Export file:

Format

  • RIS(for EndNote,Reference Manager,ProCite)
  • BibTex
  • Text

Content

  • Citation Only
  • Citation and Abstract

Steganography in beautified mages

The authors are with School of Communication and Information Engineering, Shanghai University, Shanghai, 200444, P. R. China.

Existing distortion functions in steganography which achieved high undetectability are designed for unprocessed natural image. Nowadays, a large number of images are filtered before transmitting for the sake of beautification. In this situation, existing distortion functions should be improved to fit the properties of these beautified images. This paper proposes a distortion function optimization method for steganography on beautified images. Given an unprocessed image, a popular image beautification software is employed to produce two similar beautified images. One of them is used for embedding and the other one is employed as reference. Guided by the reference, existing distortion functions are improved by distinguishing the embedding costs for ±1 embedding. After embedding, the stego image is closer to the reference, which results in a higher undetectability against steganalysis. Experimental results also proved the increasing of undetectability when examined by modern steganalytic tools.
  Figure/Table
  Supplementary
  Article Metrics

References

1. B. Li, S. Tan and M. Wang, et al., Investigation on cost assignment in spatial image steganography, IEEE. TIFS., 9 (2014), 1264–1277.

2. Y. Ma, X. Luo and X. Li, et al., Selection of rich model steganalysis features based on decision rough set α-Positive region reduction, IEEE. TCSVT., (2018), In press.

3. Y. Zhang, C. Qin and W. Zhang, et al., On the fault-tolerant performance for a class of robust image steganography, J. Sigpro., 146 (2018), 99–111.

4. S. Li and X. Zhang, Towards construction based data hiding: from secrets to fingerprint images, IEEE. TIP., 28 (2019), 1482–1497.

5. J.Frdrich and D. Soukal, Matrix embedding for large payloads, IEEE. TIFS., 1(2006), 390–395.

6. X. Zhang and S. Wang, Efficient steganographic embedding by exploiting modification direction, IEEE. LCOMM., 10 (2016), 781–783.

7. W. Zhang, X. Zhang and S. Wang, Maximizing steganographic embedding efficiency by combining hamming codes and wet paper codes, Proc. IH2008, Santa Barbara, CA, USA, (2008), 60–71.

8. T. Filler, J.Judas and J. Fridrich, Minimizing additive distortion in steganography using syndrome-trellis codes, IEEE. TIFS., 6 (2011), 920–935.

9. X. Luo, X. Song and X. Li, et al., Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes, MTAP., 75 (2016), 13557–13583.

10. T. Pevný, T. Filler and P. Bas, Using high-dimensional image models to perform highly undetectable steganography, Proc. IH2008, Calgary, Canada, (2010), 161–177.

11. V. Holub and J. Fridrich, Designing steganographic distortion using directional filters, Proc. IEEE. WIFS., Binghamton, NY, USA, (2012), 234–239.

12. B Li, M. Wang, and J. Huang, et al., A new cost function for spatial image steganography, Proc. IEEE. ICIP., Paris, France, (2014), 4206–4210.

13. V. Sedighi, J. Fridrich and R. Cogranne, Content-adaptive pentary steganography using the multivariate generalized gaussian cover model, Proc. SOP., San Francisco, California, USA, (2015), 94090H–94090H–13.

14. V. Holub and J. Fridrich, Digital image steganography using universal distortion, Proc. ACM IH&MMS., New York, NY, USA, (2013), 59–68.

15. L. J. Guo, J. Q. Ni and Y. Q. Shi, uniform embedding for efficient JPEG steganography, IEEE. TIFS., 9 (2014), 814–825.

16. L. J. Guo, J. Q. Ni and W. K. Su, et al., Using statistical image model for JPEG steganography: Uniform Embedding Revisited, IEEE. TIFS., 10 (2015), 2669–2680.

17. Z. Wang, X. Zhang and Z. Yin, Hybrid distortion function for JPEG steganography, JEI., 25 (2016), 050501.

18. Z. Wang, Z. Qian and X. Zhang, et al., On improving distortion functions for JPEG steganography, IEEE Access, 6 (2018), 74917–74930.

19. C. Qin, C. Chang and Y. Chiu, A novel joint data-hiding and compression scheme based on SMVQ and image inpainting, IEEE. TIP., 23 (2014), 969–978.

20. Z. Qian, H. Zhou and X. Zhang, et al., Separable reversible data hiding in encrypted JPEG bitstreams, IEEE. TDSC., 15 (2018), 1055–1067.

21. Z. Qian and X. Zhang, Reversible data hiding in encrypted image with distributed source encoding, IEEE. TCSVT., 26 (2016), 636–646.

22. Z. Qian, X. Zhang and S. Wang, Reversible data hiding in encrypted JPEG bitstream, IEEE. TMM., 16 (2014), 1486–1491.

23. C. Qin, W. Zhang and F. Cao, et al., Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection, J. Sigpro., 153 (2018), 09–122.

24. J. Deng, W. Dong and R. Socher, et al., ImageNet: A large-scale hierarchical image satabase, IEEE CVPR., (2009), 248–255.

25. Beautification softwares "BeautyCam", Meitu Company, Fujian, China, 2018, Available from: https://mt.meipai.com/.

26. Beautification softwares "CAMERA360", Chengdu Pinguo technology co. LTD, Chengdu, China, 2015, Available from: http://www.camera360.com/.

27. Beautification softwares "TianTianPiTu", Tencent Company, Shenzhen, China, 2014, Available from: https://tu.qq.com/.

28. P. Joshi, D. M. Esciriva and V. Godoy, Opencv By example, Penerbit Packt Publishing Ltd, (2016), 87–92.

29. Z. Wang, J. Lv and Q. Wei, et al., Distortion function for spatial image steganography based on the polarity of embedding change, Proc. IWDW., Beijing, China, (2016), 487–493.

30. V. Holub and J. Fridrich, Low complexity features for JPEG steganalysis using undecimated DCT, IEEE. TIFS.,10 (2014), 219–228.

31. J. Kodovsky, J. Fridrich and V. Holub, Ensemble classifiers for steganalysis of digital media, IEEE. TIFS., 7 (2012), 432–444.

32. J. Kodovsky and J. Fridrich, Steganalysis of JPEG images using rich models, Proc. ISOP., San Francisco, CA, USA, (2012), 83030A–83030A–13.

© 2019 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution Licese (http://creativecommons.org/licenses/by/4.0)

Download full text in PDF

Export Citation

Article outline

Show full outline
Copyright © AIMS Press All Rights Reserved