Digital steganography model and embedding optimization strategy

被引:3
|
作者
Song, Hai-Tao [1 ]
Tang, Guang-Ming [1 ]
Kou, Guang [2 ]
Sun, Yi-Feng [1 ]
Jiang, Ming-Ming [1 ]
机构
[1] Zhengzhou Informat Sci & Technol Inst, Zhengzhou, Henan, Peoples R China
[2] Natl Innovat Inst Def Technol, Beijing, Peoples R China
关键词
Steganography; Steganography model; Theoretical derivation; KL divergence; Embedding optimization;
D O I
10.1007/s11042-018-6810-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The existed digital steganography models and theories are not effective enough to guide the steganography processing. Based on previous studies, this paper proposes a complete digital steganography model based on additive noise. And then, with security analysis from KL divergence, the embedding optimization strategy is given through theoretical derivation needless of any side information: optimizing the embedding modification position and optimizing the embedding modification direction (+1 or-1). Through theoretical derivation, we also obtain the quantitative relationship between the pixels modification probability and the adjacent pixels difference, and prove that modification by +/- 1 randomly cannot enhance steganographic security definitely. The research in this paper can provide theoretical guidance for the design of steganography algorithms. Compared with previous studies, the proposed embedding optimization strategy has outstanding advantages of being easy to implement and being effective to improve steganographic security. The experiments by optimizing LSBM and MG algorithms show that the proposed embedding optimization strategy can effectively improve each algorithm's steganographic security at a relative small payload.
引用
收藏
页码:8271 / 8288
页数:18
相关论文
共 50 条
  • [31] Uniform Embedding for Efficient JPEG Steganography
    Guo, Linjie
    Ni, Jiangqun
    Shi, Yun Qing
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (05) : 814 - 825
  • [32] Secure steganography based on embedding capacity
    Hedieh Sajedi
    Mansour Jamzad
    International Journal of Information Security, 2009, 8 : 433 - 445
  • [33] Uniformly Spread Embedding Based Steganography
    Saidi, Marwa
    Hermassi, Houcemeddine
    Rhouma, Rhouma
    Belghith, Safya
    DIGITAL ECONOMY: EMERGING TECHNOLOGIES AND BUSINESS INNOVATION, ICDEC 2017, 2017, 290 : 162 - 172
  • [34] Image Steganography With Symmetric Embedding Using Gaussian Markov Random Field Model
    Su, Wenkang
    Ni, Jiangqun
    Hu, Xianglei
    Fridrich, Jessica
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 31 (03) : 1001 - 1015
  • [35] Secure steganography based on embedding capacity
    Sajedi, Hedieh
    Jamzad, Mansour
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 8 (06) : 433 - 445
  • [36] A fast algorithm for matrix embedding steganography
    Mao, Qian, 1600, Elsevier Inc. (25):
  • [37] Competitive Swarm Optimization with Encryption Based Steganography for Digital Image Security
    Eshmawi, Ala' A.
    Alsuhibany, Suliman A.
    Abdel-Khalek, Sayed
    Mansour, Romany F.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (02): : 4173 - 4184
  • [38] The Decoy: Multi-Level Digital Multimedia Steganography Model
    Al-Najjar, Atef Jawad
    PROCEEDINGS OF THE 12TH WSEAS INTERNATIONAL CONFERENCE ON COMMUNICATIONS: NEW ASPECTS OF COMMUNICATIONS, 2008, : 445 - +
  • [39] Digital Image Authentication Model Based on Edge Adaptive Steganography
    Grover, Nidhi
    Mohapatra, A. K.
    2013 SECOND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND SECURITY (ADCONS 2013), 2013, : 238 - 242
  • [40] A high embedding capacity approach to adaptive steganography
    Arjun, N. Santosh
    Negi, Atul
    2006 1ST INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, 2006, : 525 - +