计算机科学 ›› 2019, Vol. 46 ›› Issue (1): 196-200.doi: 10.11896/j.issn.1002-137X.2019.01.030

• 信息安全 • 上一篇    下一篇

基于DCT域相关性的非对称JPEG隐写

毛炳华, 王子驰, 张新鹏   

  1. (上海大学通信与信息工程学院 上海200444)
  • 收稿日期:2017-12-18 出版日期:2019-01-15 发布日期:2019-02-25
  • 作者简介:毛炳华(1993-),男,硕士生,主要研究方向为图像隐写、社交网络图像加密;王子驰(1992-),男,博士生,主要研究方向为隐写、隐写分析,E-mail:wangzichi@shu.edu.cn(通信作者);张新鹏(1975-),男,教授,博士生导师,CCF会员,主要研究方向为信息隐藏、图像处理、数字取证。
  • 基金资助:
    国家自然科学基金(U1636206,61525203,61502009,61472235),上海市曙光学者计划(14SG36),上海市优秀学术带头人计划(16XD1401200)资助

Asymmetric JPEG Steganography Based on Correlation in DCT Domain

MAO Bing-hua, WANG Zi-chi, ZHANG Xin-peng   

  1. (School of Communication and Information Engineering,Shanghai University,Shanghai 200444,China)
  • Received:2017-12-18 Online:2019-01-15 Published:2019-02-25

摘要: 目前用于JPEG隐写的失真代价函数对同一DCT系数的加一与减一操作分配相同的代价值。但由于JPEG图像中DCT域的相关性,加一与减一修改对图像内容的影响不同,因此其对应的代价值也理应不同。文中基于DCT域相关性,提出了一种适用于JPEG隐写的通用代价值优化方法,主要考虑JPEG图像中相邻DCT块相同位置上系数的相关性。利用八邻域块中相同位置的DCT系数求平均的方法给出当前DCT系数的预测值。对现有的JPEG失真代价函数,按照向预测值靠拢的原则区分加一和减一的代价值。经过调整的代价值能引导隐写修改后的DCT系数最大程度地向预测值靠拢,增强DCT域相关性,从而提高隐写的安全性。该方法可以与任何现有的JPEG隐写失真代价函数结合使用。实验表明,所提方法几乎不增加原始算法的时间复杂度,同时能有效提高现有JPEG隐写方法的安全性,可使当前隐写分析工具的测试误差平均提升2.4%。

关键词: JPEG图像, 八邻域, 失真代价, 隐写

Abstract: The current distortion functions used for JPEG steganography allocate a same embedding cost for ±1 embedding change.However,due to the correlation of DCT domain in JPEG images,the effects of ±1 to modifying the content of the image are different,so the corresponding embedding cost should also be different.Based on the DCT correlation concept,a universal cost-value optimization method suitable for JPEG steganography was proposed in this paper,which mainly considers the correlation of the coefficients in the same position of adjacent DCT blocks in the JPEG image.The current DCT coefficients are predicted by averaging the DCT coefficients of the same position in the eight neighborhood blocks.For the existing JPEG distortion function,the embedding cost for ±1 is differentiated by the principle of moving closer to the predicted value.The adjusted embedding cost can guide the stego-modified DCT coefficients to move closer to the predicted value and enhance the correlation of the DCT domain to improve steganographic security.This method can be used in combination with any existing JPEG distortion function.Experimental results show that this method can increase the security of the existing JPEG steganography by 2.4% of test error on average without increasing the time complexity of the original algorithm.

Key words: Distortion cost, Eight neighborhoods, JPEG images, Steganography

中图分类号: 

