计算机科学 ›› 2024, Vol. 51 ›› Issue (5): 321-330.doi: 10.11896/jsjkx.231000036
张静涵, 陈文
ZHANG Jinghan, CHEN Wen
摘要: 现有的网络通信系统在传输图像时往往会对图像进行JPEG压缩以节约通信开销。然而,传统的图像隐写技术缺乏抗JPEG压缩的能力,系统对含密图像进行有损压缩后,容易导致秘密信息被破坏而无法被正确提取。因此,设计安全、鲁棒的图像隐写技术具有重要的实际应用价值。文中提出了一种抗JPEG压缩的自适应图像鲁棒隐写算法。首先,分析了JPEG压缩对载体图像造成的信息损失,确定了在JPEG压缩前后保持稳定的纹理特征作为秘密信息的鲁棒嵌入域。其次,以此为基础,提出了一种基于图像分块纹理特征自适应调整的秘密信息量化嵌入方法,将秘密信息嵌入到抗压缩变换能力较强的图像块纹理均值特征中。最后,利用错误反馈机制对生成的含密图像进行调整,直到秘密信息提取错误率达到期望值,最终生成抗JPEG压缩的鲁棒含密图像。在 BossBase1.01 图像库上进行对比实验,结果表明,文中提出的抗JPEG压缩鲁棒隐写方法在经过JPEG压缩后,具有较强的抗压缩性和抗检测性,并保持了较高的图像质量。相比传统最低位(least significant bit,LSB)隐写、基于Catalan变换的图像隐写(Catalan based Steganography,CBS)、基于神经网络的图像隐写FNNS(Fixed Neural NetworkSteganography)和基于自编码器的鲁棒图像隐写RoSteALS(Robust Steganography using Autoencoder Latent Space),所提算法有效地将JPEG压缩后含密图像信息提取的平均错误率分别降低了49.79%,49.73%,37.38%和38.85%,生成的含密图像视觉质量高于基于Catalan变换的图像隐写、FNNS隐写和RoSteALS隐写,并保持了较好的抗StegExpose隐写分析性能。
中图分类号:
[1]KODOVSKY J,FRIDRICH J,HOLUB V.Ensemble classifiersfor steganalysis ofdigital media[J].IEEE Transactions on Information Forensics and Security,2011,7(2):432-444. [2]QIN C,ZHANG W,CAO F,et al.Separable reversible data hi-ding in encrypted images via adaptive embedding strategy with block selection[J].Signal Processing,2018,153:109-122. [3]SONG X,LIU F,YANG C,et al.Steganalysis of adaptive JPEG steganography using 2D Gabor filters[C]//Proceedings of the 3rd ACM Workshop on Information hiding and Multimedia Security.2015:15-23. [4]HOLUB V,FRIDRICH J.Random projections of residuals fordigital image steganalysis[J].IEEE Transactions on Information Forensics and Security,2013,8(12):1996-2006. [5]BOROUMAND M,CHEN M,FRIDRICH J.Deep residual network for steganalysis of digital images[J].IEEE Transactions on Information Forensics and Security,2018,14(5):1181-1193. [6]VAISHNAVI D,SUBASHINI T S.Robust and invisible image watermarking in RGB color space using SVD[J].Procedia Computer Science,2015,46:1770-1777. [7]LIN S D,SHIE S C,GUO J Y.Improving the robustness of DCT-based image watermarking against JPEG compression[J].Computer Standards & Interfaces,2010,32(1/2):54-60. [8]PREDA R O,VIZIREANU D N.Watermarking-based image authentication robust to JPEG compression[J].Electronics Letters,2015,51(23):1873-1875. [9]JIA Z,FANG H,ZHANG W.Mbrs:Enhancing robustness ofdnn-based watermarking by mini-batch of real and simulated jpeg compression[C]//Proceedings of the 29th ACM International Conference on Multimedia.2021:41-49. [10]ZHANG Y,LUO X,YANG C,et al.A framework of adaptive steganography resisting JPEG compression and detection[J].Security and Communication Networks,2016,9(15):2957-2971. [11]ZHANG Y,ZHU X,QIN C,et al.Dither modulation basedadaptive steganography resisting JPEG compression and statistic detection[J].Multimedia Tools and Applications,2018,77:17913-17935. [12]ZHANG Y,LUO X,ZHU X,et al.Enhancing reliability and efficiency for real-time robust adaptive steganography using cyclic redundancy check codes[J].Journal of Real-Time Image Processing,2020,17:115-123. [13]YU X,CHEN K,WANG Y,et al.Robust adaptive steganography based on generalized dither modulation and expanded embedding domain[J].Signal Processing,2020,168:107343. [14]LI F,WU K,QIN C,et al.Anti-compression JPEG steganography overrepetitive compression networks[J].Signal Processing,2020,170:107454. [15]QIAO T,WANG S,LUO X,et al.Robust steganography resisting JPEG compression by improving selection of cover element[J].Signal Processing,2021,183:108048. [16]BAO Z,GUO Y,LI X,et al.A robust image steganographybased on the concatenated error correction encoder and discrete cosine transform coefficients[J].Journal of Ambient Intelligence and Humanized Computing,2020,11:1889-1901. [17]TAO J,LI S,ZHANG X,et al.Towards robust