This paper proposes a general method to distinguish the embedding cost for different polarity of embedding change for spatial images. Firstly, at the cost of distortion of pixel grayscale value, the original distortion function is improved. Then the improved distortion function is adjusted iteratively according to the modified pixels. The modification directions are gathered together after the original distortion function is optimized using the proposed method. Thus the stego images perform better undetectability. Experiment results show that the security performance of current popular steganographic methods is observably increased after incorporated the proposed method.
WANG Zi-chi, ZHANG Xin-peng, QIN Chuan
. Asymmetric Distortion Function for Spatial Adaptive Steganography[J]. Journal of Applied Sciences, 2018
, 36(5)
: 819
-825
.
DOI: 10.3969/j.issn.0255-8297.2018.05.009
[1] Li B, Tan S, Wang M, Huang J W. Investigation on cost assignment in spatial image steganography[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(8):1264-1277.
[2] Zhang X P. Behavior steganography in social network[C]//International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2016:21-23.
[3] Wang Z C, Zhang X P, Yin Z X. Hybrid distortion function for JPEG steganography[J]. Journal of Electronic Imaging, 2016, 25(5):050501.
[4] Zhang X P, Wang S Z. Efficient steganographic embedding by exploiting modification direction[J]. IEEE Communications Letters, 2006, 10(11):781-783
[5] Zhang X P, Zhang W M, Wang S Z. Efficient double-layered steganographic embedding[J]. Electronics Letters, 2007, 43(8):482-483.
[6] Zhang W M, Zhang X P, Wang S Z. Maximizing steganographic embedding efficiency by combining Hamming codes and wet paper codes[C]//International Workshop on Information Hiding, 2008:60-71.
[7] Fridrich J, Soukal D. Matrix embedding for large payloads[J]. IEEE Transactions on Information Forensics and Security, 2006, 1(3):390-395.
[8] Filler T, Judas J, Fridrich J. Minimizing additive distortion in steganography using syndrome-trellis codes[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3):920-935.
[9] Pevny T, Filler T, Bas P. Using high-dimensional image models to perform highly undetectable steganography[C]//International Workshop on Information Hiding, 2010:161-177.
[10] Holub V, Fridrich J. Designing steganographic distortion using directional filters[C]//IEEE International Workshop on Information Forensics and Security. IEEE, 2012:234-239.
[11] Holub V, Fridrich J. Digital image steganography using universal distortion[C]//Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security. ACM, 2013:59-68.
[12] Li B, Wang M, Huang J, Li X. A new cost function for spatial image steganography[C]//IEEE International Conference on Image Processing. IEEE, 2014:4206-4210.
[13] Sedighi V, Fridrich J, Cogranne R. Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model[C]//Media Watermarking, Security, and Forensics 2015. International Society for Optics and Photonics, 2015, 9409:94090H.
[14] Wang Z, Lü J, Wei Q, Zhang X P. Distortion function for spatial image steganography based on the polarity of embedding change[C]//International Workshop on Digital Watermarking, 2016:487-493.
[15] Wei Y, Zhang W M, Li W, Yu N H. Which gray level should be given the smallest cost for adaptive steganography?[J]. Multimedia Tools and Applications, 2017:1-14.
[16] Bas P, Filler T, Pevny T. "Break our steganographic system":the ins and outs of organizing BOSS[C]//International Workshop on Information Hiding, 2011:59-70.
[17] Pevny T, Bas P, Fridrich J. Steganalysis by subtractive pixel adjacency matrix[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(2):215-224.
[18] Fridrich J, KodovskY J. Rich models for steganalysis of digital images[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(3):868-882.
[19] Kodovsky J, Fridrich J, Holub V. Ensemble classifiers for steganalysis of digital media[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2):432-444.
[20] Filler T, Fridrich J. Gibbs construction in steganography[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(4):705-720.
[21] Li B, Wang M, Li X, Tan S Q, Huang J W. A strategy of clustering modification directions in spatial image steganography[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(9):1905-1917.
[22] Denemark T, Fridrich J. Improving steganographic security by synchronizing the selection channel[C]//Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security. ACM, 2015:5-14.