1. 集美大学 计算机工程学院,福建 厦门 361021
2. 中国科学技术大学 网络空间安全学院,安徽 合肥 230026
3. 中国电子学会,北京 100000
[ "韩烨(1998—),女,集美大学硕士研究生,E-mail:[email protected];" ]
关晴骁(1984—),男,副教授,E-mail:[email protected]
[ "刘年生(1967—),男,教授,E-mail:[email protected];" ]
[ "陈和风(1982—),女,副教授,E-mail:[email protected];" ]
[ "张卫明(1976—),男,教授,E-mail:[email protected];" ]
[ "高岩(1983—),男,高级工程师,E-mail:[email protected]" ]
扫 描 看 全 文
韩烨, 关晴骁, 刘年生, 等. 一种基于局部曲率的空域图像隐写失真代价[J]. 西安电子科技大学学报, 2023,50(4):229-236.
韩烨, 关晴骁, 刘年生, 等. 一种基于局部曲率的空域图像隐写失真代价[J]. 西安电子科技大学学报, 2023,50(4):229-236. DOI: 10.19665/j.issn1001-2400.2023.04.022.
隐写术是一种隐蔽通信方法。随着人们越来越青睐于社交媒体的信息交流,以图片为载体的信息隐藏技术是当前研究的热点。在最小化嵌入失真的框架下,为了提高隐写术的安全性,定义良好的代价函数至关重要。针对该问题,提出了一种基于二阶差分构建Hessian矩阵计算局部二阶方向梯度残差计算空域自适应代价的方法。首先利用横向与纵向的二阶差分,以及四个方向的差分构建Hessian矩阵。对于各个方向的Hessian矩阵,计算特征值的绝对值作为残差,并采用多种方法在多个阶段融合残差与多方向代价。实验以SRM和MaxSRMd2作为特征,以及集成FLD分类器作为隐写分析方法来评估性能。实验对比了8种方法,且每种方法重复10次。实验数据表明,在相同的嵌入率下,使用提出的失真代价方案会表现出更高的样本检测错误率。提出的方法与当前主流的空域隐写代价Hill方法性能相近,在与Hill代价采用争议像素优先融合方法后,可进一步提升空域自适应隐写代价的安全性。
Steganography is an information hiding method.As people increasingly favor social media for information exchange,information hiding technology with images is a hot topic of current research.In the framework of minimizing embedding distortion,it is crucial to define a good cost function in order to improve the security of steganography.In this paper we propose a distortion scheme for spatial steganography,in which the Hessian matrix is constructed via the second order difference and is used for calculating the residual.First,we use the horizontal difference and vertical difference,and directional differences in 4 directions,to calculate Hessian matrices in 4 directions.For these Hessian matrices,we calculate absolute values of their eigenvalues as a residual.Along with cost values calculated from residuals,we merge them in two phases.In the experiment,we use two kinds of steganalysis feature sets,SRM and MaxSRMd2,respectively,to evaluate the performance of each distortion scheme.Moreover,an ensemble FLD classifier is adopted to map the steganalysis feature to the prediction results for each testing sample.The experimental result is compared to those of eight methods and each method is repeated ten times.Experimental data show that using the distortion cost scheme proposed in this paper exhibits a higher sample detection error rate at the same embedding rate.Experimental results show that the proposed method achieves a security performance comparable to that by the Hill.In addition,when our proposed method is fused with the Hill by the Controversial Pixel Prior (CPP) rule,its performance can be enhanced.
隐写术隐写分析加性失真代价函数失真函数
steganographysteganalysisadditive distortioncost functiondistortion function
刘瑞祯, 谭铁牛. 数字图像水印研究综述[J]. 通信学报, 2000, 8:39-48.
LIU Ruizhen, TAN Tieniu. A Review of Digital Image Watermarking Research[J]. Journal of Communications, 2000, 8:39-48.
周琳娜, 唐鑫, 吴正哲, 等. 优化块选择策略的高性能可逆信息隐藏算法[J]. 西安电子科技大学学报, 2023, 50(2):112-124.
ZHOU linna, TANG Xin, WU Zhengzhe, et al. High Performance Reversible Information Hiding Algorithm for Optimizing Block Selection Strategy[J]. Journal of Xidian University, 2023, 50 (2):112-124.
WESTFELD A. F5-a Steganographic Algorithm[C]// Internnational Workshop on Information Hiding.Heidelberg:Springer, 2001:289-302.