image steganography[J].IEEE Transactions on Circuits and Systems for Video Technology,2018,29(2):594-600. [18]ZHAO Z,GUAN Q,ZHANG H,et al.Improving the robustness of adaptive steganographic algorithms based on transport channel matching[J].IEEE Transactions on Information Forensics and Security,2018,14(7):1843-1856. [19]LU W,ZHANG J,ZHAO X,et al.Secure robust JPEG steganography based on autoencoder with adaptive BCH encoding[J].IEEE Transactions on Circuits and Systems for Video Technology,2020,31(7):2909-2922. [20]BALUJA S.Hiding images within images[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2019,42(7):1685-1697. [21]LU S P,WANG R,ZHONG T,et al.Large-capacity image steganography based on invertible neural networks[C]//Procee-dings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2021:10816-10825. [22]XU Y,MOU C,HU Y,et al.Robust invertible image steganography[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2022:7875-7884. [23]GUAN Z,JING J,DENG X,et al.DeepMIH:Deep invertible network for multiple image hiding[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2022,45(1):372-390. [24]LI Q,WANG X,MA B,et al.Image steganography based onstyle transfer and quaternion exponent moments[J].Applied Soft Computing,2021,110:107618. [25]HU D,WANG L,JIANG W,et al.A novel image steganography method via deep convolutional generative adversarial networks[J].IEEE Access,2018,6:38303-38314. [26]WEI P,LI S,ZHANG X,et al.Generative steganography network[C]//Proceedings of the 30th ACM International Confe-rence on Multimedia.2022:1621-1629. [27]LIU X,MA Z,MA J,et al.Image disentanglement autoencoder for steganography without embedding[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2022:2303-2312. [28]BAS P,FILLER T,PEVNY' T.“Break our steganographic system”:the ins and outs of organizing BOSS[C]//International Workshop on Information Hiding.Berlin,Heidelberg:Springer,2011:59-70. [29]TIWARI K,GANGURDE S J.LSB steganography using pixel locator sequence with AES[C]//2021 2nd International Confe-rence on Secure Cyber Computing and Communications(ICSCCC).IEEE,2021:302-307. [30]MUKHOPADHYAY S,HOSSAIN S,GHOSAL S K,et al.Secured image steganography based on Catalan transform[J].Multimedia Tools and Applications,2021,80:14495-14520. [31]KISHORE V,CHEN X,WANG Y,et al.Fixed neural network steganography:Train the images,not the network[C]//International Conference on Learning Representations.2021. [32]BUI T,AGARWAL S,YU N,et al.RoSteALS:Robust Stega-nography using Autoencoder Latent Space[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2023:933-942. [33]BOEHM B.Stegexpose-A tool for detecting LSB steganography[J].arXiv:1410.6656,2014. [34]FRIDRICH J,KODOVSKY J.Rich models for steganalysis of digital images[J].IEEE Transactions on information Forensics and Security,2012,7(3):868-882. [35]DUMITRESCU S,WU X,WANG Z.Detection of LSB stega-nography via sample pair analysis[C]//Information Hiding:5th International Workshop,IH 2002 Noordwijkerhout,The Netherlands,October 7-9,2002 Revised Papers 5.Berlin,Heidelberg:Springer,2003:355-372. [36]FRIDRICH J,GOLJAN M.Practical steganalysis of digital images:state of the art[J].Security and Watermarking of Multimedia Contents IV,2002,4675:1-13. [37]WESTFELD A.Detecting low embedding rates[C]//Interna-tionalWorkshop on Information Hiding.Berlin,Heidelberg:Springer,2002:324-339. [38]DUMITRESCU S,WU X,MEMON N.On steganalysis of random LSB embedding in continuous-tone images[C]//Procee-dings International Conference on Image Processing.IEEE,2002,3:641-644. [39]KODOVSKY J,FRIDRICH J,HOLUB V.Ensemble classifiers for steganalysis of digital media[J].IEEE Transactions on Information Forensics and Security,2011,7(2):432-444. |
|