Skip to main content
Log in

A game-theoretic method for designing distortion function in spatial steganography

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Most modern secure image steganographic schemes define distortion functions for constraining the embedding changes to those parts of the image that are difficult to model such as textured or noisy regions. However, thus arguments disregard Kerckhoffs’ principle: the warden also knows the adaptivity criterion as well and may be able reproduce or estimate it. This paper proposes a new idea that the embedding distortion is designed based on game theory. We present a two-player zero-sum game between steganographer and attacker related to the security of practical steganography, and there exists a unique mixed strategy Nash equilibrium. The distortion function is first achieved from the original method S-UNIWARD (Spatial-UNIversal Wavelet Relative Distortion), and then we readjust the distortion function according to the above Nash equilibrium. The new distortion not only ensures the embedding changes focus on textured region but also correlates to the Kerckhoffs’ principle. Experiment results show that the statistical security of the proposed method is improved by approximately 6.2 % with the features of modern rich models.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Bas P, Filler T, Pevny T (2011) Break our steganographic system-the ins and outs of organizing boss. In: Proceedings of international workshop on information hiding, Springer, pp 59–70

  2. Böhme R (2009) An epistemological approach to steganography. In: Proceedings of international workshop on information hiding, Springer, pp 15–30

  3. Bohme R (2010) Advanced statistical steganalysis. Springer, Berlin

    Book  MATH  Google Scholar 

  4. Cayre F, Bas P (2008) Kerckhoffs-based embedding security classes for WOA data hiding. IEEE Trans Inf Forensic Secur 3(1):1–15

    Article  Google Scholar 

  5. Denemark T, Sedighi V, Holub V, Cogranne R, Fridrich J (2014) Selection-channel-aware rich model for steganalysis of digital images. In: Proceeding of IEEE international workshop on information forensics and security, pp 48–53

  6. Ettinger M (1998) Steganalysis and game equilibria. In: Proceedings of international workshop on information hiding, Springer, pp 319–328

  7. Filler T, Fridrich J (2010) Minimizing additive distortion functions with non-binary embedding operation in steganography. In: Proceedings of IEEE workshop on information forensics and security, pp 1–6

  8. Filler T, Ker AD, Fridrich J (2009) The square root law of steganographic capacity for markov covers. In: Proceedings of SPIE international society for optical engineering, media forensics and security, pp 08–18

  9. Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using Syndrome-Trellis Codes. IEEE Trans Inf Forensic Secur 6(3):920–935

    Article  Google Scholar 

  10. Fridrich J (2009) Steganography in digital media: principles, algorithms, and applications. Cambridge Univisity Press, Cambridge

    Book  MATH  Google Scholar 

  11. Fridrich J, Filler T (2007) Practical methods for minimizing embedding impact in steganography. In: Proceedings of electronic imaging, security, steganography, and watermarking of multimedia contents IX, pp 02–03

  12. Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensic Secur 7(3):868–882

    Article  Google Scholar 

  13. Fridrich J, Goljan M, Lisonek P, Soukal D (2005) Writing on wet paper. IEEE Trans Signal Process 53(10):3923–3935

    Article  MathSciNet  Google Scholar 

  14. Fridrich J, Golian M, Soukal D (2006) Wet paper codes with improved embedding efficiency. IEEE Trans Inf Forensic Secur 1(1):102–110

    Article  Google Scholar 

  15. Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: Proceedings of IEEE workshop on information forensic and security, pp 234–239

  16. Holub V, Fridrich J, Denemark T (2014) Universal distortion function for steganography in an arbitrary domain. Eurasip J Inf Secur 1:1–13

    Article  Google Scholar 

  17. Johnson B, Schottle P, Böhme R (2012) Where to hide the bits? In: Proceedings of international conference on decision and game theory for security, Springer, pp 1–17

  18. Ker AD (2007) Batch steganography and the threshold game. In: Proceedings of SPIE international society for optical engineering, media forensics and security, pp 0401–0413

  19. Kerckhoffs A (1883) La cryptographie militaire. J Sci Mil IX:5–38

    Google Scholar 

  20. Kodovsky J, Fridrich J, Holub V (2011) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensic Secur 7(2):432–444

    Article  Google Scholar 

  21. Li B, Wang M, Huang J, Li X (2014) A new cost function for spatial image steganography. In: Proceedings of IEEE international conference on image process, pp 4206–4210

  22. Liao X, Shu C (2015) Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J Vis Commun Image Represent 28(4):21–27

    Article  Google Scholar 

  23. Nash J (1951) Non-cooperative games. Ann Math 54:286–295

    Article  MathSciNet  MATH  Google Scholar 

  24. Niu K, Li J, Liu J, Yang XY (2015) Strategic adaptive steganography based on game theory model. J Xidian Univ 42(4):165–170

    Google Scholar 

  25. Pevný T, Bas P, Fridrich J (2010a) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensic Secur 5(2):215–224

    Article  Google Scholar 

  26. Pevný T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: Proceedings of international workshop on information hiding, Springer, pp 161–177

  27. Qin C, Chang C-C, Chiu Y-P (2014) A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Trans Image Process 23(3):969–978

    Article  MathSciNet  Google Scholar 

  28. Schoettle P, Laszka A, Johnson B, Grossklags J, Böhme R. (2013) A game-theoretic analysis of content-adaptive ste-ganography with independent embedding. In: Proceedings of European signal processing conference, pp 1–5

  29. Schottle P, Böhme R (2013) A game-theoretic approach to content-adaptive steganography. In: Proceedings of international conference on information hiding, Springe, pp.125-141

  30. Sedighi V, Fridrich J, Cogranne R (2015) Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model. In: Proceedings of SPIE media watermarking, security and forensics, pp 1–13

  31. Tang W, Li H, Luo W, Huang J (2014) Adaptive steganalysis against WOW embedding algorithm. In: Procedding of ACM workshop on information hiding and multimedia security, pp. 91–96

  32. Xia Z, Wang X, Sun X, Liu Q, Xiong N (2014a) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed Tools Appl 75(4):1947–1962

    Article  Google Scholar 

  33. Xia Z, Wang X, Sun X, Wang B (2014b) Steganalysis of least significant bit matching using multi-order differences. Secur Commun Netw 7(8):1283–1291

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China (Grant No. 61379152, No. 61402162), Hunan Provincial Natural Science Foundation of China (Grant No. 14JJ7024), and Specialized Research Fund for the Doctoral Program of Higher Education (Grant No. 20130161120004).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Jun Li or Xin Liao.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, J., Yang, X., Liao, X. et al. A game-theoretic method for designing distortion function in spatial steganography. Multimed Tools Appl 76, 12417–12431 (2017). https://doi.org/10.1007/s11042-016-3632-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3632-7

Keywords

Navigation