Efficient cover image selection based on spatial block analysis and DCT embedding

In steganography, the cover medium is widely treated as a mere container for the embedded information, even though it affects the stego-image quality, security, and robustness. In addition, there is no consensus on the characteristics of a suitable cover image. In this work, we introduce and practically prove the most suitable cover image (MSCI) framework to automatically select a cover image for a given secret image. This paper proposes choosing the most suitable cover from a set of images based on two steps. First, a set of cover images is filtered based on relative entropy and a histogram in order to identify the most suitable candidates. Second, the local block pixel intensity features of the candidates are analyzed to select the most suitable cover image. Furthermore, cover image local blocks were optimized, using rotation and flipping, during the embedding process to further improve stego-image representation. The proposed framework demonstrated high visual image quality when compared with existing solutions. Steganalysis tests indicated that the proposed solution for cover selection provided an increased resistance to modern steganalyzers with up to 30% lowered detection rate, which improved security.

[1]  Hedieh Sajedi,et al.  Cover Selection Steganography Method Based on Similarity of Image Blocks , 2008, 2008 IEEE 8th International Conference on Computer and Information Technology Workshops.

[2]  Yi Zhang,et al.  Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters , 2015, IH&MMSec.

[3]  Tae-Sun Choi,et al.  Scene-based watermarking method for copy protection using image complexity and motion vector amplitude , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[4]  Tom Fawcett,et al.  An introduction to ROC analysis , 2006, Pattern Recognit. Lett..

[5]  Phalguni Gupta,et al.  Edge-based image steganography , 2014, EURASIP J. Inf. Secur..

[6]  Tomás Pevný,et al.  Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.

[7]  Fenlin Liu,et al.  Selecting Cover for Image Steganography by Correlation Coefficient , 2010, 2010 Second International Workshop on Education Technology and Computer Science.

[8]  Hedieh Sajedi,et al.  Secure steganography based on embedding capacity , 2009, International Journal of Information Security.

[9]  Kuo-Chen Wu,et al.  Steganography Using Reversible Texture Synthesis , 2015, IEEE Transactions on Image Processing.

[10]  Zhengping Wu,et al.  Highly secure image steganography algorithm using curvelet transform and DCT encryption , 2015, 2015 Long Island Systems, Applications and Technology.

[11]  N. Perkins,et al.  Optimal Cut-point and Its Corresponding Youden Index to Discriminate Individuals Using Pooled Blood Samples , 2005, Epidemiology.

[12]  Jessica J. Fridrich,et al.  Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT , 2015, IEEE Transactions on Information Forensics and Security.

[13]  Jessica J. Fridrich,et al.  Effect of saturated pixels on security of steganographic schemes for digital images , 2016, 2016 IEEE International Conference on Image Processing (ICIP).

[14]  Wei-Jen Wang,et al.  A New Adaptive Steganographic Method Based on Gradient Adjacent Prediction and Side-Match Vector Quantization , 2013, J. Inf. Hiding Multim. Signal Process..

[15]  Yang Ren-e Cover selection for image steganography based on image characteristics , 2014 .

[16]  Yongdong Zhang,et al.  A Fast Uyghur Text Detector for Complex Background Images , 2018, IEEE Transactions on Multimedia.

[17]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[18]  Fenlin Liu,et al.  A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between DCT Coefficients , 2015, 2015 10th International Conference on Availability, Reliability and Security.

[19]  Yun Q. Shi,et al.  JPEG image steganalysis utilizing both intrablock and interblock correlations , 2008, 2008 IEEE International Symposium on Circuits and Systems.

[20]  C. Ern Information hiding techniques for steganography and digital watermarking , 2018 .

[21]  Qionghai Dai,et al.  Cross-Modality Bridging and Knowledge Transferring for Image Understanding , 2019, IEEE Transactions on Multimedia.

[22]  Der-Chyuan Lou,et al.  A novel adaptive steganography based on local complexity and human vision sensitivity , 2010, J. Syst. Softw..

[23]  Manish Mahajan,et al.  Adaptive Steganography: A survey of Recent Statistical Aware Steganography Techniques , 2012 .

[24]  Weiwei Liu,et al.  Adaptive steganography based on block complexity and matrix embedding , 2013, Multimedia Systems.

[25]  Jiwu Huang,et al.  Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.

[26]  Nasir D. Memon,et al.  Cover Selection for Steganographic Embedding , 2006, 2006 International Conference on Image Processing.

[27]  Yongdong Zhang,et al.  STAT: Spatial-Temporal Attention Mechanism for Video Captioning , 2020, IEEE Transactions on Multimedia.

[28]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[29]  Yun Q. Shi,et al.  Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited , 2015, IEEE Transactions on Information Forensics and Security.

[30]  M. Jamzad,et al.  A robust steganography algorithm based on texture similarity using Gabor filter , 2005, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..

[31]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[32]  Jessica J. Fridrich,et al.  Steganography with two JPEGs of the same scene , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[33]  Xinpeng Zhang,et al.  Secure Cover Selection for Steganography , 2019, IEEE Access.

[34]  Mansour Jamzad,et al.  Achieving Higher Stability in Watermarking According to Image Complexity , 2006 .

[35]  Stephan Katzenbeisser,et al.  Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .

[36]  Yun Q. Shi,et al.  Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.