  • TP309
[1]LI B,TAN S,WANG M,et al.Investigation on Cost Assignment in Spatial Image Steganography[J].IEEE Transactions on Information Forensics & Security,2014,9(8):1264-1277.<br /> [2]ZHANG X.Behavior Steganography in Social Network[M]//Advances in Intelligent Information Hiding and Multimedia Signal Processing.Springer International Publishing,2017.<br /> [3]WEI Q,YIN Z,WANG Z,et al.Distortion function based on residual blocks for JPEG steganography[J].Multimedia Tools & Applications,2017(3):1-14.<br /> [4]FRIDRICH J,SOUKAL D.Matrix embedding for large payloads [J].IEEE Transactions on Information Forensics & Security,2006,1(3):390-395.<br /> [5]WESTFELD A.F5-A Steganographic Algorithm[C]//International Workshop on Information Hiding(IHW 2001).DBLP,2001:289-302.<br /> [6]FRIDRICH J.Statistically undetectable jpeg steganography: dead ends challenges,and opportunities[C]//The Workshop on Multimedia & Security.DBLP,2007:3-14.<br /> [7]ZHANG X,WANG S.Efficient Steganographic Embedding by Exploiting Modification Direction[J].Communications Letters IEEE,2006,10(11):781-783.<br /> [8]ZHANG W,ZHANG X,WANG S.Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes[C]//International Workshop on Information Hi-ding.2008,5284:60-71.<br /> [9]FILLER T,JUDAS J,FRIDRICH J.Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes[J].IEEE Transactions on Information Forensics & Security,2012,6(3):920-935.<br /> [10]BAS P.Using high-dimensional image models to perform highly undetectable steganography[C]//International Workshop on Information Hiding.Springer-Verlag,2010:161-177.<br /> [11]HOLUB V,FRIDRICH J.Designing steganographic distortion using directional filters[C]//IEEE International Workshop on Information Forensics and Security.IEEE,2012:234-239.<br /> [12]LI B,WANG M,HUANG J,et al.A new cost function for spatial image steganography[C]//IEEE International Conference on Image Processing.IEEE,2015:4206-4210.<br /> [13]FRIDRICH J.Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model[C]//Proceedings of SPIE-The International Society for Optical Engineering,2015.<br /> [14]VOJTEˇCH H,FRIDRICH J.Digital image steganography using universal distortion[C]//ACM Workshop on Information Hi-ding and Multimedia Security.ACM,2013:59-68.<br /> [15]GUO L,NI J,SHI Y Q.Uniform Embedding for Efficient JPEG Steganography[J].IEEE Transactions on Information Forensics &Security,2014,9(5):814-825.<br /> [16]GUO L,NI J,SU W,et al.Using Statistical Image Model for JPEG Steganography:Uniform Embedding Revisited[J].IEEE Transactions on Information Forensics & Security,2015,10(12):2669-2680.<br /> [17]WANG Z,ZHANG X,YIN Z.Hybrid distortion function for JPEG steganography[J].Journal of Electronic Imaging,2016,25(5):050501.<br /> [18]SI Y F,WEI L X,ZHANG Y N,et al.Improved Steganography Based on SI-UNIWARD Distortion Function[J].ComputerScien-ce,2016,43(5):108-112.(in Chinese)<br /> 司一帆,魏立线,张英男,等.基于SI-UNIWARD失真函数的改进隐写方案[J].计算机科学,2016,43(5):108-112<br /> [19]WANG Z,LV J,WEI Q,et al.Distortion Function for Spatial Image Steganography Based on the Polarity of Embedding Change[C]//International Workshop on Digital Watermarking.Springer International Publishing,2016:487-493.<br /> [20]PENNEBAKER W B,MITCHELL J L.JPEG Still Image Data Compression Standard[M].Norwell:Kluwer AcademicPubli-shers,1992.<br /> [21]WANG Z,YIN Z,ZHANG X.Distortion Function for JPEG Steganography Based on Image Texture and Correlation in DCT Domain[J].IETE Technical Review,2017,34:1-8.<br /> [22]SCHAEFER G.UCID:an uncompressed color image database [C]//Storage & Retrieval Methods & Applications for Multimedia.DBLP,2003:472-480.<br /> [23]HOLUB V,FRIDRICH J.Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT[J].IEEE Transactions on Information Forensics & Security,2015,10(2):219-228.<br /> [24]SONG X,LIU F,YANG C,et al.Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters[C]//ACM Workshop on Information Hiding and Multimedia Security.ACM,2015:15-23.<br /> [25]KODOVSKY J,FRIDRICH J,HOLUB V.Ensemble Classifiers for Steganalysis of Digital Media[J].IEEE Transactions on Information Forensics & Security,2012,7(2):432-444.
[1] 彭伟, 胡宁, 胡璟璟.
图像隐写分析算法研究概述
Overview of Research on Image Steganalysis Algorithms
计算机科学, 2020, 47(6A): 325-331. https://doi.org/10.11896/JsJkx.190600103
[2] 穆晓芳, 邓红霞, 李晓宾, 赵鹏.
基于人工蜂群算法的两阶段图像隐写分析算法
Two-phase Image Steganalysis Algorithm Based on Artificial Bee Colony Algorithm
计算机科学, 2019, 46(6): 174-179. https://doi.org/10.11896/j.issn.1002-137X.2019.06.026
[3] 罗霄阳,霍宏涛,王梦思,陈亚飞.
基于多残差马尔科夫模型的图像拼接检测
Passive Image-splicing Detection Based on Multi-residual Markov Model
计算机科学, 2018, 45(4): 173-177. https://doi.org/10.11896/j.issn.1002-137X.2018.04.029
[4] 张垚, 潘峰, 申军伟, 李宁波.
基于MP3的后置式自适应隐写算法
Adaptive Post-type Steganography Algorithm Based on MP3
计算机科学, 2016, 43(8): 114-117. https://doi.org/10.11896/j.issn.1002-137X.2016.08.024
[5] 司一帆,魏立线,张英男,刘佳.
基于SI-UNIWARD失真函数的改进隐写方案
Revised Steganography Scheme Based on SI-UNIWARD
计算机科学, 2016, 43(5): 108-112. https://doi.org/10.11896/j.issn.1002-137X.2016.05.020
[6] 高瞻瞻,汤光明,张伟伟.
特征保持隐写的博弈分析
Game Analysis on Statistical Characteristics Preserving Steganography
计算机科学, 2014, 41(7): 206-209. https://doi.org/10.11896/j.issn.1002-137X.2014.07.043
[7] 汪磊,曾宪庭,苏金阳.
一种基于多域特征的JPEG图像隐写分析算法
Steganalysis Based on Multi-domain Features for JPEG Images
计算机科学, 2014, 41(6): 94-98. https://doi.org/10.11896/j.issn.1002-137X.2014.06.019
[8] 陈够喜,陈俊杰.
批量二值图像的隐写研究
Steganographic Research for Batch Binary Images
计算机科学, 2011, 38(11): 271-274.
[9] 丁琦,平西建.
基于脉冲位置参数统计特征的压缩域语音隐写分析
Steganalysis of Compressed Speech Based on Statistics of Pulse Position Parameters
计算机科学, 2011, 38(1): 217-220.
[10] 何军辉,唐韶华,邢宜博.
基于变步长量化的安全图像隐写
Secure Image Steganography Based on Step-varying Quantization
计算机科学, 2009, 36(7): 56-59. https://doi.org/10.11896/j.issn.1002-137X.2009.07.011
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!