Effect of Cover Quantization on Steganographic Fisher Information

The square-root law of imperfect steganography ties the embedding change rate and the cover length with statistical detectability. In this paper, we extend the law to consider the effects of cover quantization. Assuming the individual cover elements are quantized i.i.d. samples drawn from an underlying continuous-valued “precover” distribution, the steganographic Fisher information scales as Δ”, where Δ is the quantization step and is determined jointly by the smoothness of the precover distribution and the properties of the embedding function. This extension is relevant for understanding the effects of the pixel color depth and the JPEG quality factor on the length of secure payload.

[1]  Jiwu Huang,et al.  New JPEG Steganographic Scheme with High Security Performance , 2010, IWDW.

[2]  Jessica Fridrich,et al.  Steganography in Digital Media: References , 2009 .

[3]  Tomás Pevný,et al.  The square root law of steganographic capacity , 2008, MM&Sec '08.

[4]  Andrew D. Ker Estimating Steganographic Fisher Information in Real Images , 2009, Information Hiding.

[5]  Wei Su,et al.  Steganalysis based on Markov Model of Thresholded Prediction-Error Image , 2006, 2006 IEEE International Conference on Multimedia and Expo.

[6]  Jessica J. Fridrich,et al.  Steganalysis of JPEG images using rich models , 2012, Other Conferences.

[7]  Ying Wang,et al.  Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions , 2007, IEEE Transactions on Information Theory.

[8]  Andrew D. Ker The ultimate steganalysis benchmark? , 2007, MM&Sec.

[9]  D. Hazarika,et al.  Comparison of Generalized Gaussian and Cauchy distributions in modeling of dyadic rearranged 2D DCT coefficients , 2012, 2012 3rd National Conference on Emerging Trends and Applications in Computer Science.

[10]  Rainer Böhme,et al.  A Game-Theoretic Approach to Content-Adaptive Steganography , 2012, Information Hiding.

[11]  Ross J. Anderson Stretching the Limits of Steganography , 1996, Information Hiding.

[12]  Andrew D. Ker A Fusion of Maximum Likelihood and Structural Steganalysis , 2007, Information Hiding.

[13]  Jessica J. Fridrich,et al.  The square root law of steganographic capacity for Markov covers , 2009, Electronic Imaging.

[14]  Andrew D. Ker A Capacity Result for Batch Steganography , 2007, IEEE Signal Processing Letters.

[15]  Rainer Böhme,et al.  Advanced Statistical Steganalysis , 2010, Information Security and Cryptography.

[16]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[17]  Jessica J. Fridrich,et al.  Optimizing pixel predictors for steganalysis , 2012, Other Conferences.

[18]  Jessica J. Fridrich,et al.  Fisher Information Determines Capacity of ε-Secure Steganography , 2009, Information Hiding.

[19]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[20]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[21]  Andrew D. Ker The Square Root Law in Stegosystems with Imperfect Information , 2010, Information Hiding.

[22]  Jessica J. Fridrich,et al.  Quantitative Structural Steganalysis of Jsteg , 2010, IEEE Transactions on Information Forensics and Security.

[23]  Jiangqun Ni,et al.  An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[24]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[26]  Tomás Pevný,et al.  Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..

[27]  Florent Retraint,et al.  Statistical Decision Methods in Hidden Information Detection , 2011, Information Hiding.

[28]  Ying Wang,et al.  Steganalysis of block-structured stegotext , 2004, IS&T/SPIE Electronic Imaging.

[29]  W. Marsden I and J , 2012 .

[30]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[31]  John B. Shoven,et al.  I , Edinburgh Medical and Surgical Journal.