Steganography based on parameters’ disturbance of spatial image transform
Correspondences|更新时间:2024-06-05
|
Steganography based on parameters’ disturbance of spatial image transform
Journal on CommunicationsVol. 38, Issue 10, Pages: 166-174(2017)
作者机构:
1. 中国科学技术大学信息科学技术学院,安徽 合肥 230001
2. 中国科学院电磁空间信息重点实验室,安徽 合肥 230001
作者简介:
基金信息:
The National Natural Science Foundation of China(U1636201);The National Natural Science Foundation of China(61572452);The National Natural Science Foundation of China(61502007);The China Postdoctoral Science Foundation(2015M582015)
Xi SUN, Wei-ming ZHANG, Neng-hai YU, et al. Steganography based on parameters’ disturbance of spatial image transform[J]. Journal on Communications, 2017, 38(10): 166-174.
DOI:
Xi SUN, Wei-ming ZHANG, Neng-hai YU, et al. Steganography based on parameters’ disturbance of spatial image transform[J]. Journal on Communications, 2017, 38(10): 166-174. DOI: 10.11959/j.issn.1000-436x.2017155.
Steganography based on parameters’ disturbance of spatial image transform
In the research of state-of-the-art steganography algorithms
most of image sources were natural images in laboratory environment.However
with the rapid development of image process tools and applications
images after image processing were widely used in real world.How to use image process to improve steganography has not been systematically studied.Taking spatial image transform for consideration
a parameters’ disturbance model was presented
which could hide the noise taken by steganography in the pixel fluctuation due to the disturbance.Meanwhile
it would introduce cover source mismatch for a steganalyzer.The experimental results show that
compared with using traditional image database
it can significantly enhance the security of steganography algorithms and accommodative to the real world situation.
关键词
Keywords
references
FRIDRICH J . Steganography in digital media:principles,algorithms,and applications [M ] // Steganography in Digital Media : Principles,Algorithms,and applications.Cambridge University Press , 2010 : 1 - 20 .
CRANDALL R . Some notes on steganography [J ] . Posted on SteganoGraphy Mailing List , 1998 .
PEVNÝ T , BAS P , FRIDRICH J . Steganalysis by subtractive pixel adjacency matrix [J ] . IEEE Transactions on Information Forensics and Security , 2010 , 5 ( 2 ): 215 - 224 .
FRIDRICH J , KODOVSKÝ J . Rich models for steganalysis of digital images [J ] . IEEE Transactions on Information Forensics and Security , 2012 , 7 ( 3 ): 868 - 882 .
SHI Y Q , SUTTHIWAN P , CHEN L . Textural features for steganalysis [C ] // Information Hiding . 2012 : 63 - 77 .
FILLER T , JUDAS J , FRIDRICH J . Minimizing additive distortion in steganography using syndrome-trellis codes [J ] . IEEE Transactions on Information Forensics and Security , 2011 , 6 ( 3 ): 920 - 935 .
PEVNÝ T , FILLER T , BAS P . Using high-dimensional image models to perform highly undetectable steganography [C ] // Information Hiding.Springer Berlin Heidelberg . 2010 : 161 - 177 .
HOLUB V , FRIDRICH J . Designing steganographic distortion using directional filters [C ] // IEEE International Workshop on Information . 2013 : 234 - 239 .
HOLUB V , FRIDRICH J . Digital image steganography using universal distortion [C ] // The First ACM Workshop on Information Hiding and Multimedia Security . 2013 : 59 - 68 .
LI B , WANG M , LI X , et al . A strategy of clustering modification directions in spatial image steganography [J ] . IEEE Transactions on Information Forensics and Security , 2015 , 10 ( 9 ): 1905 - 1917 .
DENEMARK T , FRIDRICH J . Improving steganographic security by synchronizing the selection channel [C ] // The 3rd ACM Workshop on Information Hiding and Multimedia Security . 2015 : 5 - 14 .
GUO L , NI J , SHI Y Q . Uniform embedding for efficient JPEG steganography [J ] . IEEE Transactions on Information Forensics and Security , 2014 , 9 ( 5 ): 814 - 825 .
BAS P , FILLER T , v T . Break our steganographic system:the Ins and outs of organizing BOSS [M ] // Information Hiding . 2011 : 59 - 70 .
FRIDRICH J . Study of cover source mismatch in steganalysis and ways to mitigate its impact [J ] . SPIE-International Society for Optical Engineering , 2014 , 9028 ( 2 ): 96 - 101 .
SEDIGHI V , COGRANNE R , FRIDRICH J . Content-adaptive steganography by minimizing statistical detectability [J ] . IEEE Transactions on Information Forensics and Security , 2016 , 11 ( 2 ): 221 - 234 .
FRIDRICH J , KODOVSKY J . Rich models for steganalysis of digital images [J ] . IEEE Transactions on Information Forensics & Security , 2012 , 7 ( 3 ): 868 - 882 .
KODOVSKY J , FRIDRICH J , HOLUB V . Ensemble classifiers for steganalysis of digital media [J ] . IEEE Transactions on Information Forensics & Security , 2012 , 7 ( 2 ): 432 - 444 .
SEDIGHI V , FRIDRICH J , COGRANNE R . Toss that BOSSbase,Alice! [J ] . Electronic Imaging , 2016 .
PEVNÝ T KER A D . Towards dependable steganalysis [J ] . SPIE-International Society for Optical Engineering , 2015 ,9409:94090I-94090I-14