信号与信息处理

基于J-UNIWARD的改进隐写算法

展开
  • 华中师范大学 物理科学与技术学院, 湖北 武汉 430079

收稿日期: 2020-06-15

  网络出版日期: 2021-04-01

基金资助

国家自然科学基金(No.U1736121);中央高校自主科研项目GF后期资助

Improved Steganography Algorithm Based on J-UNIWARD

Expand
  • School of Physical Science and Technology, Central China Normal University Wuhan 430079, Hubei, China

Received date: 2020-06-15

  Online published: 2021-04-01

摘要

为了进一步提高自适应隐写算法的安全性,本文引进图像分块的思想,改写了原J-UNWARD算法的失真函数,变加性失真函数为非加性失真函数。载体图像被分为4个子块,分别计算每个子块的纹理复杂度以嵌入总量不变为约束条件,优先嵌入复杂度较大的块,每嵌入一块完成后重新计算失真函数,根据复杂度大小动态调整每个子块的嵌入量。利用STC(syndrome trelliscodes)编码将秘密信息自适应地嵌入到纹理区域,最后采用DCTR和ccJRM两种隐写分析技术进行检测分析。实验结果表明:在相同容量下,改进算法能显著提高算法的抗隐写分析能力。

本文引用格式

伍迁, 吴建斌, 刘子璇, 宋梦丽 . 基于J-UNIWARD的改进隐写算法[J]. 应用科学学报, 2021 , 39(2) : 293 -301 . DOI: 10.3969/j.issn.0255-8297.2021.02.011

Abstract

In order to further improve the security of adaptive steganography algorithms, this article introduces the idea of image blocking, rewrites the distortion function of the original J-UNIWARD algorithm, and changes additive distortion functions to non-additive distortion functions. The implementation process of the algorithm is as follows: The carrier image to be processed is divided into four sub-blocks, and the texture complexity of each sub-block is calculated separately, under the constraint of keeping total embedding amount unchanged. The more complex blocks are preferentially chosen to be embedded. By recalculating the distortion function after each block-embedding, the embedding amount is dynamically adjusted according to the complexity. Then the secret information is adaptively embed into the texture area by STC (syndrome trelliscodes) encoding. Finally, detection performance is analyzed by using DCTR and ccJRM steganalysis techniques. Experimental results show that under the same capacity, the proposed algorithm can significantly improve the anti-stealth analysis ability of the algorithm.

参考文献

[1] Zhang Q, Liu Y, Nan Y, et al. Classification algorithm of JSteg and F5 Stego-images based on histogram difference[J]. Energy Procedia, 2011, 13:8759-8766.
[2] Westfeld A. F5-a steganographic algorithm[C]//International Workshop on Information Hiding. Springer, Berlin, Heidelberg, 2001.
[3] Huang J W, Shi Y Q. Embedding gray level images[C]//ISCAS 2001. The 2001 IEEE International Symposium on Circuits and Systems. IEEE, 2001.
[4] Fridrich J. Statistically undetectable JPEG steganography:dead ends challenges, and opportunities[C]//Workshop on Multimedia & Security. DBLP, 2007.
[5] Sachnev V, Kim H J. An improved matrix encoding scheme for JPEG steganography[C]//International Conference on Digital-forensics & Watermarking. Springer, Berlin, Heidelberg, 2011.
[6] Fridrich J, Goljan M, Lisonek P. Writing on wet paper[J]. IEEE Transactions on Signal Processing, 2005, 53(10):3932-3935.
[7] Filler, T, Judas, J, Fridrich J. Minimizing additive distortion in steganography using syndrome-trellis codes[J]. IEEE Transactions on Information Forensics & Security, 2011, 6(3):920-935.
[8] Fridrich J, Kodovský J. Multivariate gaussian model for designing additive distortion for steganography[C]//IEEE International Conference on Acoustics. IEEE, 2013.
[9] Fridrich J J, Goljan M, Soukal D. Perturbed quantization steganography with wet paper codes[C]//Proceedings of the 6th workshop on Multimedia & Security. Magdeburg, Germany, 2004.
[10] Huang F J, Huang J W, Shi Y Q. New channel selection rule for JPEG steganography[J]. IEEE Transactions on Information Forensics & Security, 2012, 7(4):1181-1191.
[11] Guo L J, Ni J Q, Shi Y Q. Uniform embedding for efficient JPEG steganography[J]. IEEE Transactions on Information Forensics & Security, 2014, 9(5):814-825.
[12] Guo L J, Ni J Q, Shi Y Q. An efficient JPEG steganographic scheme using uniform embedding[C]//IEEE International Workshop on Information Forensics and Security, Tenerife, 2012:169-174.
[13] Guo L J, Ni J, Su W, et al. Using statistical image model for JPEG steganography:uniform embedding revisited[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(12):2669-2680.
[14] 潘琳, 钱振兴, 张新鹏. 基于构造纹理图像的数字隐写[J]. 应用科学学报, 2016, 34(5):625-632. Pan L, Qian Z X, Zhang X P. Steganography by constructing texture images[J]. Journal of Applied Sciences, 2016, 34(5):625-632. (in Chinese)
[15] Oosterwijk J J, Skoric B, Doumen J. Optimal suspicion functions for Tardos traitor tracing schemes[C]//ACM Workshop on Information Hiding & Multimedia Security. ACM, 2013:19.
文章导航

/