SCHÖNFELD D, WINKLER A. Embedding with Syndromecoding Based on BCH Codes[C]// Proceedings of the 8th Workshop on Multimedia and Security. New York: ACM, 2006:214-223.
FILLER T, JUDAS J, FRIDRICH J. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes[J]. IEEE Transactions on Information on Forensics and Security, 2011, 6(3):920-935. DOI:10.1109/TIFS.2011.2134094http://doi.org/10.1109/TIFS.2011.2134094http://ieeexplore.ieee.org/document/5740590/http://ieeexplore.ieee.org/document/5740590/
LI B, MING W, LI X, et al. A Strategy of Clustering Modification on Directions in Spatial Image Steganography[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(9):1905-1917. DOI:10.1109/TIFS.2015.2434600http://doi.org/10.1109/TIFS.2015.2434600http://ieeexplore.ieee.org/document/7109899/http://ieeexplore.ieee.org/document/7109899/
SU W, NI J, HU X, et al. Image Steganography with Symmetric Embedding Using Gaussian Markov Random Field Model[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2020, 31(3):1001-115 DOI:10.1109/TCSVT.76http://doi.org/10.1109/TCSVT.76https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=76https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=76
HU X, NI J, SHI Y. Efficient JPEG Steganography Using Domain Transformation of Embedding Entropy[J]. IEEE Signal Processing Letters, 2018, 25(6):773-777. DOI:10.1109/LSP.97http://doi.org/10.1109/LSP.97https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=97https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=97
FILLER T, FRIDRICH J. Gibbs Construction in Steganography[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(4):705-720. DOI:10.1109/TIFS.2010.2077629http://doi.org/10.1109/TIFS.2010.2077629http://ieeexplore.ieee.org/document/5580091/http://ieeexplore.ieee.org/document/5580091/
HOLUB V, FRIDRICH J. Designing Steganographic Distortion Using Directional Filters[C]// 2012 IEEE International Workshop on Information Forensics and Security(WIFS).Piscataway:IEEE, 2012:234-239.
HOLUB V, FRIDRICH J, DENEMARK T. Universal Distortion Function for Steganography in an ArbItrary Domain[J]. EURASIP Journal on Information Security, 2014, 2014(1):1-13. DOI:10.1186/1687-417X-2014-1http://doi.org/10.1186/1687-417X-2014-1
LI B, TAN S, WANG M, et al. Investigation on Cost Assignment in Spatial Image Steganography[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(8):1264-1277. DOI:10.1109/TIFS.2014.2326954http://doi.org/10.1109/TIFS.2014.2326954https://ieeexplore.ieee.org/document/6822611/https://ieeexplore.ieee.org/document/6822611/
SEDIGHI V, COGRANNE R, FRIDRICH J. Contentadaptive Steganography by Minimizing Statistical Detectability[J]. IEEE Transactions on Information Forensics and Security, 2015, 11(2):221-234.
ZHOU W, ZHANG W, YU N. A New Rule for Cost Reassignmentin Adaptive Steganography[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(11):2654-2667. DOI:10.1109/TIFS.2017.2718480http://doi.org/10.1109/TIFS.2017.2718480http://ieeexplore.ieee.org/document/7954658/http://ieeexplore.ieee.org/document/7954658/
FRIDRICH J, KODOVSKY J. Rich Models for Steganallysis of Digital Images[J]. IEEE Transactions on Information Forensics and Security 2012, 7(3):868-882. DOI:10.1109/TIFS.2012.2190402http://doi.org/10.1109/TIFS.2012.2190402http://ieeexplore.ieee.org/document/6197267/http://ieeexplore.ieee.org/document/6197267/
KODOVSKY J, FRIDRICH J, HOLUB V. Ensemble Classifiers for Steganalysis of Digital Media[J]. IEEE Transactions on Information Forensics and Security, 2011, 7(2):432-444. DOI:10.1109/TIFS.2011.2175919http://doi.org/10.1109/TIFS.2011.2175919http://ieeexplore.ieee.org/document/6081929/http://ieeexplore.ieee.org/document/6081929/
DENEMARK T, SEDIGHI V, HOLUB V, et al. Selectionchannel-Aware Rich Model for Steganalysis of Digital Images[C]// 2014 IEEE International Workshop on Information Forensics and Security (WIFS).Piscataway:IEEE, 2014:48-53.
BAS P, FILLER T, PEVNÝ T. “Break Our Steganographic System”:the Ins and Outs of Organizing BSS[C]// International Workshop on Information Hiding.Heidelberg:Springer, 2011:59-70.
0
浏览量
2
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构