Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2482513.2482514acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Digital image steganography using universal distortion

Published: 17 June 2013 Publication History

Abstract

Currently, the most secure practical steganographic schemes for empirical cover sources embed their payload while minimizing a distortion function designed to capture statistical detectability. Since there exists a general framework for this embedding paradigm with established payload-distortion bounds as well as near-optimal practical coding schemes, building an embedding scheme has been essentially reduced to the distortion design. This is not an easy task as relating distortion to statistical detectability is a hard and open problem. In this article, we propose an innovative idea to measure the embedding distortion in one fixed domain independently of the domain where the embedding changes (and coding) are carried out. The proposed universal distortion is additive and evaluates the cost of changing an image element (e.g., pixel or DCT coefficient) from directional residuals obtained using a Daubechies wavelet filter bank. The intuition is to limit the embedding changes only to those parts of the cover that are difficult to model in multiple directions while avoiding smooth regions and clean edges. The utility of the universal distortion is demonstrated by constructing steganographic schemes in the spatial, JPEG, and side-informed JPEG domains, and comparing their security to current state-of-the-art methods using classifiers trained with rich media models.

References

[1]
R. Böhme. Advanced Statistical Steganalysis. Springer-Verlag, Berlin Heidelberg, 2010.
[2]
T. Filler and J. Fridrich. Fisher information determines capacity of ε-secure steganography. In S. Katzenbeisser and A.-R. Sadeghi, editors, Information Hiding, 11th International Conference, volume 5806 of Lecture Notes in Computer Science, pages 31--47, Darmstadt, Germany, June 7-10, 2009. Springer-Verlag, New York.
[3]
T. Filler and J. Fridrich. Gibbs construction in steganography. IEEE Transactions on Information Forensics and Security, 5(4):705--720, 2010.
[4]
T. Filler and J. Fridrich. Design of adaptive steganographic schemes for digital images. In A. Alattar, N. D. Memon, E. J. Delp, and J. Dittmann, editors, Proceedings SPIE, Electronic Imaging, Media Watermarking, Security and Forensics of Multimedia XIII, volume 7880, pages OF 1--14, San Francisco, CA, January 23-26, 2011.
[5]
T. Filler, J. Judas, and J. Fridrich. Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Transactions on Information Forensics and Security, 6(3):920--935, September 2011.
[6]
T. Filler, A. D. Ker, and J. Fridrich. The Square Root Law of steganographic capacity for Markov covers. In N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, editors, Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XI, volume 7254, pages 08 1--11, San Jose, CA, January 18-21, 2009.
[7]
T. Filler, T. Pevný, and P. Bas. BOSS (Break Our Steganography System). http://www.agents.cz/boss, July 2010.
[8]
J. Fridrich. Effect of cover quantization on steganographic fisher information. IEEE Transactions on Information Forensics and Security, 2013. To appear.
[9]
J. Fridrich and R. Du. Secure steganographic methods for palette images. In A. Pfitzmann, editor, Information Hiding, 3rd International Workshop, volume 1768 of Lecture Notes in Computer Science, pages 47--60, Dresden, Germany, September 29-October 1, 1999. Springer-Verlag, New York.
[10]
J. Fridrich, M. Goljan, D. Soukal, and P. Lisonek. Writing on wet paper. In T. Kalker and P. Moulin, editors, IEEE Transactions on Signal Processing, Special Issue on Media Security, volume 53, pages 3923--3935, October 2005. (journal version).
[11]
J. Fridrich and J. Kodovský. Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security, 7(3):868--882, June 2011.
[12]
J. Fridrich, T. Pevný, and J. Kodovský. Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities. In J. Dittmann and J. Fridrich, editors, Proceedings of the 9th ACM Multimedia & Security Workshop, pages 3--14, Dallas, TX, September 20-21, 2007.
[13]
L. Guo, J. Ni, and Y.-Q. Shi. An efficient JPEG steganographic scheme using uniform embedding. In Fourth IEEE International Workshop on Information Forensics and Security, Tenerife, Spain, December 2-5, 2012.
