Guang-ming TANG, Yi SUN, Xiao-yu XU, et al. Adaptive JPEG steganography based on distortion cost updating[J]. Journal on Communications, 2017, 38(9): 1-8.
DOI:
Guang-ming TANG, Yi SUN, Xiao-yu XU, et al. Adaptive JPEG steganography based on distortion cost updating[J]. Journal on Communications, 2017, 38(9): 1-8. DOI: 10.11959/j.issn.1000-436x.2017177.
Adaptive JPEG steganography based on distortion cost updating
Previous adaptive JPEG steganography algorithms mostly calculate image distortion before secret information embedding
so they can’t dynamically adjust distortion costs.Considering the mutual impacts during embedding
an adaptive JPEG steganography algorithm based on distortion cost updating was proposed.Firstly
three factors that affect embedding fluctuations were analyzed
including quantization step
the absolute value of the quantized DCT coefficient to be modified and perturbation error.Then the embedding update strategy (EUS) was proposed
which enabled to dynamically update the distortion costs.After that
an adaptive JPEG steganography algorithm was implemented combining the strategy.The experimental result illustrates that the algorithm can significantly improve the secure performance of JPEG steganography algorithm.
关键词
Keywords
references
SEDIGHI V , COGRANNE R , FRIDRICH J . Content-adaptive steganography by minimizing statistical detectability [J ] . IEEE Transactions on Information Forensics and Security , 2016 , 11 ( 2 ): 221 - 234 .
FILLER T , FRIDRICH J . Design of adaptive steganographic schemes for digital images [C ] // IS&T/SPIE Electronic Imaging,International Society for Optics and Photonics . 2011 :78800F-78800F-14.
FRIDRICH J , GOLJAN M , SOUKAL D . Perturbed quantization steganography with wet paper codes [C ] // The 2004 Workshop on Multimedia and Security . 2004 : 4 - 15 .
KIM Y , DURIC Z , RICHARDS D . Modified matrix encoding technique for minimal distortion steganography [C ] // International Workshop on Information Hiding.Springer Berlin Heidelberg . 2006 : 314 - 327 .
FILLER T , JUDAS J , FRIDRICH J . Minimizing additive distortion in steganography using syndrome-trellis codes [J ] . IEEE Transactions on Information Forensics and Security , 2011 , 6 ( 3 ): 920 - 935 .
WANG C , NI J . An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients [C ] // 2012 IEEE International Conference on Acoustics,Speech and Signal Processing (ICASSP) . 2012 : 1785 - 1788 .
GUO L , NI J , SHI Y Q . Uniform embedding for efficient JPEG steganography [J ] . IEEE Transactions on Information Forensics and Security , 2014 , 9 ( 5 ): 814 - 825 .
GUO L , NI J , SU W , et al . Using statistical image model for JPEG steganography:uniform embedding revisited [J ] . IEEE Transactions on Information Forensics and Security , 2015 , 10 ( 12 ): 2669 - 2680 .
HUANG F , LUO W , HUANG J , et al . Distortion function designing for JPEG steganography with uncompressed side-image [C ] // The 1st ACM Workshop on Information Hiding And Multimedia Security . 2013 : 69 - 76 .
HOLUB V , FRIDRICH J . Digital image steganography using universal distortion [C ] // 1st ACM Workshop on Information Hiding and Multimedia Security . Montpellier,France , 2013 : 59 - 68 .
DENEMARK T , FRIDRICH J . Side-informed steganography with additive distortion [C ] // IEEE International Workshop on Information Forensics and Security (WIFS) , 2015 : 1 - 6 .
LI B , WANG M , LI X , et al . A strategy of clustering modification directions in spatial image steganography [J ] . IEEE Transactions on Information Forensics and Security , 2015 , 10 ( 9 ): 1905 - 1917 .
BAS P , FILLER T,PEVNÝ T PEVNÝ T . Break our steganographic system:the ins and outs of organizing BOSS [C ] // International Workshop on Information Hiding . 2011 : 59 - 70 .
KODOVSKÝ J FRIDRICH J . Steganalysis of JPEG images using rich models [C ] // IS&T/SPIE Electronic Imaging.International Society for Optics and Photonics . 2012 :83030A-83030A-13.
HOLUB V , FRIDRICH J . Low-complexity features for JPEG steganalysis using undecimated DCT [J ] . IEEE Transactions on Information Forensics and Security , 2015 , 10 ( 2 ): 219 - 228 .
SONG X , LIU F , YANG C , et al . Steganalysis of adaptive JPEG steganography using 2D Gabor filters [C ] // The 3rd ACM Workshop on Information Hiding and Multimedia Security . 2015 : 15 - 23 .
KODOVSKY J , FRIDRICH J , HOLUB V . Ensemble classifiers for steganalysis of digital media [J ] . IEEE Transactions on Information Forensics and Security , 2012 , 7 ( 2 ): 432 - 444 .