浏览全部资源
扫码关注微信
1. 中国人民解放军信息工程大学,河南 郑州 450001
2. 吉林省四平军分区,吉林 四平 136000
[ "汤光明(1963-),女,湖南衡阳人,中国人民解放军信息工程大学教授、博士生导师,主要研究方向为信息安全、信息隐藏。\t" ]
[ "孙艺(1992-),女,吉林四平人,中国人民解放军信息工程大学硕士生,主要研究方向为信息隐藏。" ]
[ "徐潇雨(1993-),男,江苏连云港人,中国人民解放军信息工程大学硕士生,主要研究方向为深度学习。" ]
[ "王宇(1984-),男,吉林辽源人,吉林省四平军分区战备建设处参谋,主要研究方向为信息安全。" ]
网络出版日期:2017-09,
纸质出版日期:2017-09-25
移动端阅览
汤光明, 孙艺, 徐潇雨, 等. 动态更新失真代价的自适应JPEG隐写算法[J]. 通信学报, 2017,38(9):1-8.
Guang-ming TANG, Yi SUN, Xiao-yu XU, et al. Adaptive JPEG steganography based on distortion cost updating[J]. Journal on communications, 2017, 38(9): 1-8.
汤光明, 孙艺, 徐潇雨, 等. 动态更新失真代价的自适应JPEG隐写算法[J]. 通信学报, 2017,38(9):1-8. DOI: 10.11959/j.issn.1000-436x.2017177.
Guang-ming TANG, Yi SUN, Xiao-yu XU, et al. Adaptive JPEG steganography based on distortion cost updating[J]. Journal on communications, 2017, 38(9): 1-8. DOI: 10.11959/j.issn.1000-436x.2017177.
以往的自适应JPEG隐写算法大多只在秘密信息嵌入之前计算图像失真,无法在嵌入过程中动态地调节失真代价。考虑到信息嵌入时的交互影响,提出一种动态更新失真代价的自适应JPEG隐写算法。首先,分析量化步长、待嵌DCT(discrete cosine transform)系数绝对值以及扰动误差3种影响嵌入波动的因素。进而,提出失真代价更新策略EUS(embedding update strategy),使图像的失真代价能够动态地更新。最后,结合此策略设计并实现一种自适应JPEG隐写算法。实验表明该算法能够显著提高JPEG隐写的安全性。
Previous adaptive JPEG steganography algorithms mostly calculate image distortion before secret information embedding
so they can’t dynamically adjust distortion costs.Considering the mutual impacts during embedding
an adaptive JPEG steganography algorithm based on distortion cost updating was proposed.Firstly
three factors that affect embedding fluctuations were analyzed
including quantization step
the absolute value of the quantized DCT coefficient to be modified and perturbation error.Then the embedding update strategy (EUS) was proposed
which enabled to dynamically update the distortion costs.After that
an adaptive JPEG steganography algorithm was implemented combining the strategy.The experimental result illustrates that the algorithm can significantly improve the secure performance of JPEG steganography algorithm.
SEDIGHI V , COGRANNE R , FRIDRICH J . Content-adaptive steganography by minimizing statistical detectability [J ] . IEEE Transactions on Information Forensics and Security , 2016 , 11 ( 2 ): 221 - 234 .
FILLER T , FRIDRICH J . Design of adaptive steganographic schemes for digital images [C ] // IS&T/SPIE Electronic Imaging,International Society for Optics and Photonics . 2011 :78800F-78800F-14.
FRIDRICH J , GOLJAN M , SOUKAL D . Perturbed quantization steganography with wet paper codes [C ] // The 2004 Workshop on Multimedia and Security . 2004 : 4 - 15 .
KIM Y , DURIC Z , RICHARDS D . Modified matrix encoding technique for minimal distortion steganography [C ] // International Workshop on Information Hiding.Springer Berlin Heidelberg . 2006 : 314 - 327 .
FRIDRICH J , PEVNÝ T , KODOVSKÝ J , . Statistically undetectable jpeg steganography:dead ends challenges,and opportunities [C ] // The 9th Workshop on Multimedia & Security . 2007 : 3 - 14 .
FILLER T , JUDAS J , FRIDRICH J . Minimizing additive distortion in steganography using syndrome-trellis codes [J ] . IEEE Transactions on Information Forensics and Security , 2011 , 6 ( 3 ): 920 - 935 .
WANG C , NI J . An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients [C ] // 2012 IEEE International Conference on Acoustics,Speech and Signal Processing (ICASSP) . 2012 : 1785 - 1788 .
GUO L , NI J , SHI Y Q . Uniform embedding for efficient JPEG steganography [J ] . IEEE Transactions on Information Forensics and Security , 2014 , 9 ( 5 ): 814 - 825 .
GUO L , NI J , SU W , et al . Using statistical image model for JPEG steganography:uniform embedding revisited [J ] . IEEE Transactions on Information Forensics and Security , 2015 , 10 ( 12 ): 2669 - 2680 .
HUANG F , LUO W , HUANG J , et al . Distortion function designing for JPEG steganography with uncompressed side-image [C ] // The 1st ACM Workshop on Information Hiding And Multimedia Security . 2013 : 69 - 76 .
HOLUB V , FRIDRICH J . Digital image steganography using universal distortion [C ] // 1st ACM Workshop on Information Hiding and Multimedia Security . Montpellier,France , 2013 : 59 - 68 .
DENEMARK T , FRIDRICH J . Side-informed steganography with additive distortion [C ] // IEEE International Workshop on Information Forensics and Security (WIFS) , 2015 : 1 - 6 .
LI B , WANG M , LI X , et al . A strategy of clustering modification directions in spatial image steganography [J ] . IEEE Transactions on Information Forensics and Security , 2015 , 10 ( 9 ): 1905 - 1917 .
BAS P , FILLER T,PEVNÝ T PEVNÝ T . Break our steganographic system:the ins and outs of organizing BOSS [C ] // International Workshop on Information Hiding . 2011 : 59 - 70 .
KODOVSKÝ J FRIDRICH J . Steganalysis of JPEG images using rich models [C ] // IS&T/SPIE Electronic Imaging.International Society for Optics and Photonics . 2012 :83030A-83030A-13.
HOLUB V , FRIDRICH J . Low-complexity features for JPEG steganalysis using undecimated DCT [J ] . IEEE Transactions on Information Forensics and Security , 2015 , 10 ( 2 ): 219 - 228 .
SONG X , LIU F , YANG C , et al . Steganalysis of adaptive JPEG steganography using 2D Gabor filters [C ] // The 3rd ACM Workshop on Information Hiding and Multimedia Security . 2015 : 15 - 23 .
KODOVSKY J , FRIDRICH J , HOLUB V . Ensemble classifiers for steganalysis of digital media [J ] . IEEE Transactions on Information Forensics and Security , 2012 , 7 ( 2 ): 432 - 444 .
0
浏览量
1463
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构