[14]
V. Holub and J. Fridrich. Designing steganographic distortion using directional filters. In Fourth IEEE International Workshop on Information Forensics and Security, Tenerife, Spain, December 2-5, 2012.
[15]
F. Huang, J. Huang, and Y.-Q. Shi. New channel selection rule for JPEG steganography. IEEE Transactions on Information Forensics and Security, 7(4):1181--1191, August 2012.
[16]
A. D. Ker. A capacity result for batch steganography. IEEE Signal Processing Letters, 14(8):525--528, 2007.
[17]
A. D. Ker. A fusion of maximal likelihood and structural steganalysis. In T. Furon, F. Cayre, G. Doërr, and P. Bas, editors, Information Hiding, 9th International Workshop, volume 4567 of Lecture Notes in Computer Science, pages 204--219, Saint Malo, France, June 11-13, 2007. Springer-Verlag, Berlin.
[18]
A. D. Ker. The ultimate steganalysis benchmark? In J. Dittmann and J. Fridrich, editors, Proceedings of the 9th ACM Multimedia & Security Workshop, pages 141--148, Dallas, TX, September 20-21, 2007.
[19]
A. D. Ker. Estimating steganographic fisher information in real images. In S. Katzenbeisser and A.-R. Sadeghi, editors, Information Hiding, 11th International Conference, volume 5806 of Lecture Notes in Computer Science, pages 73--88, Darmstadt, Germany, June 7-10, 2009. Springer-Verlag, New York.
[20]
A. D. Ker. The square root law in stegosystems with imperfect information. In R. Böhme and R. Safavi-Naini, editors, Information Hiding, 12th International Conference, volume 6387 of Lecture Notes in Computer Science, pages 145--160, Calgary, Canada, June 28-30, 2010. Springer-Verlag, New York.
[21]
A. D. Ker, T. Pevný, J. Kodovský, and J. Fridrich. The Square Root Law of steganographic capacity. In A. D. Ker, J. Dittmann, and J. Fridrich, editors, Proceedings of the 10th ACM Multimedia & Security Workshop, pages 107--116, Oxford, UK, September 22-23, 2008.
[22]
Y. Kim, Z. Duric, and D. Richards. Modified matrix encoding technique for minimal distortion steganography. In J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, editors, Information Hiding, 8th International Workshop, volume 4437 of Lecture Notes in Computer Science, pages 314--327, Alexandria, VA, July 10-12, 2006. Springer-Verlag, New York.
[23]
J. Kodovský and J. Fridrich. Steganalysis of JPEG images using rich models. In A. Alattar, N. D. Memon, and E. J. Delp, editors, Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics of Multimedia XIV, volume 8303, pages 0A 1--13, San Francisco, CA, January 23-26, 2012.
[24]
J. Kodovský and J. Fridrich. Steganalysis in resized images. In Proc. of IEEE ICASSP, Vancouver, Canada, May 26-31, 2013. Under review.
[25]
J. Kodovský, J. Fridrich, and V. Holub. On dangers of overtraining steganography to incomplete cover model. In J. Dittmann, S. Craver, and C. Heitzenrater, editors, Proceedings of the 13th ACM Multimedia & Security Workshop, pages 69--76, Niagara Falls, NY, September 29-30, 2011.
[26]
J. Kodovský, J. Fridrich, and V. Holub. Ensemble classifiers for steganalysis of digital media. IEEE Transactions on Information Forensics and Security, 7(2):432--444, 2012.
[27]
T. Pevný, P. Bas, and J. Fridrich. Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on Information Forensics and Security, 5(2):215--224, June 2010.
[28]
T. Pevný, T. Filler, and P. Bas. Using high-dimensional image models to perform highly undetectable steganography. In R. Böhme and R. Safavi-Naini, editors, Information Hiding, 12th International Conference, volume 6387 of Lecture Notes in Computer Science, pages 161--177, Calgary, Canada, June 28-30, 2010. Springer-Verlag, New York.
[29]
V. Sachnev, H. J. Kim, and R. Zhang. Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding. In J. Dittmann, S. Craver, and J. Fridrich, editors, Proceedings of the 11th ACM Multimedia & Security Workshop, pages 131--140, Princeton, NJ, September 7-8, 2009.
[30]
C. E. Shannon. Coding theorems for a discrete source with a fidelity criterion. IRE Nat. Conv. Rec., 4:142--163, 1959.
[31]
C. Wang and J. Ni. An efficient JPEG steganographic scheme based on the block-entropy of DCT coefficents. In Proc. of IEEE ICASSP, Kyoto, Japan, March 25-30, 2012.
[32]
G. Winkler. Image Analysis, Random Fields and Markov Chain Monte Carlo Methods: A Mathematical Introduction (Stochastic Model ling and Applied Probability). Springer-Verlag, Berlin Heidelberg, 2nd edition, 2003.

