Steganographic strategies for a square distortion function

被引:1
|
作者
Ker, Andrew D. [1 ]
机构
[1] Univ Oxford, Comp Lab, Oxford OX1 3QD, England
关键词
steganographic capacity; batch steganography; information theory; source coding;
D O I
10.1117/12.765913
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent results on the information theory of steganography suggest, and under some conditions prove, that the detectability of payload is proportional to the square of the number of changes caused by the embedding. Assuming that result in general, this paper examines the implications for an embedder when a payload is to be spread amongst multiple cover objects. A number of variants are considered: embedding with and without adaptive source coding, in uniform and non-uniform covers, and embedding in both a fixed number of covers (so-called batch steganography) as well as establishing a covert channel in an infinite stream (sequential steganography, studied here for the first time). The results show that steganographic capacity is sublinear, and strictly asymptotically greater in the case of a fixed batch than an infinite stream. In the former it is possible to describe optimal embedding strategies; in the latter the situation is much more complex, with a continuum of strategies which approach the unachievable asymptotic. optimum.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] A Steganographic Method Based on Pixel-Value Differencing and the Perfect Square Number
    Tseng, Hsien-Wen
    Leng, Hui-Shih
    JOURNAL OF APPLIED MATHEMATICS, 2013,
  • [22] Influence of embedding strategies on security of steganographic methods in the JPEG domain
    Kodovsky, Jan
    Fridrich, Jessica
    SECURITY, FORENSICS, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS X, 2008, 6819
  • [23] Improving the Adaptive Steganographic Methods Based on Modulus Function
    Liao, Xin
    Wen, Qiaoyan
    Zhang, Jie
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (12) : 2731 - 2734
  • [24] Derivative-Based Steganographic Distortion and its Non-additive Extensions for Audio
    Chen, Kejiang
    Zhou, Hang
    Li, Weixiang
    Yang, Kuan
    Zhang, Weiming
    Yu, Nenghai
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2020, 30 (07) : 2027 - 2032
  • [25] A MV-Based Steganographic Algorithm for H.264/AVC without Distortion
    Tang, Hongqiong
    Yang, Xiaoyuan
    Zhang, Yingnan
    Niu, Ke
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 63 (03): : 1205 - 1219
  • [26] A MV-based steganographic algorithm for H.264/AVC without distortion
    Tang H.
    Yang X.
    Zhang Y.
    Niu K.
    Computers, Materials and Continua, 2020, 63 (03): : 1205 - 1219
  • [28] Secure steganographic algorithm based on side match and modular function
    Liao, Qi-Nan
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2012, 40 (10): : 2002 - 2008
  • [29] DISTORTION-COMPLEXITY AND RATE-DISTORTION FUNCTION
    MURAMATSU, J
    KANAYA, F
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1994, E77A (08) : 1224 - 1229
  • [30] StegErmelc: A Novel DCT-Based Steganographic Method Using Three Strategies
    Wong, KokSheik
    Tanaka, Kiyoshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (10) : 2897 - 2908