信号与信息处理

非对称失真的空域自适应隐写

展开
  • 1. 上海大学 通信与信息工程学院, 上海 200444;
    2. 上海理工大学 光电信息与计算机工程学院, 上海 200093
王子驰,博士生,研究方向:隐写、隐写分析、可逆信息隐藏,E-mail:wangzichi@shu.edu.cn

收稿日期: 2017-09-17

  修回日期: 2017-11-23

  网络出版日期: 2018-09-30

基金资助

国家自然科学基金(No.U1636206,No.61525203,No.61502009,No.61472235);上海市曙光学者计划(No.14SG36);上海市优秀学术带头人计划(No.16XD1401200)资助

Asymmetric Distortion Function for Spatial Adaptive Steganography

Expand
  • 1. School of Communication and Information Engineering, Shanghai University, Shanghai 200444, China;
    2. School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai 200093, China

Received date: 2017-09-17

  Revised date: 2017-11-23

  Online published: 2018-09-30

摘要

提出一种用于空域自适应隐写的区分加减——失真代价的通用方法,首先利用像素灰度值本身的失真代价值优化原始失真代价函数.然后通过迭代,多次根据修改情况进一步调整失真代价.经过调整的失真代价能最大程度地聚集修改方向,使含密图像具有更好的抗检测性.实验表明,优化后的失真代价函数能显著提高空域自适应隐写方法的安全性.

本文引用格式

王子驰, 张新鹏, 秦川 . 非对称失真的空域自适应隐写[J]. 应用科学学报, 2018 , 36(5) : 819 -825 . DOI: 10.3969/j.issn.0255-8297.2018.05.009

Abstract

This paper proposes a general method to distinguish the embedding cost for different polarity of embedding change for spatial images. Firstly, at the cost of distortion of pixel grayscale value, the original distortion function is improved. Then the improved distortion function is adjusted iteratively according to the modified pixels. The modification directions are gathered together after the original distortion function is optimized using the proposed method. Thus the stego images perform better undetectability. Experiment results show that the security performance of current popular steganographic methods is observably increased after incorporated the proposed method.

参考文献

[1] Li B, Tan S, Wang M, Huang J W. Investigation on cost assignment in spatial image steganography[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(8):1264-1277.
[2] Zhang X P. Behavior steganography in social network[C]//International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2016:21-23.
[3] Wang Z C, Zhang X P, Yin Z X. Hybrid distortion function for JPEG steganography[J]. Journal of Electronic Imaging, 2016, 25(5):050501.
[4] Zhang X P, Wang S Z. Efficient steganographic embedding by exploiting modification direction[J]. IEEE Communications Letters, 2006, 10(11):781-783
[5] Zhang X P, Zhang W M, Wang S Z. Efficient double-layered steganographic embedding[J]. Electronics Letters, 2007, 43(8):482-483.
[6] Zhang W M, Zhang X P, Wang S Z. Maximizing steganographic embedding efficiency by combining Hamming codes and wet paper codes[C]//International Workshop on Information Hiding, 2008:60-71.
[7] Fridrich J, Soukal D. Matrix embedding for large payloads[J]. IEEE Transactions on Information Forensics and Security, 2006, 1(3):390-395.
[8] Filler T, Judas J, Fridrich J. Minimizing additive distortion in steganography using syndrome-trellis codes[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3):920-935.
[9] Pevny T, Filler T, Bas P. Using high-dimensional image models to perform highly undetectable steganography[C]//International Workshop on Information Hiding, 2010:161-177.
[10] Holub V, Fridrich J. Designing steganographic distortion using directional filters[C]//IEEE International Workshop on Information Forensics and Security. IEEE, 2012:234-239.
[11] Holub V, Fridrich J. Digital image steganography using universal distortion[C]//Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security. ACM, 2013:59-68.
[12] Li B, Wang M, Huang J, Li X. A new cost function for spatial image steganography[C]//IEEE International Conference on Image Processing. IEEE, 2014:4206-4210.
[13] Sedighi V, Fridrich J, Cogranne R. Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model[C]//Media Watermarking, Security, and Forensics 2015. International Society for Optics and Photonics, 2015, 9409:94090H.
[14] Wang Z, Lü J, Wei Q, Zhang X P. Distortion function for spatial image steganography based on the polarity of embedding change[C]//International Workshop on Digital Watermarking, 2016:487-493.
[15] Wei Y, Zhang W M, Li W, Yu N H. Which gray level should be given the smallest cost for adaptive steganography?[J]. Multimedia Tools and Applications, 2017:1-14.
[16] Bas P, Filler T, Pevny T. "Break our steganographic system":the ins and outs of organizing BOSS[C]//International Workshop on Information Hiding, 2011:59-70.
[17] Pevny T, Bas P, Fridrich J. Steganalysis by subtractive pixel adjacency matrix[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(2):215-224.
[18] Fridrich J, KodovskY J. Rich models for steganalysis of digital images[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(3):868-882.
[19] Kodovsky J, Fridrich J, Holub V. Ensemble classifiers for steganalysis of digital media[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2):432-444.
[20] Filler T, Fridrich J. Gibbs construction in steganography[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(4):705-720.
[21] Li B, Wang M, Li X, Tan S Q, Huang J W. A strategy of clustering modification directions in spatial image steganography[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(9):1905-1917.
[22] Denemark T, Fridrich J. Improving steganographic security by synchronizing the selection channel[C]//Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security. ACM, 2015:5-14.
文章导航

/