Computer Science ›› 2016, Vol. 43 ›› Issue (5): 108-112.doi: 10.11896/j.issn.1002-137X.2016.05.020

Previous Articles     Next Articles

Revised Steganography Scheme Based on SI-UNIWARD

SI Yi-fan, WEI Li-xian, ZHANG Ying-nan and LIU Jia   

  • Online:2018-12-01 Published:2018-12-01

Abstract: To solve the problem of the distortion cost being zero when the rounding error of the distortion cost in UNIWARD is 1/2,a new steganography scheme based on SI-UNIWARD was proposed.At first,the raw pixels of the precover are rounded,then a set of rounded error which have reasonable distance are redefined,and new embedded costs are generated.Consequently,the DCT coefficients of the 00,0,04,4 modes which are prohibited in SI-UNIWARD are reused.Finally,the pathological behavior of the detection performance is avoided,and the zero-embedding-cost problem is solved.The experimental results show that compared with SI-UNIWARD,the probability of changed DCT coefficients,pixel difference in spatial domain and the changes in spatial domain caused by DCT embedding are lowered,detection performance are promoted,and the side information are better used.

Key words: Universal wavelet relative distortion(UNIWARD),Distortion function,Steganography,Adaptive steganography,Steganalysis

[1] Huang F,Huang J,Shi Y Q.New channel selection rule for JPEG steganography[J].IEEE Transactions on Information Forensics and Security,2012,7(4):1181-1191
[2] Sachnev V,Kim H J,Zhang R.Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding[C]∥Dittmann J,Craver S,Fridrich J,eds.Proceedings of the 11th ACM Multimedia & Security Workshop.2009:131-140
[3] Holub V,Fridrich J.Universal distortion function for steganography in an arbitrary domain[C]∥EURASIP Journal on Information Security,Special Issue on Revised Selected Papers of the 1st ACM IH and MMS Workshop(2013).2013
[4] Holub V,Fridrich J.Designing steganographic distortion using directional filters[J].IEEE International Workshop on Information Forensics and Security.2012,2(4):234-239
[5] Huang F,Luo W,Huang J,et al.Distortion function designing for JPEG steganography with uncompressed side-image[C]∥1st ACM Information Hiding and Multimedia Security Workshop.Montpellier,France,2013:17-19
[6] Ker A D.A fusion of maximal likelihood and structural stegana-lysis[C]∥ 9th International Workshop.Springer Berlin Heidelberg,2007:204-219
[7] Kodovsky J,Fridrich J.Steganalysis of JPEG images using rich models[C]∥ Proceedings SPIE,The International Society for Optical Engineering.2012:1-13
[8] Filler T,Pevny T,Bas P.BOSS(Break Our Steganography System).http://www.agents.cz/boss
[9] Fridrich J,Kodovsky J.Rich models for steganalysis of digitalimages[J].IEEE Transactions on Information Forensics and Security,2011,7(3):868-882
[10] Kodovsky J,Fridrich J,Holub V.Ensemble classifiers for steganalysis of digital media[J].IEEE Transactions on Information Forensics and Security,2012,7(2):432-444
[11] Holub V,Fridrich J.Digital image steganography using universal distortion[C]∥1st ACM Information Hiding and MultimediaSecurity Workshop.Montpellier,France,2013
[12] Filler T,Judas J,Fridrich J.Minimizing additive distortion in steganography using syndrome-trellis codes[J].IEEE Transactions on Information Forensics and Security,2011,6(3):920-935

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!