An AMR adaptive steganography algorithm based on minimizing distortion

被引:0
|
作者
Yanzhen Ren
Hongxia Wu
Lina Wang
机构
[1] Computer School of Wuhan University,
[2] State Key Laboratory of Software Engineering,undefined
[3] Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education,undefined
来源
关键词
AMR; Adaptive steganography; Fixed codebook; STC; Minimum embedding distortion;
D O I
暂无
中图分类号
学科分类号
摘要
To improve the concealment and statistics security, the paper proposed an AMR (Adaptive Multi-Rate) FCB (Fixed CodeBook) Adaptive steganography scheme (AFA), which is based on the search principle of AMR FCB and the correlation of non-zero pulse positions. The key contribution of the scheme is the design of the cost function and the additive distortion function. The optimal probability of pulse and the pulse correlation in the same track were introduced to cost function to improve the statistics security of the proposed algorithm. The hit function b(n) which is used to search for optimal pulse position was added to additive distortion function to improve the concealment of the algorithm. The experiment results show that the proposed scheme has better hearing concealment and security performance to resist the detecting of the existing steganalysis algorithms than the other steganography schemes.
引用
收藏
页码:12095 / 12110
页数:15
相关论文
共 50 条
  • [41] Image Adversarial Steganography Based on Joint Distortion
    Fan, Zexin
    Chen, Kejiang
    Qin, Chuan
    Zeng, Kai
    Zhang, Weiming
    Yu, Nenghai
    ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, 2023,
  • [42] Distortion-Minimizing Flux Observer for IPMSM Based on Frequency-Adaptive Observers
    Kim, Hyeon-Sik
    Sul, Seung-Ki
    Yoo, Hyunjae
    Oh, Jaeyoon
    IEEE TRANSACTIONS ON POWER ELECTRONICS, 2020, 35 (02) : 2077 - 2087
  • [43] Distortion-Minimizing Flux Observer for IPMSM Based on Frequency-Adaptive Observers
    Kim, Hyeon-Sik
    Sul, Seung-Ki
    Yoo, Hyunjae
    Oh, Jaeyoon
    2018 IEEE ENERGY CONVERSION CONGRESS AND EXPOSITION (ECCE), 2018, : 5797 - 5803
  • [44] Steganography Based on Minimizing Embedding Impact Function and HVS
    Pan, Feng
    Li, Jun
    Li, Xiuguang
    Guo, Yao
    2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 490 - 493
  • [45] Evolving Distortion Function By Exploiting The Differences Among Comparable Adaptive Steganography
    Zhou, Wenbo
    Zhang, Weiming
    Yu, Nenghai
    2016 12TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (ICNC-FSKD), 2016, : 2262 - 2271
  • [46] Developing an adaptive DCT-based steganography method using a genetic algorithm
    Sabeti, Vajiheh
    Aghabagheri, Adeleh
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (13) : 19323 - 19346
  • [47] Developing an adaptive DCT-based steganography method using a genetic algorithm
    Vajiheh Sabeti
    Adeleh Aghabagheri
    Multimedia Tools and Applications, 2023, 82 : 19323 - 19346
  • [48] Adaptive Linear Programming of Polar Codes to Minimize Additive Distortion in Steganography
    Diouf, Birahime
    Diop, Idy
    Keita, Khadidiatou W.
    Farssi, Sidi M.
    Khouma, Ousmane
    Diouf, Madiop
    Tall, Khaly
    PROCEEDINGS OF THE 2016 SAI COMPUTING CONFERENCE (SAI), 2016, : 1086 - 1092
  • [49] Defining Joint Embedding Distortion for Adaptive MP3 Steganography
    Yang, Yunzhao
    Wang, Yuntao
    Yi, Xiaowei
    Zhao, Xianfeng
    Ma, Yi
    IH&MMSEC '19: PROCEEDINGS OF THE ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, 2019, : 14 - 24
  • [50] Distortion Design for Secure Adaptive 3-D Mesh Steganography
    Zhou, Hang
    Chen, Kejiang
    Zhang, Weiming
    Yao, Yuanzhi
    Yu, Nenghai
    IEEE TRANSACTIONS ON MULTIMEDIA, 2019, 21 (06) : 1384 - 1398