JPEG2000 Image Maximum Steganography Payload Based on MPUI Model
Author:
Affiliation:

  • Article
  • | |
  • Metrics
  • |
  • Reference [26]
  • |
  • Related [20]
  • |
  • Cited by [1]
  • | |
  • Comments
    Abstract:

    Steganography payload is one of the four key performance indicators for information hiding. Previous research on information hiding has mainly focused on the other three performance indicators, namely, the robustness, transparency and computational complexity, with very few work being carried out regarding to the steganography payload. This research aims to effectively improve the theoretical system of information hiding. According to the JPEG2000 compression standard and the human eye sensitivity of changing wavelet coefficients, along with the aid of distortion cost function, the study discriminates the wavelet coefficients' carrying capacity of secret information: The smaller the distortion cost function value, the stronger the wavelet coefficients' carrying capacity. Conversely, the larger distortion cost function value, the weaker the wavelet coefficients' carrying capacity. When the distortion cost function value is greater than one, the coefficient will not have enough capacity to carry information, i.e., wet coefficients. By means of the maximum steganography payload experiments along with the bit full embedding, over bits embedding and wet embedding experiments, the effectiveness of the proposed estimation method in this work is verified.

    Reference
    [1] Li S, Zhang XP, Wang SZ. Digital image steganography based on tolerable error range. Journal of Image and Graphics, 2007,12(2): 212-217 (in Chinese with English abstract).[doi: 10.11834/jig.20070205]
    [2] Bqhme R, Keiler C. A steganographic scheme for secure communications based on the chaos and the euler theorem. IEEE Trans. on Multimedia, 2004,9(6):1325-1329.[doi: 10.1109/TMM.2004.827493]
    [3] 沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述.中国科学(E集:信息科学),2007,37(2):129-150.[dio: 10.3969/j.issn.1674- 7259.2007.02.001]
    [4] Moulin P, O'Sullivan JA. Information-Theoretic analysis of information hiding. IEEE Trans. on Information Theory, 2003,49(3): 564-593.[doi: 10.1109/TIT.2002.808134]
    [5] Cohen A, Lapidoth A. The Gaussian watermarking game. IEEE Trans. on Information Theory, 2002,48(6):1639-1667.[doi: 10.1109/TIT.2002.1003844]
    [6] Somekh-Baruch A, Merhav N. On the capacity game of public watermarking system. IEEE Trans. on Information Theory, 2004, 50(3):511-524.[doi: 10.1109/TIT.2004.824920]
    [7] Sajedi H, Jamzad M. Secure steganography based on embedding capacity. Int'l Journal of Information Security, 2009,8(6):433-445.[doi: 10.1007/s10207-009-0089-y]
    [8] Cohen AS, Lapidoth A. The capacity of the vector Gaussian watermarking game. In: Lance C, ed. Proc. of the ISIT. Washington: Pérez, 2001. 24-29.[doi: 10.1109/ISIT.2001.935868]
    [9] Fabien A, Petitcolas P, Steinebach M, Raynal F, Dittman J, Fontaine C, Fates N. A public automated Web-based evaluation service for watermarking schemes: Stirmark benchmark. In: Wong PW, Delp EJ, eds. Proc. of the SPIE/IS&T Conf. on Security and Watermarking of Multimedia Contents, Vol.4314. San Jose, 2001. 575-584.[doi: 10.1117/12.435442]
    [10] Vorbruggen JC, Cayre F. The certimark benchmark: Architecture and future perspectives. In: Proc. of the IEEE Int'l Conf. on Multimedia and Expo, Vol.2. Lausanne, 2002. 485-488.[doi: 10.1109/ICME.2002.1035651]
    [11] Kim HC, Lin ET, Guitart O, Delp EJ. Further progress in watermark evaluation testbed (WET). In: Wong PW, Delp EJ, eds. Proc. of the SPIE Int'l Conf. on Security and Watermarking of Multimedia Contents, Vol.5681. 2005. 241-251.[doi: 10.1117/12. 593803]
    [12] Solachidis V, Tefas A, Nikolaidis N, Tsekeridou S, Nikolaidis A, Pitas P. A benchmarking protocol for watermarking methods. In: Proc. of the IEEE Int'l Conf. on Image Processing, Vol.3. Thessaloniki, 2001. 1023-1026.[doi: 10.1109/ICIP.2001.958300]
