计算机科学 ›› 2019, Vol. 46 ›› Issue (1): 196-200.doi: 10.11896/j.issn.1002-137X.2019.01.030
毛炳华, 王子驰, 张新鹏
MAO Bing-hua, WANG Zi-chi, ZHANG Xin-peng
摘要: 目前用于JPEG隐写的失真代价函数对同一DCT系数的加一与减一操作分配相同的代价值。但由于JPEG图像中DCT域的相关性,加一与减一修改对图像内容的影响不同,因此其对应的代价值也理应不同。文中基于DCT域相关性,提出了一种适用于JPEG隐写的通用代价值优化方法,主要考虑JPEG图像中相邻DCT块相同位置上系数的相关性。利用八邻域块中相同位置的DCT系数求平均的方法给出当前DCT系数的预测值。对现有的JPEG失真代价函数,按照向预测值靠拢的原则区分加一和减一的代价值。经过调整的代价值能引导隐写修改后的DCT系数最大程度地向预测值靠拢,增强DCT域相关性,从而提高隐写的安全性。该方法可以与任何现有的JPEG隐写失真代价函数结合使用。实验表明,所提方法几乎不增加原始算法的时间复杂度,同时能有效提高现有JPEG隐写方法的安全性,可使当前隐写分析工具的测试误差平均提升2.4%。
中图分类号:
[1]LI B,TAN S,WANG M,et al.Investigation on Cost Assignment in Spatial Image Steganography[J].IEEE Transactions on Information Forensics & Security,2014,9(8):1264-1277.<br /> [2]ZHANG X.Behavior Steganography in Social Network[M]//Advances in Intelligent Information Hiding and Multimedia Signal Processing.Springer International Publishing,2017.<br /> [3]WEI Q,YIN Z,WANG Z,et al.Distortion function based on residual blocks for JPEG steganography[J].Multimedia Tools & Applications,2017(3):1-14.<br /> [4]FRIDRICH J,SOUKAL D.Matrix embedding for large payloads [J].IEEE Transactions on Information Forensics & Security,2006,1(3):390-395.<br /> [5]WESTFELD A.F5-A Steganographic Algorithm[C]//International Workshop on Information Hiding(IHW 2001).DBLP,2001:289-302.<br /> [6]FRIDRICH J.Statistically undetectable jpeg steganography: dead ends challenges,and opportunities[C]//The Workshop on Multimedia & Security.DBLP,2007:3-14.<br /> [7]ZHANG X,WANG S.Efficient Steganographic Embedding by Exploiting Modification Direction[J].Communications Letters IEEE,2006,10(11):781-783.<br /> [8]ZHANG W,ZHANG X,WANG S.Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes[C]//International Workshop on Information Hi-ding.2008,5284:60-71.<br /> [9]FILLER T,JUDAS J,FRIDRICH J.Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes[J].IEEE Transactions on Information Forensics & Security,2012,6(3):920-935.<br /> [10]BAS P.Using high-dimensional image models to perform highly undetectable steganography[C]//International Workshop on Information Hiding.Springer-Verlag,2010:161-177.<br /> [11]HOLUB V,FRIDRICH J.Designing steganographic distortion using directional filters[C]//IEEE International Workshop on Information Forensics and Security.IEEE,2012:234-239.<br /> [12]LI B,WANG M,HUANG J,et al.A new cost function for spatial image steganography[C]//IEEE International Conference on Image Processing.IEEE,2015:4206-4210.<br /> [13]FRIDRICH J.Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model[C]//Proceedings of SPIE-The International Society for Optical Engineering,2015.<br /> [14]VOJTEˇCH H,FRIDRICH J.Digital image steganography using universal distortion[C]//ACM Workshop on Information Hi-ding and Multimedia Security.ACM,2013:59-68.<br /> [15]GUO L,NI J,SHI Y Q.Uniform Embedding for Efficient JPEG Steganography[J].IEEE Transactions on Information Forensics &Security,2014,9(5):814-825.<br /> [16]GUO L,NI J,SU W,et al.Using Statistical Image Model for JPEG Steganography:Uniform Embedding Revisited[J].IEEE Transactions on Information Forensics & Security,2015,10(12):2669-2680.