Abstract
Many contemporary steganographic schemes aim to embed fixed-length secret message in the cover while minimizing the stego distortion. However, in some cases, the secret message sender requires to embed a variable-length secret payload within his expected stego security. This kind of problem is named as secure payload estimation (SPE). In this paper, we propose a practical SPE approach for individual cover. The stego security metric we adopt here is the detection error rate of steganalyzer (P E ). Our method is based on a priori knowledge functions, which are two kinds of functions to be determined before the estimation. The first function is the relation function of detection error rate and stego distortion (P E − D function). The second function reflects the relationship between stego distortion and payload rate (D − α) of the chosen cover. The P E − D is the general knowledge, which is calculated from image library. On the other hand, D − α is for specific cover, which is needed to be determined on site. The estimating procedure is as follows: firstly, the sender solves the distortion D under his expected P E via P E − D, and then calculates the corresponding secure payload α via D − α of the cover. For on-site operations, the most time-consuming part is calculating D − α function for cover image, which costs 1 time of STC coding. Besides this, the rest on-site operations are solving single-variable formulas, which can be easily tackled. Our approach is an efficient and practical solution for SPE problem.
Similar content being viewed by others
References
Bas P, Filler T, Pevny T (2011) “Break our steganographic system”: the ins and outs of organizing BOSS. In: Proceedings of international workshop on information hiding, pp 59–70
Chen Y-H, Huang H-C, Lin C-C (2016) Block-based reversible data hiding with multi-round estimation and difference alteration. Multimedia Tools and Applications 75(21):13679–13704
Cheng C-J, Hwang W-J, Zeng H-Y, Lin Y-C (2014) A Fragile watermarking algorithm for hologram authentication. J Disp Technol 10(4):263–271
Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687
Denemark T, Sedighi V, Holub V, Fridrich J (2014) Selection-channel-aware rich model for steganalysis of digital images. In: Proceedings of 2014 IEEE international workshop on information forensics and security, pp 48–53
Filler T, Fridrich J (2010) Gibbs construction in steganography. IEEE Trans Inf Forensics Secur 5(4):705–720
Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inf Forensics Secur 6(3):920–935
Fridrich J, Filler T (2007) Practical methods for minimizing embedding impact in steganography. In: Proceedings of the 9th IS&T/SPIE electronic imaging, vol 6505, pp 01–15
Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensics Secur 7(3):868–882
Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: Proceedings of 2012 IEEE international workshop on information forensics and security, pp 234–239
Holub V, Fridrich J (2013) Digital image steganography using universal distortion. In: Proceedings of the 1st ACM workshop on information hiding and multimedia security, pp 59–68
Holub V, Fridrich J (2015) Low-complexity features for JPEG steganalysis using undecimated DCT. IEEE Trans Inf Forensics Secur 10(2):219–228
Huang H-C, Fang W-C (2011) Authenticity preservation with histogram-based reversible data hiding and quadtree concepts. Sensors 11(10):9717–9731
Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensics Secur 7(2):432–444
Li B, Wang M, Huang J, Li X (2014) A new cost function for spatial image steganography. In: Proceedings of 2014 IEEE international conference on image processing, pp 4206–4210
Pevny T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensics Secur 5(2):215–224
Pevny T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: Proceedings of the 12th international workshop on information hiding, vol 6387, pp 161–177
Provos N (2001) Defending against statistical steganalysis. In: Proceedings of usenix security symposium, vol 10, pp 323–336
Sallee P (2003) Model-based steganography. In: Proceedings of the 2nd international workshop on digital watermarking, pp 154–167
Sedighi V, Cogranne R, Fridrich J (2016) Content-adaptive steganography by minimizing statistical detectability. IEEE Trans Inf Forensics Secur 11(2):221–234
Song X, Liu F, Yang C, Luo X, Zhang Y (2015) Steganalysis of adaptive JPEG steganography using 2D Gabor filters. In: Proceedings of the 3rd ACM workshop on information hiding and multimedia security, pp 15–23
Wazirali R, Chaczko Z (2017) Anticipatory quality assessment metric for measuring data hiding imperceptibility. Journal of Information Hiding and Multimedia Signal Processing 8(2):404–412
Westfeld A (2001) F5-a steganographic algorithm high capacity despite better steganalysis. In: Proceedings of the 4th international workshop on information hiding, vol 2137, pp 289–302
Zhang L, Chen D, Cao Y, Zhao X (2015) A practical method to determine achievable rates for secure steganography. In: Proceedings of the 17th IEEE international conference on high performance computing and communications, the 7th IEEE international symposium on cyberspace safety and security, the 12th IEEE international conference on embedded software and systems, pp 1274–1281
Zhang Z-W, Wu L-F, Lai H-G, Li H-B, Zheng C-H (2016) Double reversible watermarking algorithm for image tamper detection. Journal of Information Hiding and Multimedia Signal Processing 7(3):530–542
Acknowledgements
Special thank to Prof. Jessica Fridrich. She pointed out that model of the work proposed in this paper can be named as PELS. The authors appreciate the members of DDE Laboratory in SUNY Binghamton for sharing their codes on the site: dde.binghamton.edu and the anonymous reviewers for their constructive suggestions for this paper.
Author information
Authors and Affiliations
Corresponding author
Additional information
This work was supported by the NSFC under U1636102 and U1536105, National Key Technology R&D Program under 2014BAH41B01 and 2016YFB0801003, and Strategic Priority Research Program of CAS under XDA06030600.
Rights and permissions
About this article
Cite this article
Ma, S., Zhao, X., Guan, Q. et al. A Priori knowledge based secure payload estimation. Multimed Tools Appl 77, 17889–17911 (2018). https://doi.org/10.1007/s11042-017-4955-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-4955-8