多媒体信息安全专刊

混合蛙跳优化决策面的LSB±k隐写算法

展开
  • 1. 井冈山大学电子与信息工程学院, 江西吉安 343009;
    2. 井冈山大学流域生态与地理环境监测国家测绘地理信息局重点实验室, 江西吉安 343009
欧阳春娟,副教授,博士,研究方向:信息隐藏及智能优化,E-mail:oycj001@163.com

收稿日期: 2015-04-18

  修回日期: 2015-08-06

  网络出版日期: 2015-11-30

基金资助

国家自然科学基金(No.61462046, No.61163062);江西省教育厅科学技术研究项目基金(No.GJJ14559,No.GJJ13553);江西省科技厅自然科学项目基金(No.20151BAB207026, No.20151BAB217012)资助

Improved LSB±k Steganography Based on Decision Surface Optimized by SFLA

Expand
  • 1. College of Electronics and Information Engineering, Jinggangshan University, Ji'an 343009, Jiangxi Province, China;
    2. Key Laboratory of Watershed Ecology and Geographical Environment Monitoring of NASG, Jinggangshan University Ji'an 343009, Jiangxi Province, China

Received date: 2015-04-18

  Revised date: 2015-08-06

  Online published: 2015-11-30

摘要

针对现有智能优化改进隐写不能对高维特征同时进行优化的问题,提出了一种混合蛙跳优化决策面的改进LSB±k隐写算法(记为SFLA-LSB±k).不同于其他优化改进隐写中尽可能减少图像载密前后某种特征变化的策略,在SFLA-LSB±k中,通过优化载密图像的特征变化,使载密图像特征变化方向随机化,导致分类器无法训练出一个能对载体与载密图像进行分类的决策面,从而达到抵抗分析的目的.实验结果表明,与标准的LSB±k隐写和相关PSO优化改进LSB±k隐写相比,SFLA-LSB±k有效提高了LSB±k的安全性,特别是当k取1时,该算法针对78维特征隐写分析的AUC值可下降到0.5637.

本文引用格式

欧阳春娟, 刘昌鑫, 刘欢 . 混合蛙跳优化决策面的LSB±k隐写算法[J]. 应用科学学报, 2015 , 33(6) : 663 -670 . DOI: 10.3969/j.issn.0255-8297.2015.06.010

Abstract

Most improved steganographies based on intelligent optimization cannot realize high-dimensional features optimization simultaneously. To solve the problem, this paper proposes an improved LSB±k steganography (denoted SFLA-LSB±k) based on SFLA to achieve an optimal decision surface. Different from the other improved steganographies that attempt to keep image features unchanged after data embedding as much as possible, the proposed method tries to randomly change feature directions of stego-image in the embedding process optimized by SFLA. Thus, it is difficult to find a decision surface to distinguish cover images from stego-images. Simulation indicates that, with the same embedding capacity, SFLA-LSB±k demonstrates better performance in resisting steganalysis than the traditional LSB±k and the improved LSB±k optimized by PSO. Especially, the AUC value is reduced to 0.5637 when k=1 against steganalysis with 78-dimension features.

参考文献

[1] 王朔中,张新鹏,张卫明.以数字图像为载体的隐写分析研究进展[J].计算机学报, 2009, 32(7):1247-1263. Wang S Z, Zhang X P, Zhang W M. Recent advances in image-based steganalysis research[J]. Chinese Journal of Computers, 2009, 32(7):1247-1263. (in Chinese)

[2] Filler T, Judas J, Fridrich J. Minimizing additive distortion in steganography using syndrome-trellis codes[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3):920-935.

[3] Fridrich J, Kodivsky J, Holub V. Rich models for steganalysis of digital images[J]. IEEE Transactions on Information and Security, 2012, 7(3):868-882.

[4] Sharp T. An implementation of key-based digital signal steganography[C]//the 4th International Workshop on Information Hiding. Pittsburgh, 2001, 2137:13-26.

[5] Li X X, Wang J J. A steganographic method based upon JPEG and particle swarm optimization algorithm[J]. Information Sciences, 2007, 177(15):3099-3109.

[6] Liu G J, Zhang Z. Improved LSB-matching steganography for preserving second-order statistics[J]. Journal of Multimedia, 2010, 5(5):458-463.

[7] Guo Y Q, Kong X W, You X G. Secure steganography based on binary particle swarm optimization[J]. Journal of Electronics, 2009, 26(2):285-288.

[8] 于丽芳,赵耀,倪蓉蓉.基于粒子群算法和改进PM1的JPEG图像中的安全密写方法[J].南京邮电大学学报:自然科学版, 2009, 29(3):49-53. Yu L F, Zhao Y, Ni R R. Secure steganography in JPEG images based on PSO and improved PM1[J]. Journal of Nanjing University of Posts and Telecommunications:Natural Science, 2009, 29(3):49-53. (in Chinese)

[9] Ghasemi E, Shanbehzadeh J, Jamshid F. High capacity image steganography based on genetic algorithm and wavelet transform[J]. Intelligent Control and Innovative Computing, 2012, 110:395-404.

[10] Eusuff M M, Lansey K E. Optimization of water distribution network design using the shuffled frog leaping algorithm[J]. Journal of Water Sources Planning and Management, 2003, 129(3):210-225.

[11] United States Department of Agriculture. Natural resources conservation service photo gallery, http://photogallery.nrcs.usda.gov, 2002.

[12] Ker A D. Steganalysis of LSB matching in grayscale images[J]. IEEE Signal Processing Letters, 2005, 12(6):441-444.

[13] Xuan G R, Shi Y Q. Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions[J]. Comuter Science, 2005, 3727:262-265.

[14] Penvy T, Bas P, Fridrich J. Steganalysis by subtractive pixel adjacency matrix[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(2):215-224.
文章导航

/