Cited By

View all
  • (2024)Research on Key Technologies of Image Steganography Based on Simultaneous Deception of Vision and Deep Learning ModelsApplied Sciences10.3390/app14221045814:22(10458)Online publication date: 13-Nov-2024
  • (2024)Enhanced image steganalysis through reinforcement learning and generative adversarial networksIntelligent Decision Technologies10.3233/IDT-24007518:2(1077-1100)Online publication date: 7-Jun-2024
  • (2024)Blockchain Meets Generative Behavior Steganography: A Novel Covert Communication Framework for Secure IoT Edge ComputingChinese Journal of Electronics10.23919/cje.2023.00.38233:4(886-898)Online publication date: Jul-2024
  • Show More Cited By

Index Terms

  1. Digital image steganography using universal distortion

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    IH&MMSec '13: Proceedings of the first ACM workshop on Information hiding and multimedia security
    June 2013
    242 pages
    ISBN:9781450320818
    DOI:10.1145/2482513
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 17 June 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. JPEG
    2. distortion function
    3. side-informed embedding
    4. steganography

    Qualifiers

    • Research-article

    Conference

    IH&MMSec '13
    Sponsor:

    Acceptance Rates

    IH&MMSec '13 Paper Acceptance Rate 27 of 74 submissions, 36%;
    Overall Acceptance Rate 128 of 318 submissions, 40%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)47
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 10 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Research on Key Technologies of Image Steganography Based on Simultaneous Deception of Vision and Deep Learning ModelsApplied Sciences10.3390/app14221045814:22(10458)Online publication date: 13-Nov-2024
    • (2024)Enhanced image steganalysis through reinforcement learning and generative adversarial networksIntelligent Decision Technologies10.3233/IDT-24007518:2(1077-1100)Online publication date: 7-Jun-2024
    • (2024)Blockchain Meets Generative Behavior Steganography: A Novel Covert Communication Framework for Secure IoT Edge ComputingChinese Journal of Electronics10.23919/cje.2023.00.38233:4(886-898)Online publication date: Jul-2024
    • (2024)Lightweight Steganography Detection Method Based on Multiple Residual Structures and TransformerChinese Journal of Electronics10.23919/cje.2022.00.45233:4(965-978)Online publication date: Jul-2024
    • (2024)Image Steganography Approaches and Their Detection Strategies: A SurveyACM Computing Surveys10.1145/369496557:2(1-40)Online publication date: 10-Oct-2024
    • (2024)Cover-separable Fixed Neural Network Steganography via Deep Generative ModelsProceedings of the 32nd ACM International Conference on Multimedia10.1145/3664647.3680824(10238-10247)Online publication date: 28-Oct-2024
    • (2024)Constructing an Intrinsically Robust Steganalyzer via Learning Neighboring Feature Relationships and Self-Adversarial AdjustmentIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.347065119(9390-9405)Online publication date: 2024
    • (2024)From Cover to Immucover: Adversarial Steganography via Immunized Cover ConstructionIEEE Transactions on Fuzzy Systems10.1109/TFUZZ.2023.332174032:3(1233-1247)Online publication date: Mar-2024
    • (2024)IMIH: Imperceptible Medical Image Hiding for Secure HealthcareIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2024.3355165(1-16)Online publication date: 2024
    • (2024)Robust Image Steganography Against General Downsampling Operations With Lossless Secret RecoveryIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.325369121:1(340-352)Online publication date: Jan-2024
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media