Statistical Attack Resilient Data Hiding

In this paper, we propose a discrete cosine transform (DCT) based spread spectrum data-hiding algorithm that is resilient to statistical attacks. Unlike other spread spectrum based data-hiding algorithms, the proposed algorithm does not introduce a low-pass filtering effect in the histogram of the stego image. The distance between the center of gravity (CoG) as defined by [14] of the unmarked host and the stego images was reduced by 74% in the proposed algorithm. The proposed algorithm is also resilient against the Chi-Square attack and does not compromise on robustness or capacity to achieve this goal. When compared to the generic block based DCT data-hiding scheme, the proposed algorithm provides a 41% reduction in the relative entropy between the host and stego images. In other words, the proposed algorithm is 41% more secure than generic DCT based data-hiding algorithms when measured in terms of relative entropy. The proposed algorithm also provides statistical resilience against a steganalysis attack specifically designed for block DCT datahiding algorithms [29]. The proposed algorithm is robust against a variety of image manipulating attacks such as noise addition, filtering, blurring, sharpening, JPEG compression etc. In the cases of dislocating attacks such as blurring and despeckling, the bit error ratio (BER) was 0.1045 and 0.0435 respectively, thereby yielding retrieval rates of over 89% and 95% respectively. In the case of low quality JPEG attack (Q-30) the retrieval rate was 92%. In the case of noise addition attacks, the retrieval rates were more than 92%.

[1]  Abdulmotaleb El-Saddik,et al.  RST-invariant digital image watermarking based on log-polar mapping and phase correlation , 2003, IEEE Trans. Circuits Syst. Video Technol..

[2]  Miroslav Goljan,et al.  Steganalysis based on JPEG compatibility , 2001, SPIE ITCom.

[3]  Andreas Westfeld Detecting Low Embedding Rates , 2002, Information Hiding.

[4]  Joseph W. Goodman,et al.  A mathematical analysis of the DCT coefficient distributions for images , 2000, IEEE Trans. Image Process..

[5]  Chengyun Yang,et al.  Reversible data hiding based on wavelet spread spectrum , 2004, IEEE 6th Workshop on Multimedia Signal Processing, 2004..

[6]  Huaiqing Wang,et al.  Cyber warfare: steganography vs. steganalysis , 2004, CACM.

[7]  Fernando Pérez-González,et al.  DCT-domain watermarking techniques for still images: detector performance analysis and a new structure , 2000, IEEE Trans. Image Process..

[8]  Wilson W. L. Fung,et al.  Rotation, scaling, and translation-invariant multi-bit watermarking based on log-polar mapping and discrete Fourier transform , 2005, 2005 IEEE International Conference on Multimedia and Expo.

[9]  Thierry Pun,et al.  Asymmetric spread spectrum data-hiding for Laplacian host data , 2005, IEEE International Conference on Image Processing 2005.

[10]  Niels Provos,et al.  Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.

[11]  Terry A. Welch,et al.  A Technique for High-Performance Data Compression , 1984, Computer.

[12]  R. R. Clarke Transform coding of images , 1985 .

[13]  Jessica J. Fridrich,et al.  Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.

[14]  R. Clarke,et al.  Relation between the Karhunen Loève and cosine transforms , 1981 .

[15]  William A. Pearlman,et al.  Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.

[16]  Ingemar J. Cox,et al.  Rotation, scale, and translation resilient watermarking for images , 2001, IEEE Trans. Image Process..

[17]  R. Fisher THE USE OF MULTIPLE MEASUREMENTS IN TAXONOMIC PROBLEMS , 1936 .

[18]  Ning Liu,et al.  Statistically Secure Digital Image Data Hiding , 2005, 2005 IEEE 7th Workshop on Multimedia Signal Processing.

[19]  Sushil Jajodia,et al.  Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.

[20]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[21]  Ross Anderson,et al.  Information hiding terminology , 1996 .

[22]  Sung-Han Park,et al.  A robust video watermarking method , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[23]  S. Pholsomboon,et al.  Rotation, scale, and translation resilient digital watermarking based on complex exponential function , 2004, 2004 IEEE Region 10 Conference TENCON 2004..

[24]  Ying Wang,et al.  Steganalysis of block-DCT image steganography , 2003, IEEE Workshop on Statistical Signal Processing, 2003.

[25]  K. P. Subbalakshmi,et al.  Rotation and cropping resilient data hiding with Zernike moments , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[26]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[27]  K. Murali,et al.  Chaos based spread spectrum image steganography , 2004, IEEE Transactions on Consumer Electronics.

[28]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[29]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[30]  Athanassios N. Skodras,et al.  A subband DCT approach to image watermarking , 2000, 2000 10th European Signal Processing Conference.