一種動態(tài)更新失真代價的自適應k隱寫算法
doi: 10.11999/JEIT160254 cstr: 32379.14.JEIT160254
基金項目:
國家自然科學基金(61303074),信息保障技術(shù)重點實驗室開放基金(KJ-14106)
Adaptive k Steganography Based on Dynamic Updating Distortion Cost
Funds:
The National Natural Science Foundation of China (61303074), The Foundation of Science and Technology on Information Assurance Laboratory (KJ-14106)
-
摘要: 基于失真函數(shù)的自適應隱寫技術(shù)在嵌入過程中,忽略了嵌入操作相互間的影響,隱寫策略無法隨載體統(tǒng)計特性的改變自適應地調(diào)節(jié)??紤]嵌入操作的交互影響,該文提出一種基于動態(tài)更新失真代價的k隱寫算法。首先分析了中心像素與其鄰域的相關(guān)性,理論證明了在4-鄰域修改情況下中心像素的最優(yōu)修改方式,進而提出了失真代價更新策略MDS(Modification Degree Strategy);并結(jié)合該策略設計實現(xiàn)了一種自適應k隱寫算法。實驗表明,五元修改方式下算法UNIWARD-MDS(Pentary Version)在高嵌入率下(0.5~1.0 bpp)的抗SRM檢測性優(yōu)于S-UNIWARD(Pentary Version),同時在抵抗maxSRMd2檢測時不同嵌入率下均優(yōu)于S-UNIWARD(Pentary Version);三元修改方式下算法HILL-MDS和UNIWARD-MDS(Ternary Version)抗檢測性能優(yōu)于對應的自適應隱寫算法HILL和S-UNIWARD(Ternary Version)。
-
關(guān)鍵詞:
- 信息安全 /
- 隱寫 /
- 自適應隱寫 /
- 動態(tài)更新失真代價
Abstract: Adaptive steganography ignores the interactive impact introduced by the embedding operation during the embedding operation. Considering the cross impact of the embedding operation, an adaptive k steganography is put forward based on the dynamic distortion cost updating strategy Modification Degree Strategy (MDS). First, the analysis is conducted to prove the optimizing modification of the central pixel under the condition of the neighborhoods modifications. Then the MDS of updating the distortion cost is presented to adjust the distortion cost according to the modification of neighborhood. Finally, the steganography scheme is proposed using the MDS. The experimental result illustrates that the UNIWARD-MDS (Pentary Version) has a better performance than S-UNIWARD (Pentary Version) at the embedding rate 0.5~1.0 bpp when resisting the steganalysis SRM. Meanwhile the UNIWARD-MDS (Pentary Version) is better than the S-UNIWARD (Pentary Version) at the embedding rate 0.05~1.0 bpp when resisting the maxSRMd2 detection. The HILL-MDS and UNIWARD-MDS (Ternary Version) perform better than the corresponding schemes HILL and S-UNIWARD (Ternary Version). -
韓濤, 祝躍飛. 基于 Canny 邊緣檢測的自適應空域隱寫術(shù)[J]. 電子與信息學報, 2015, 37(5): 1266-1270. doi: 10.11999/ JEIT141121. HAN Tao and ZHU Yuefei. Adaptive spatial steganography based on Cannys edge detection[J]. Journal of Electronics Information Technology, 2015, 37(5): 1266-1270. doi: 10. 11999/JEIT141121. FILLER T, JUDAS J, and FRIDRICH J. Minimizing additive distortion in steganography using syndrome-trellis codes[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 920-935. doi: 10.1109/TIFS.2011. 2134094. GUL G and KURUGOLLU F. A new methodology in steganalysis: Breaking highly undetectable steganograpy (HUGO)[J]. LNCS, 2011, 6958: 71-84. PENVY T, BAS P, and FRIDRICH J. Steganalysis by subtractive pixel adjacency matrix[C]. Proceedings of the 11th ACM Multimedia and Security Workshop, Princeton, NJ, USA, September 2009: 75-84. HOLUB V and FRIDRICH J. Designing steganographic distortion using directional filters[C]. Proceedings of the IEEE Workshop on Information Forensic and Security, Tenerife, Spain, 2012: 234-239. HOLUB V and FRIDRICH J. Digital image steganography using universal distortion[C]. Proceedings of 1st ACM Workshop on Information Hiding and Multimedia Security, Montpellier, France, 2013: 59-68. LI Bin, WANG Ming, HUANG Jiwu, et al. A new cost function for spatial image steganography[C]. Proceedings of the IEEE International Conference on Image Processing, Pairs, France, 2014: 4206-4210. LI Bin, TAN Shunquan, WANG Ming, et al. Investigation on cost assignment in spatial image steganography[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(8): 1264-1277. doi: 10.1109/TIFS.2014.2326954. FILLER T and FRIDRICH J. Gibbs construction in steganography[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(4): 705-720. doi: 10.1109/ TIFS.2010.2077629. TOMAS Denmark and FRIDRICH J. Improving steganographic security by synchronizing the selection channel[C]. Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, Portland, Oregon, USA, 2015: 5-14. doi: 10.1145/2756601.2756620. LI Bin, WANG Ming, TAN Shunquan, et al. A strategy of clustering modification directions in spatial image steganography[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(9): 1905-1917. doi: 10.1109/ TIFS.2434600. BAS P and PENVY T. Break our steganographic system-the ins and outs of organizing BOSS[J]. LNCS, 2011, 6598: 59-70. KODOVSKY J, FRIDRICH J, and HOLUB V. Ensemble classifiers for steganalysis of digital media[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 432-444. doi: 10.1109/TIFS.2011.2175919. FRIDRICH J and KODOVSKY J. Rich models for steganalysis of digital images[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(3): 868-882. doi: 10.1109/TIFS.2012.2190402. FRIDRICH J. Content-adaptive pentary steganography using the multivariate generalized gaussian cover model[C]. Proceeding of SPIE-The International Society for Optical Engineering, San Francisco, CA, USA, 2015, 9409: 94090H- 94090H-13. TOMAS Denmark, SEDIGHI V, HOLUB V, et al. Selection-channel-aware rich model for steganalysis of digital images[C]. IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, CA, USA, 2014: 48-53. -
計量
- 文章訪問數(shù): 1543
- HTML全文瀏覽量: 127
- PDF下載量: 370
- 被引次數(shù): 0