In order to further improve the security of adaptive steganography algorithms, this article introduces the idea of image blocking, rewrites the distortion function of the original J-UNIWARD algorithm, and changes additive distortion functions to non-additive distortion functions. The implementation process of the algorithm is as follows: The carrier image to be processed is divided into four sub-blocks, and the texture complexity of each sub-block is calculated separately, under the constraint of keeping total embedding amount unchanged. The more complex blocks are preferentially chosen to be embedded. By recalculating the distortion function after each block-embedding, the embedding amount is dynamically adjusted according to the complexity. Then the secret information is adaptively embed into the texture area by STC (syndrome trelliscodes) encoding. Finally, detection performance is analyzed by using DCTR and ccJRM steganalysis techniques. Experimental results show that under the same capacity, the proposed algorithm can significantly improve the anti-stealth analysis ability of the algorithm.
WU Qian, WU Jianbin, LIU Zixuan, SONG Mengli
. Improved Steganography Algorithm Based on J-UNIWARD[J]. Journal of Applied Sciences, 2021
, 39(2)
: 293
-301
.
DOI: 10.3969/j.issn.0255-8297.2021.02.011
[1] Zhang Q, Liu Y, Nan Y, et al. Classification algorithm of JSteg and F5 Stego-images based on histogram difference[J]. Energy Procedia, 2011, 13:8759-8766.
[2] Westfeld A. F5-a steganographic algorithm[C]//International Workshop on Information Hiding. Springer, Berlin, Heidelberg, 2001.
[3] Huang J W, Shi Y Q. Embedding gray level images[C]//ISCAS 2001. The 2001 IEEE International Symposium on Circuits and Systems. IEEE, 2001.
[4] Fridrich J. Statistically undetectable JPEG steganography:dead ends challenges, and opportunities[C]//Workshop on Multimedia & Security. DBLP, 2007.
[5] Sachnev V, Kim H J. An improved matrix encoding scheme for JPEG steganography[C]//International Conference on Digital-forensics & Watermarking. Springer, Berlin, Heidelberg, 2011.
[6] Fridrich J, Goljan M, Lisonek P. Writing on wet paper[J]. IEEE Transactions on Signal Processing, 2005, 53(10):3932-3935.
[7] Filler, T, Judas, J, Fridrich J. Minimizing additive distortion in steganography using syndrome-trellis codes[J]. IEEE Transactions on Information Forensics & Security, 2011, 6(3):920-935.
[8] Fridrich J, Kodovský J. Multivariate gaussian model for designing additive distortion for steganography[C]//IEEE International Conference on Acoustics. IEEE, 2013.
[9] Fridrich J J, Goljan M, Soukal D. Perturbed quantization steganography with wet paper codes[C]//Proceedings of the 6th workshop on Multimedia & Security. Magdeburg, Germany, 2004.
[10] Huang F J, Huang J W, Shi Y Q. New channel selection rule for JPEG steganography[J]. IEEE Transactions on Information Forensics & Security, 2012, 7(4):1181-1191.
[11] Guo L J, Ni J Q, Shi Y Q. Uniform embedding for efficient JPEG steganography[J]. IEEE Transactions on Information Forensics & Security, 2014, 9(5):814-825.
[12] Guo L J, Ni J Q, Shi Y Q. An efficient JPEG steganographic scheme using uniform embedding[C]//IEEE International Workshop on Information Forensics and Security, Tenerife, 2012:169-174.
[13] Guo L J, Ni J, Su W, et al. Using statistical image model for JPEG steganography:uniform embedding revisited[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(12):2669-2680.
[14] 潘琳, 钱振兴, 张新鹏. 基于构造纹理图像的数字隐写[J]. 应用科学学报, 2016, 34(5):625-632. Pan L, Qian Z X, Zhang X P. Steganography by constructing texture images[J]. Journal of Applied Sciences, 2016, 34(5):625-632. (in Chinese)
[15] Oosterwijk J J, Skoric B, Doumen J. Optimal suspicion functions for Tardos traitor tracing schemes[C]//ACM Workshop on Information Hiding & Multimedia Security. ACM, 2013:19.