计算机科学 ›› 2016, Vol. 43 ›› Issue (5): 108-112.doi: 10.11896/j.issn.1002-137X.2016.05.020

• 信息安全 • 上一篇    下一篇

基于SI-UNIWARD失真函数的改进隐写方案

司一帆,魏立线,张英男,刘佳   

  1. 武警工程大学密码与信息安全保密重点实验室 西安710086,武警工程大学密码与信息安全保密重点实验室 西安710086,武警工程大学密码与信息安全保密重点实验室 西安710086,武警工程大学密码与信息安全保密重点实验室 西安710086
  • 出版日期:2018-12-01 发布日期:2018-12-01
  • 基金资助:
    本文受国家自然科学基金(61379152) ,国家自然科学青年基金资助

Revised Steganography Scheme Based on SI-UNIWARD

SI Yi-fan, WEI Li-xian, ZHANG Ying-nan and LIU Jia   

  • Online:2018-12-01 Published:2018-12-01

摘要: 针对通用小波失真函数(UNIWARD)的失真代价的四舍五入误差为1/2时嵌入失真为零的问题,基于边信息的通用小波失真函数(SI-UNIWARD),提出了一种改进隐写方案。该方案首先对前载体的原始像素值进行四舍五入,然后重新定义了一组间距合理的四舍五入误差,产生了新的嵌入代价,重新使用了在SI-UNIWARD中禁用的00、40、04、44模式中的1/2离散余弦变换(DCT)系数,避免了检测性能的病态饱和,从而解决了零嵌入失真代价问题。实验表明,该方案与SI-UNIWARD相比,DCT系数的更改概率降低了3%,同时降低了空域中像素值间的数量差别和DCT系数的嵌入更改率,提升了检测误差性能,能够较好地利用边信息。

关键词: 通用小波失真函数;失真函数;图像隐写;自适应隐写;隐写分析

Abstract: To solve the problem of the distortion cost being zero when the rounding error of the distortion cost in UNIWARD is 1/2,a new steganography scheme based on SI-UNIWARD was proposed.At first,the raw pixels of the precover are rounded,then a set of rounded error which have reasonable distance are redefined,and new embedded costs are generated.Consequently,the DCT coefficients of the 00,0,04,4 modes which are prohibited in SI-UNIWARD are reused.Finally,the pathological behavior of the detection performance is avoided,and the zero-embedding-cost problem is solved.The experimental results show that compared with SI-UNIWARD,the probability of changed DCT coefficients,pixel difference in spatial domain and the changes in spatial domain caused by DCT embedding are lowered,detection performance are promoted,and the side information are better used.

Key words: Universal wavelet relative distortion(UNIWARD),Distortion function,Steganography,Adaptive steganography,Steganalysis

[1] Huang F,Huang J,Shi Y Q.New channel selection rule for JPEG steganography[J].IEEE Transactions on Information Forensics and Security,2012,7(4):1181-1191
[2] Sachnev V,Kim H J,Zhang R.Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding[C]∥Dittmann J,Craver S,Fridrich J,eds.Proceedings of the 11th ACM Multimedia & Security Workshop.2009:131-140
[3] Holub V,Fridrich J.Universal distortion function for steganography in an arbitrary domain[C]∥EURASIP Journal on Information Security,Special Issue on Revised Selected Papers of the 1st ACM IH and MMS Workshop(2013).2013
[4] Holub V,Fridrich J.Designing steganographic distortion using directional filters[J].IEEE International Workshop on Information Forensics and Security.2012,2(4):234-239
[5] Huang F,Luo W,Huang J,et al.Distortion function designing for JPEG steganography with uncompressed side-image[C]∥1st ACM Information Hiding and Multimedia Security Workshop.Montpellier,France,2013:17-19
[6] Ker A D.A fusion of maximal likelihood and structural stegana-lysis[C]∥ 9th International Workshop.Springer Berlin Heidelberg,2007:204-219
[7] Kodovsky J,Fridrich J.Steganalysis of JPEG images using rich models[C]∥ Proceedings SPIE,The International Society for Optical Engineering.2012:1-13
[8] Filler T,Pevny T,Bas P.BOSS(Break Our Steganography System).http://www.agents.cz/boss
[9] Fridrich J,Kodovsky J.Rich models for steganalysis of digitalimages[J].IEEE Transactions on Information Forensics and Security,2011,7(3):868-882
[10] Kodovsky J,Fridrich J,Holub V.Ensemble classifiers for steganalysis of digital media[J].IEEE Transactions on Information Forensics and Security,2012,7(2):432-444
[11] Holub V,Fridrich J.Digital image steganography using universal distortion[C]∥1st ACM Information Hiding and MultimediaSecurity Workshop.Montpellier,France,2013
[12] Filler T,Judas J,Fridrich J.Minimizing additive distortion in steganography using syndrome-trellis codes[J].IEEE Transactions on Information Forensics and Security,2011,6(3):920-935

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!