Improved WOW Adaptive Image Steganography Method

Currently, the most secure adaptive image steganographic methods for spatial domain are to design cost functions to minimize embedding distortion. Wavelet Obtained Weights (WOW) is one of these methods, which can adaptively embed secret message into cover image according to textural complexity. In this paper, an improved WOW adaptive image steganography method is proposed. We apply a binary stochastic matrix to preprocess the cover image to generate a new image firstly, which helps to reduce the probability of locating embedding change positions by stego image. Then, three directional filters are used to weigh the embedding cost of each pixel in the new image and the syndrome-trellis codes are applied to minimize the distortion. Experimental results demonstrate that the proposed method achieves a better performance on resisting the state-of-the-art steganalysis over prior works.

[1]  Zhihua Xia,et al.  Fingerprint liveness detection using gradient-based texture features , 2016, Signal, Image and Video Processing.

[2]  Tomás Pevný,et al.  Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.

[3]  Jessica J. Fridrich,et al.  Minimizing the embedding impact in steganography , 2006, MM&Sec '06.

[4]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[5]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[6]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[7]  Zhihua Xia,et al.  A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.

[8]  Xingming Sun,et al.  Reversible watermarking method based on asymmetric-histogram shifting of prediction errors , 2013, J. Syst. Softw..

[9]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[10]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[11]  Bin Li,et al.  A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[12]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[13]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[14]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[15]  Bin Li,et al.  A Strategy of Clustering Modification Directions in Spatial Image Steganography , 2015, IEEE Transactions on Information Forensics and Security.

[16]  Xingming Sun,et al.  Effective and Efficient Image Copy Detection with Resistance to Arbitrary Rotation , 2016, IEICE Trans. Inf. Syst..

[17]  Huaiqing Wang,et al.  Cyber warfare: steganography vs. steganalysis , 2004, CACM.

[18]  Sai Ji,et al.  Towards efficient content-aware search over encrypted outsourced data in cloud , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[19]  Jiwu Huang,et al.  Adaptive steganalysis against WOW embedding algorithm , 2014, IH&MMSec '14.

[20]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[21]  Xingming Sun,et al.  Effective and Efficient Global Context Verification for Image Copy Detection , 2017, IEEE Transactions on Information Forensics and Security.

[22]  Xin Liao,et al.  Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels , 2015, J. Vis. Commun. Image Represent..

[23]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[24]  Wien Hong,et al.  Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique , 2013, Inf. Sci..

[25]  Xingming Sun,et al.  Fast Motion Estimation Based on Content Property for Low-Complexity H.265/HEVC Encoder , 2016, IEEE Transactions on Broadcasting.

[26]  Zhengquan Xu,et al.  A secure re‐encryption scheme for data services in a cloud computing environment , 2015, Concurr. Comput. Pract. Exp..