A Framework of Enhancing Image Steganography With Picture Quality Optimization and Anti-Steganalysis Based on Simulated Annealing Algorithm

Picture quality and statistical undetectability are two key issues related to steganography techniques. In this paper, we propose a closed-loop computing framework that iteratively searches proper modifications of pixels/coefficients to enhance a base steganographic scheme with optimized picture quality and higher anti-steganalysis capability. To achieve this goal, an anti-steganalysis tester and an embedding controller-based on the simulated annealing (SA) algorithm with a proper cost function-are incorporated into the processing loop to conduct the convergence of searches. The cost function integrates several performance indices, namely, the mean square error, the human visual system (HVS) deviation, and the differences in statistical features, and guides a proper direction of searches during SA optimization. Our proposed framework is suitable for the kind of steganographic schemes that spreads each message information into multiple pixels/coefficients. We have selected two base steganographic schemes for implementation to show the applicability of the proposed framework. Experiment results show that the base schemes can be enhanced with better performances in image PSNR (by more than 5.0 dB), file-size variation, and anti-steganalysis pass-rate (by about 10% ~ 86%, at middle to high embedding capacities).

[1]  Elke Franz,et al.  Adaptive steganography based on dithering , 2004, MM&Sec '04.

[2]  Siwei Lyu,et al.  Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.

[3]  Jessica Fridrich,et al.  Determining the stego algorithm for JPEG images , 2006 .

[4]  Frank Y. Shih,et al.  Genetic algorithm based methodology for breaking the steganalytic systems , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[5]  Nasir D. Memon,et al.  Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[6]  Zheng Zhang,et al.  Detection of block DCT-based steganography in gray-scale images , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..

[7]  Thomas S. Huang,et al.  An additive approach to transform-domain information hiding and optimum detection structure , 2001, IEEE Trans. Multim..

[8]  D. Janaki Ram,et al.  Parallel Simulated Annealing Algorithms , 1996, J. Parallel Distributed Comput..

[9]  Milan Sonka,et al.  Image Processing, Analysis and Machine Vision , 1993, Springer US.

[10]  Ying Wang,et al.  Optimized Feature Extraction for Learning-Based Image Steganalysis , 2007, IEEE Transactions on Information Forensics and Security.

[11]  Shih-Kun Huang,et al.  Cocktail Watermarking for Digital Image Protection , 2000, IEEE Trans. Multim..

[12]  Deli Yang,et al.  A New Steganalysis Approach Based on Both Complexity Estimate and Statistical Filter , 2002, IEEE Pacific Rim Conference on Multimedia.

[13]  Shih-Fu Chang,et al.  Watermarking capacity of digital images based on domain-specific masking effects , 2001, Proceedings International Conference on Information Technology: Coding and Computing.

[14]  Nasir D. Memon,et al.  PSTEG: steganographic embedding through patching [image steganography] , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[15]  Guo-Shiang Lin,et al.  A feature-based classification technique for blind image steganalysis , 2005, IEEE Transactions on Multimedia.

[16]  Shigeo Abe DrEng Pattern Classification , 2001, Springer London.

[17]  M. Barni,et al.  Data hiding for fighting piracy , 2004, IEEE Signal Processing Magazine.

[18]  Guo-Shiang Lin,et al.  Dual protection of JPEG images based on informed embedding and two-stage watermark extraction techniques , 2006, IEEE Transactions on Information Forensics and Security.

[19]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[20]  Tao Zhang,et al.  A fast and effective steganalytic technique against JSteg-like algorithms , 2003, SAC '03.

[21]  Rajarathnam Chandramouli,et al.  Mathematical approach to steganalysis , 2002, IS&T/SPIE Electronic Imaging.

[22]  Naokazu Yokoya,et al.  Data embedding into pictorial images with less distortion using discrete cosine transform , 1996, Proceedings of 13th International Conference on Pattern Recognition.

[23]  Deepa Kundur,et al.  Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain , 2006, IEEE Transactions on Information Forensics and Security.

[24]  Bin Li,et al.  Steganalysis of Multiple-Base Notational System Steganography , 2008, IEEE Signal Processing Letters.

[25]  Masaaki Fujiyoshi,et al.  Quantization-based image steganography without data hiding position memorization , 2005, 2005 IEEE International Symposium on Circuits and Systems.

[26]  Nasir D. Memon,et al.  Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..

[27]  Wilson S. Geisler,et al.  Image quality assessment based on a degradation model , 2000, IEEE Trans. Image Process..

[28]  Sang-Hui Park,et al.  Digital Watermarking For Copyright Protection Of Mpeg2 Compressed Video , 1998, International 1998 Conference on Consumer Electronics.

[29]  Jessica J. Fridrich,et al.  Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.

[30]  Gregory L. Heileman,et al.  Fast and robust watermarking of JPEG files , 2002, Proceedings Fifth IEEE Southwest Symposium on Image Analysis and Interpretation.

[31]  Ingemar J. Cox,et al.  Applying informed coding and embedding to design a robust high-capacity watermark , 2004, IEEE Transactions on Image Processing.

[32]  Andreas Westfeld,et al.  F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .

[33]  Albert J. Ahumada,et al.  Improved detection model for DCT coefficient quantization , 1993, Electronic Imaging.

[34]  Fernando Pérez-González,et al.  Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks , 2007, EURASIP J. Inf. Secur..

[35]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[36]  D. Levicky,et al.  Human Visual System Models in Digital Image Watermarking , 2004 .

[37]  Nasir D. Memon,et al.  A Distribution Detection Framework for Watermark Analysis , 2000 .

[38]  Min Wu,et al.  Data hiding in image and video .I. Fundamental issues and solutions , 2003, IEEE Trans. Image Process..

[39]  Qing Chen,et al.  Reliable image/video watermark retrieval in the presence of lossy compression , 2005, 2005 13th European Signal Processing Conference.

[40]  Der-Chyuan Lou,et al.  Adaptive digital watermarking using fuzzy logic techniques , 2002 .

[41]  Andrew D. Ker Steganalysis of Embedding in Two Least-Significant Bits , 2007, IEEE Transactions on Information Forensics and Security.

[42]  Ja-Ling Wu,et al.  Digital-Invisible-Ink Data Hiding Based on Spread-Spectrum and Quantization Techniques , 2008, IEEE Transactions on Multimedia.

[43]  Nasir D. Memon,et al.  Cover Selection for Steganographic Embedding , 2006, 2006 International Conference on Image Processing.

[44]  William A. Pearlman,et al.  Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.