Digital steganography model and embedding optimization strategy

被引:3
|
作者
Song, Hai-Tao [1 ]
Tang, Guang-Ming [1 ]
Kou, Guang [2 ]
Sun, Yi-Feng [1 ]
Jiang, Ming-Ming [1 ]
机构
[1] Zhengzhou Informat Sci & Technol Inst, Zhengzhou, Henan, Peoples R China
[2] Natl Innovat Inst Def Technol, Beijing, Peoples R China
关键词
Steganography; Steganography model; Theoretical derivation; KL divergence; Embedding optimization;
D O I
10.1007/s11042-018-6810-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The existed digital steganography models and theories are not effective enough to guide the steganography processing. Based on previous studies, this paper proposes a complete digital steganography model based on additive noise. And then, with security analysis from KL divergence, the embedding optimization strategy is given through theoretical derivation needless of any side information: optimizing the embedding modification position and optimizing the embedding modification direction (+1 or-1). Through theoretical derivation, we also obtain the quantitative relationship between the pixels modification probability and the adjacent pixels difference, and prove that modification by +/- 1 randomly cannot enhance steganographic security definitely. The research in this paper can provide theoretical guidance for the design of steganography algorithms. Compared with previous studies, the proposed embedding optimization strategy has outstanding advantages of being easy to implement and being effective to improve steganographic security. The experiments by optimizing LSBM and MG algorithms show that the proposed embedding optimization strategy can effectively improve each algorithm's steganographic security at a relative small payload.
引用
收藏
页码:8271 / 8288
页数:18
相关论文
共 50 条
  • [21] Embedding evolutionary strategy in ordinal optimization for hard optimization problems
    Horng, Shih-Cheng
    Yang, Feng-Yi
    Lin, Shieh-Shing
    APPLIED MATHEMATICAL MODELLING, 2012, 36 (08) : 3753 - 3763
  • [22] Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited
    Guo, Linjie
    Ni, Jiangqun
    Su, Wenkang
    Tang, Chengpei
    Shi, Yun-Qing
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (12) : 2669 - 2680
  • [23] Research of the Possibility of Hidden Embedding of a Digital Watermark Using Practical Methods of Channel Steganography
    Sharikov, Pavel, I
    Krasov, Andrey, V
    Gelfand, Artem M.
    Kosov, Nikita A.
    INTELLIGENT DISTRIBUTED COMPUTING XIII, 2020, 868 : 203 - 209
  • [24] Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images
    Alan A. Abdulla
    Harin Sellahewa
    Sabah A. Jassim
    Multimedia Tools and Applications, 2019, 78 : 17799 - 17823
  • [25] Coverless Steganography for Digital Images Based on a Generative Model
    Duan, Xintao
    Song, Haoxian
    Qin, Chuan
    Khan, Muhammad Khurram
    CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 55 (03): : 483 - 493
  • [26] A secure transaction model based on digital steganography and watermarking
    Yin, KK
    Pan, ZG
    Xiang, H
    Shi, JY
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN & COMPUTER GRAPHICS, 1999, : 1314 - 1318
  • [27] Generalization of the ZZW Embedding Construction for Steganography
    Zhang, Weiming
    Wang, Xin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (03) : 564 - 569
  • [28] A fast algorithm for matrix embedding steganography
    Mao, Qian
    DIGITAL SIGNAL PROCESSING, 2014, 25 : 248 - 254
  • [29] On the complexity and hardness of the steganography embedding problem
    Chandramouli, R
    Trivedi, S
    Uma, RN
    SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VI, 2004, 5306 : 496 - 500
  • [30] A Revised Taxonomy of Steganography Embedding Patterns
    Wendzel, Steffen
    Caviglione, Luca
    Mazurczyk, Wojciech
    Mileva, Aleksandra
    Dittmann, Jana
    Kraetzer, Christian
    Lamshoeft, Kevin
    Vielhauer, Claus
    Hartmann, Laura
    Keller, Joerg
    Neubert, Tom
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,