<br /> [17]WANG Z,ZHANG X,YIN Z.Hybrid distortion function for JPEG steganography[J].Journal of Electronic Imaging,2016,25(5):050501.<br /> [18]SI Y F,WEI L X,ZHANG Y N,et al.Improved Steganography Based on SI-UNIWARD Distortion Function[J].ComputerScien-ce,2016,43(5):108-112.(in Chinese)<br /> 司一帆,魏立线,张英男,等.基于SI-UNIWARD失真函数的改进隐写方案[J].计算机科学,2016,43(5):108-112<br /> [19]WANG Z,LV J,WEI Q,et al.Distortion Function for Spatial Image Steganography Based on the Polarity of Embedding Change[C]//International Workshop on Digital Watermarking.Springer International Publishing,2016:487-493.<br /> [20]PENNEBAKER W B,MITCHELL J L.JPEG Still Image Data Compression Standard[M].Norwell:Kluwer AcademicPubli-shers,1992.<br /> [21]WANG Z,YIN Z,ZHANG X.Distortion Function for JPEG Steganography Based on Image Texture and Correlation in DCT Domain[J].IETE Technical Review,2017,34:1-8.<br /> [22]SCHAEFER G.UCID:an uncompressed color image database [C]//Storage & Retrieval Methods & Applications for Multimedia.DBLP,2003:472-480.<br /> [23]HOLUB V,FRIDRICH J.Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT[J].IEEE Transactions on Information Forensics & Security,2015,10(2):219-228.<br /> [24]SONG X,LIU F,YANG C,et al.Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters[C]//ACM Workshop on Information Hiding and Multimedia Security.ACM,2015:15-23.<br /> [25]KODOVSKY J,FRIDRICH J,HOLUB V.Ensemble Classifiers for Steganalysis of Digital Media[J].IEEE Transactions on Information Forensics & Security,2012,7(2):432-444. |
[1] | 彭伟, 胡宁, 胡璟璟. 图像隐写分析算法研究概述 Overview of Research on Image Steganalysis Algorithms 计算机科学, 2020, 47(6A): 325-331. https://doi.org/10.11896/JsJkx.190600103 |
[2] | 穆晓芳, 邓红霞, 李晓宾, 赵鹏. 基于人工蜂群算法的两阶段图像隐写分析算法 Two-phase Image Steganalysis Algorithm Based on Artificial Bee Colony Algorithm 计算机科学, 2019, 46(6): 174-179. https://doi.org/10.11896/j.issn.1002-137X.2019.06.026 |
[3] | 罗霄阳,霍宏涛,王梦思,陈亚飞. 基于多残差马尔科夫模型的图像拼接检测 Passive Image-splicing Detection Based on Multi-residual Markov Model 计算机科学, 2018, 45(4): 173-177. https://doi.org/10.11896/j.issn.1002-137X.2018.04.029 |
[4] | 张垚, 潘峰, 申军伟, 李宁波. 基于MP3的后置式自适应隐写算法 Adaptive Post-type Steganography Algorithm Based on MP3 计算机科学, 2016, 43(8): 114-117. https://doi.org/10.11896/j.issn.1002-137X.2016.08.024 |
[5] | 司一帆,魏立线,张英男,刘佳. 基于SI-UNIWARD失真函数的改进隐写方案 Revised Steganography Scheme Based on SI-UNIWARD 计算机科学, 2016, 43(5): 108-112. https://doi.org/10.11896/j.issn.1002-137X.2016.05.020 |
[6] | 高瞻瞻,汤光明,张伟伟. 特征保持隐写的博弈分析 Game Analysis on Statistical Characteristics Preserving Steganography 计算机科学, 2014, 41(7): 206-209. https://doi.org/10.11896/j.issn.1002-137X.2014.07.043 |
[7] | 汪磊,曾宪庭,苏金阳. 一种基于多域特征的JPEG图像隐写分析算法 Steganalysis Based on Multi-domain Features for JPEG Images 计算机科学, 2014, 41(6): 94-98. https://doi.org/10.11896/j.issn.1002-137X.2014.06.019 |
[8] | 陈够喜,陈俊杰. 批量二值图像的隐写研究 Steganographic Research for Batch Binary Images 计算机科学, 2011, 38(11): 271-274. |
[9] | 丁琦,平西建. 基于脉冲位置参数统计特征的压缩域语音隐写分析 Steganalysis of Compressed Speech Based on Statistics of Pulse Position Parameters 计算机科学, 2011, 38(1): 217-220. |
[10] | 何军辉,唐韶华,邢宜博. 基于变步长量化的安全图像隐写 Secure Image Steganography Based on Step-varying Quantization 计算机科学, 2009, 36(7): 56-59. https://doi.org/10.11896/j.issn.1002-137X.2009.07.011 |
|