-14.
[12] FILLER T, PENVY T, BAS P. BOSS (Break our steganography system)[J]. 2010.
[13] PEVNY T, FRIDRICH J. Merging markov and DCT features for multi-class JPEG steganalysis[C]//In: Proceedings of SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX. Bellingham, Wash, 2007: 1-13.
[14] KODOVSKY J, FRIDRICH J. Calibration revisited[C]// In: Proceedings of 11th ACM Multimedia &Security Workshop. Princeton, New Jersey, USA, 2009: 63-74.
[15] KODOVSKY J, FRIDRICH J, HOLUB V. Ensemble classifier for steganalysis of digital media[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 432-444.
[16] KODOVSKY J, FRIDRICH J. Steganalysis of JPEG images using rich models[C]// In: Proceedings of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics of Multimedia XIV, San Francisco, CA, January 22-26, 2012.