Secure AAC steganography scheme based on multi-view statistical distortion (SofMvD)

被引:1
|
作者
Ren, Yanzhen [1 ]
Cai, Sen [1 ]
Wang, Lina [1 ]
机构
[1] School of Cyber Science and Engineering, Wuhan University, Wuhan,430072, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Advanced Audio Coding (AAC) is currently the most widely used audio compression standard in Internet applications. In this paper, a large capacity secure steganography algorithm based on the compression parameters of AAC QMDCT is proposed. In order to improve the statistical security and the imperceptibility of steganography. Based on multi-view statistical distortion, which combines the statistical distribution of Huffman codewords, QMDCT's intra-frame and inter-frame statistical correlation, and the frequency perceptual masking in the psychoacoustic model, this paper presents a secure AAC steganography scheme SofMvD based on STCs. In the experimental results, the maximum embedding capacity of the proposed scheme is about 12 kbps. Compared with the existing methods, this method can improve steganalysis's ability to 8%−30% and improve the auditory concealment of steganalysis without changing the embedding capacity. This scheme can also be extended to MP3. © 2021
引用
收藏
相关论文
共 50 条
  • [1] Secure AAC steganography scheme based on multi-view statistical distortion (SofMvD)*
    Ren, Yanzhen
    Cai, Se
    Wang, Lina
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 59
  • [2] An AAC steganography scheme for adaptive embedding with distortion minimization model
    Zhang, Zhenyu
    Yi, Xiaowei
    Zhao, Xianfeng
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (37-38) : 27777 - 27790
  • [3] An AAC steganography scheme for adaptive embedding with distortion minimization model
    Zhenyu Zhang
    Xiaowei Yi
    Xianfeng Zhao
    Multimedia Tools and Applications, 2020, 79 : 27777 - 27790
  • [4] Multi Secure and Robustness for Medical Image Based Steganography Scheme
    Prabakaran, G.
    Bhavani, R.
    Rajeswari, P. S.
    PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2013), 2013, : 1188 - 1193
  • [5] Secure Steganography Scheme Based on Steganography Generative Adversarial Network
    Pan, Guangxu
    Yang, Zhongpeng
    Ma, Yong
    FRONTIERS IN CYBER SECURITY, FCS 2023, 2024, 1992 : 487 - 502
  • [6] A multi-view enterprise modeling scheme
    Presley, AR
    6TH INDUSTRIAL ENGINEERING RESEARCH CONFERENCE PROCEEDINGS: (IERC), 1997, : 610 - 615
  • [7] Secure Binary Image Steganography With Distortion Measurement Based on Prediction
    Yeung, Yuileong
    Lu, Wei
    Xue, Yingjie
    Huang, Jiwu
    Shi, Yun-Qing
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2020, 30 (05) : 1423 - 1434
  • [8] Secure binary image steganography based on LTP distortion minimization
    Yeung, Yuileong
    Lu, Wei
    Xue, Yingjie
    Chen, Junjia
    Li, Ruipeng
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (17) : 25079 - 25100
  • [9] Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture
    Feng, Bingwen
    Lu, Wei
    Sun, Wei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (02) : 243 - 255
  • [10] Secure binary image steganography based on LTP distortion minimization
    Yuileong Yeung
    Wei Lu
    Yingjie Xue
    Junjia Chen
    Ruipeng Li
    Multimedia Tools and Applications, 2019, 78 : 25079 - 25100