Digital steganography model and embedding optimization strategy

被引:3
|
作者
Song, Hai-Tao [1 ]
Tang, Guang-Ming [1 ]
Kou, Guang [2 ]
Sun, Yi-Feng [1 ]
Jiang, Ming-Ming [1 ]
机构
[1] Zhengzhou Informat Sci & Technol Inst, Zhengzhou, Henan, Peoples R China
[2] Natl Innovat Inst Def Technol, Beijing, Peoples R China
关键词
Steganography; Steganography model; Theoretical derivation; KL divergence; Embedding optimization;
D O I
10.1007/s11042-018-6810-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The existed digital steganography models and theories are not effective enough to guide the steganography processing. Based on previous studies, this paper proposes a complete digital steganography model based on additive noise. And then, with security analysis from KL divergence, the embedding optimization strategy is given through theoretical derivation needless of any side information: optimizing the embedding modification position and optimizing the embedding modification direction (+1 or-1). Through theoretical derivation, we also obtain the quantitative relationship between the pixels modification probability and the adjacent pixels difference, and prove that modification by +/- 1 randomly cannot enhance steganographic security definitely. The research in this paper can provide theoretical guidance for the design of steganography algorithms. Compared with previous studies, the proposed embedding optimization strategy has outstanding advantages of being easy to implement and being effective to improve steganographic security. The experiments by optimizing LSBM and MG algorithms show that the proposed embedding optimization strategy can effectively improve each algorithm's steganographic security at a relative small payload.
引用
收藏
页码:8271 / 8288
页数:18
相关论文
共 50 条
  • [1] Digital steganography model and embedding optimization strategy
    Hai-Tao Song
    Guang-Ming Tang
    Guang Kou
    Yi-Feng Sun
    Ming-Ming Jiang
    Multimedia Tools and Applications, 2019, 78 : 8271 - 8288
  • [2] Embedding Strategy for Batch Adaptive Steganography
    Zhao, Zengzhen
    Guan, Qingxiao
    Zhao, Xianfeng
    Yu, Haibo
    Liu, Changjun
    DIGITAL FORENSICS AND WATERMARKING, IWDW 2016, 2017, 10082 : 494 - 505
  • [3] Improving the Embedding Strategy for Batch Adaptive Steganography
    Yu, Xinzhi
    Chen, Kejiang
    Zhang, Weiming
    Wang, Yaofei
    Yu, Nenghai
    DIGITAL FORENSICS AND WATERMARKING, IWDW 2018, 2019, 11378 : 248 - 260
  • [4] Steganalysis of JPEG steganography with complementary embedding strategy
    Huang, F.
    Luo, W.
    Huang, J.
    IET INFORMATION SECURITY, 2011, 5 (01) : 10 - 18
  • [5] An Optimization Strategy for Improving Security in Steganography
    Wu, Xiancheng
    Tan, Shunquan
    2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2018, : 1461 - 1466
  • [6] Image Steganography Scheme Based on Reversible Data Embedding Strategy
    Tilakaratne, U. T.
    Pinidiyaarachchi, U. A. J.
    PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2013), 2013, : 503 - 507
  • [7] A Novel Steganography Scheme Based on Asymmetric Embedding Model
    Hu, Xianglei
    Chen, Haishan
    Ni, Jiangqun
    Su, Wenkang
    CLOUD COMPUTING AND SECURITY, PT IV, 2018, 11066 : 183 - 194
  • [8] Extended Embedding Function for Model-Preserving Steganography
    Islam, Saiful
    Gupta, Phalguni
    INTELLIGENT COMPUTING THEORY, 2014, 8588 : 803 - 811
  • [9] High-performance JPEG steganography using complementary embedding strategy
    Liu, Chiang-Lung
    Liao, Shiang-Rong
    PATTERN RECOGNITION, 2008, 41 (09) : 2945 - 2955
  • [10] An AAC steganography scheme for adaptive embedding with distortion minimization model
    Zhenyu Zhang
    Xiaowei Yi
    Xianfeng Zhao
    Multimedia Tools and Applications, 2020, 79 : 27777 - 27790