Steganography in animated emoji using self-reference

Animated emoji is a kind of GIF image, which is widely used in online social networks (OSN) for its efficiency in transmitting vivid and personalized information. Aiming at realizing covert communication in animated emoji, this paper proposes an improved steganography framework in animated emoji. We propose a self-reference algorithm to improve the steganography security. Meanwhile, the relations between adjacent frames of the cover GIF image are considered to further improve the distortion function. After that we embed the secret message into the GIF image using the popular framework of Syndrome Trellis Coding (STC). Experimental results show that the proposed method can provide better security performances than state-of-the-art works.

[1]  Rinaldi Munir Chaos-based modified “EzStego” algorithm for improving security of message hiding in GIF image , 2015, 2015 International Conference on Computer, Control, Informatics and its Applications (IC3INA).

[2]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[3]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[4]  Yun Q. Shi,et al.  Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.

[5]  Jessica J. Fridrich,et al.  Model Based Steganography with Precover , 2017, Media Watermarking, Security, and Forensics.

[6]  Xinpeng Zhang,et al.  Robust Batch Steganography in Social Networks With Non-Uniform Payload and Data Decomposition , 2018, IEEE Access.

[7]  Jessica Fridrich,et al.  Steganography With Multiple JPEG Images of the Same Scene , 2017, IEEE Transactions on Information Forensics and Security.

[8]  Jessica J. Fridrich,et al.  Gibbs Construction in Steganography , 2010, IEEE Transactions on Information Forensics and Security.

[9]  Lei Zhang,et al.  Beyond a Gaussian Denoiser: Residual Learning of Deep CNN for Image Denoising , 2016, IEEE Transactions on Image Processing.

[10]  Bin Li,et al.  A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[11]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[12]  Rinaldi Munir Visual Cryptography of Animated GIF Image Based on XOR Operation , 2017, 2017 International Conference on Advanced Computing and Applications (ACOMP).

[13]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[14]  Rinaldi Munir,et al.  Message hiding in animated GIF using multibit assignment method , 2016, 2016 International Symposium on Electronics and Smart Devices (ISESD).

[15]  Jessica J. Fridrich,et al.  Digital image steganography using universal distortion , 2013, IH&MMSec '13.

[16]  Stefan Winkler,et al.  A vision-based masking model for spread-spectrum image watermarking , 2002, IEEE Trans. Image Process..

[17]  Xinpeng Zhang,et al.  Joint Cover-Selection and Payload-Allocation by Steganographic Distortion Optimization , 2018, IEEE Signal Processing Letters.

[18]  Yun Q. Shi,et al.  Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited , 2015, IEEE Transactions on Information Forensics and Security.

[19]  Tomás Pevný,et al.  Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..

[20]  Jessica J. Fridrich,et al.  Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT , 2015, IEEE Transactions on Information Forensics and Security.

[21]  Distortion Function for Emoji Image Steganography , 2019 .

[22]  S.G.K. Samaratunge New steganography technique for palette based images , 2007, 2007 International Conference on Industrial and Information Systems.

[23]  Zhenxing Qian,et al.  On Improving Distortion Functions for JPEG Steganography , 2018, IEEE Access.

[24]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[25]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[26]  Kousik Dasgupta,et al.  Steganography in Grey Scale Animated GIF using Hash based Pixel Value Differencing , 2018, 2018 Fourth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN).

[27]  Xinpeng Zhang,et al.  Distortion function based on residual blocks for JPEG steganography , 2017, Multimedia Tools and Applications.

[28]  Yi Zhang,et al.  Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters , 2015, IH&MMSec.

[29]  Jessica J. Fridrich,et al.  Side-informed steganography with additive distortion , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[30]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[31]  Rinaldi Munir Application of the modified EzStego algorithm for hiding secret messages in the animated GIF images , 2016, 2016 2nd International Conference on Science in Information Technology (ICSITech).