    [13] Mao JF, Zhang R, Niu XX, Yang YX, Zhou LN. Research of spatial domain image digital watermarking payload. EURASIP Journal on Information Security, 2011,5(1):1-12.[doi: 10.1155/2011/502748]
    [14] Niu XX, Yang YX. Study on the frame of information steganography and steganalysis. Acta Electronica Sinica, 2006,34(12A): 2421-2424 (in Chinese with English abstract).
    [15] Filler T, Judas J, Fridrich J. Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. on Information Forensics and Security, 2011,6(3):920-935.[doi: 10.1109/TIFS.2011.2134094]
    [16] Filler T, Judas J, Fridrich J. Gibbs construction in steganography. IEEE Trans. on Information Forensics and Security, 2010,5(4): 705-720.[doi: 10.1109/TIFS.2010.2077629]
    [17] Skodras A, Christopoulos C, Ebrahimi T. The JPEG2000 still image compression standard. IEEE Signal Processing Magazine, 2001,18(5):36-58.[doi: 10.1109/79.952804]
    [18] Pan F, Jun L, Li XG, Guo Y. Steganography based on minimizing embedding impact function and HVS. In: Proc. of the 2011 IEEE Int'l Conf. on Electronics, Communications and Control (ICECC). Ningbo, 2011. 490-493.[doi: 10.1109/ICECC.2011.6067565]
    [19] Komiya N, Miyazawa H, Takayama S, Ishikawa Y. Subjective assessment of quality of picture in synchronized carrier TV system. In: Proc. of the 1987 Int'l Symp. on Broadcasting Technology. 1987. 639-647.
    [20] Li DC. JPEG2000 image compression standard and applications of key algorithm. Image 湔捥散摨??湬景潧特洬愠琲椰漱渰?临攺琲眶漭爳欱椠渨杩?愠湃摨??灥灳汥椠捷慩瑴楨漠湅獮???びと????????????扢牲?孛?㈱嵝??牲楩摤牲楩捣桨????假敯癬湪??㈠????呯???潬搠潄瘮猠歗??????????卷瑥慴琠楰獡瑰楥捲愮氠汉祅?畅渠摔敲瑡敮捳琮愠扯汮攠??偧???猠瑐敲杯慣湥潳杳物慮灧栬礠?‰?攵愬搵″攨渱搰猩?″挹栲愳氭氳改渳朵攮獛??慩渺搠?漰瀮瀱漱爰琹甯湔楓瑐椮攲猰?‵?游?‵?椹琳瑝洼慢湲渾?????牂楡摲牮楩挠桍????敲摴獯??偮物漠捆??潐晩?瑡栠敁??瑉桭??????甠汷瑡楶浥敬摥楴愭?卡敳捥畤爠楷瑡祴?坲潭牡歲獫桩潮灧???慲汯汵慧獨???へづ????????孡摳潫楩??????????????????????????嵲?扣牥?孳??嵧?栠琲琰瀰???眰眨眵?猺挷椸攳渭挷改椱渮獛捤桯潩漺氠?漰爮朱?日????椮猹猱甸攵??睝攼扢?戾牛?嬳??嵌?奷慩湳朠?????坮敯湷杬??夠??圠慉湭条?卥???卭異湲??????搠慵灳瑩楮癧攠?摨慥琠愲?桄椠摷楡湶来?楥湴?整摲条敮?慦牯敲慭献?潉晅?楅洠慔杲敡獮?眮椠瑯桮?獉灭慡瑧楥愠汐??卣??摳潩浮慧椬渠?猹礹猲琬攱洨猴??????′吵爰愮湛獤??漺渠??渮昱漱爰洹愯琸椳漮渱″?漶爰攱湝猼楢捲猾?愲渴摝?卆敲捩畤牲楩瑣票??水?ぇ???????????????嬠摄漮椠???ぴ???づ??呱??卮??ぺち?????び??嵧?扮牯?孲??嵨??畷潩?奨??奥慴渠杰?奰塥???桯敤湥杳??婉??堠畐?婯????湦映潴牨浥愠瑁楃潍渠?摵楬獴杩畭楥獤楩湡朠?慥湣摵?桩楴摹椠湗杯?瑫敳捨桯湰椮焠畍敡?瑤潥?灵牲潧琺攠捎瑥?搠楙杯楲瑫愺氠?敃汍攬瘠愲琰椰漴渮?洴漭搱攵氮?摤慯瑩愺??到甮愱渱??椯愱渰′堲甴攳??愱漰??漴申爵湝愼汢?漾晛′匵潝映瑘睩愠牌攬???ので?????????????????椠湰??桥楲渠散獯敤?眠楢瑡桳??渠条汤楡獰桴?慶扥猠瑳牴慥捧瑡???桲瑡瑰灨???睮眠睉?橔漠獤?潭牡杩?挮渠??ふひの?????????????桲琭流孩摤潥楤???び????〦?橭潰猻ㄠ?は???嵴er Graphics, 2007,23(7):1217-1223 (in Chinese with English abstract).
    [26] Westfeld A. High capacity despite better steganalysis (F5—A steganographic algorithm). In: Moskowitz IS, ed. Proc. of the 4th Int'l Workshop Information Hiding. LNCS 2137, Pittsburgh, 2001. 289-302.[doi: 10.1007/3-540-45496-9_21]
    [27] Fridrich J, Goljan M, Soukal D. Perturbed quantization steganography. ACM Multimedia Systems, 2005,11(2):98-107.[doi: 10.1007/s00530-005-0194-3]
    [28] Solanki K, Sarkar A, Manjunath BS. YASS: Yet another steganographic scheme that resists blind steganalysis. In: Proc. of the 9th Int'l Workshop Information Hiding. Saint Malo, 2007. 16-31.[doi: 10.1007/978-3-540-77370-2_2]
    [29] Sallee P. Model-Based steganography. Digital Watermarking Lecture Notes in Computer Science, 2004,2939:154-167.[doi: 10.1007/978-3-540-24624-4_12]
    [30] Provos N. Defending against statistical steganalysis. In: Proc. of the 10th USENIX Security Symp. Washington, 2001. 323-326.[doi: 10.1145/103085.103089]
    [31] Almohammad A, Ghinea G, Hierous RM. JPEG steganography: A performance evaluation of quantization tables. In: Proc. of the Int'l Conf. on Adva
    Comments
    Comments
    分享到微博
    Submit
Get Citation

毛家发,钮心忻,杨义先,张娜娜,盛伟国.基于MPUI模型的JPEG2000图像最大隐写容量.软件学报,2014,25(7):1606-1620

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:March 17,2012
  • Revised:August 21,2013
  • Online: July 08,2014
You are the first2038026Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063