Model-based image steganography using asymmetric embedding scheme

Abstract. Recently, some steganographic schemes, which take into account the interaction among adjacent modifications, have emerged to tackle the issue of nonadditive embedding and exhibited higher security when compared with the original additive schemes. However, the performances of these schemes are volatile and very sensitive to both the heuristic parameters and the choice of initial additive distortion functions. We proposed a model-based steganographic scheme, which incorporates the adjacent embedding information without relying on any heuristic parameters. Following the spirit of prior arts, the proposed scheme divides the cover image into several interleaved sublattices and embeds messages on each sublattice sequentially. Adjacent modifications are utilized as a priori knowledge to optimize the asymmetric change probabilities of modifying each pixel by +1 and −1. Experimental results show that the proposed scheme can rival or outperform the prior arts and, moreover, maintains a stable security performance, irrespective of any initial additive distortion or any steganalysis detector.

[1]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[2]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[3]  Weiming Zhang,et al.  Decomposing Joint Distortion for Adaptive Steganography , 2017, IEEE Transactions on Circuits and Systems for Video Technology.

[4]  Jessica J. Fridrich,et al.  Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.

[5]  Jessica J. Fridrich,et al.  Improving Steganographic Security by Synchronizing the Selection Channel , 2015, IH&MMSec.

[6]  Jessica J. Fridrich,et al.  Gibbs Construction in Steganography , 2010, IEEE Transactions on Information Forensics and Security.

[7]  Jessica J. Fridrich,et al.  Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model , 2015, Electronic Imaging.

[8]  Bin Li,et al.  A Strategy of Clustering Modification Directions in Spatial Image Steganography , 2015, IEEE Transactions on Information Forensics and Security.

[9]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[10]  Bin Li,et al.  Investigation on Cost Assignment in Spatial Image Steganography , 2014, IEEE Transactions on Information Forensics and Security.

[11]  Toby Sharp,et al.  An Implementation of Key-Based Digital Signal Steganography , 2001, Information Hiding.

[12]  Jessica J. Fridrich,et al.  Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[13]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[14]  Jiangqun Ni,et al.  Efficient JPEG Steganography Using Domain Transformation of Embedding Entropy , 2018, IEEE Signal Processing Letters.

[15]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[16]  Jiangqun Ni,et al.  Deep Learning Hierarchical Representations for Image Steganalysis , 2017, IEEE Transactions on Information Forensics and Security.

[17]  Tomás Pevný,et al.  Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..

[18]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[19]  Lorenz T. Biegler,et al.  On the implementation of an interior-point filter line-search algorithm for large-scale nonlinear programming , 2006, Math. Program..

[20]  Bin Li,et al.  A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[21]  Jessica J. Fridrich,et al.  Multivariate gaussian model for designing additive distortion for steganography , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[22]  John R. Hershey,et al.  Approximating the Kullback Leibler Divergence Between Gaussian Mixture Models , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.