Skip to main content
Log in

A Priori knowledge based secure payload estimation

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Many contemporary steganographic schemes aim to embed fixed-length secret message in the cover while minimizing the stego distortion. However, in some cases, the secret message sender requires to embed a variable-length secret payload within his expected stego security. This kind of problem is named as secure payload estimation (SPE). In this paper, we propose a practical SPE approach for individual cover. The stego security metric we adopt here is the detection error rate of steganalyzer (P E ). Our method is based on a priori knowledge functions, which are two kinds of functions to be determined before the estimation. The first function is the relation function of detection error rate and stego distortion (P E D function). The second function reflects the relationship between stego distortion and payload rate (Dα) of the chosen cover. The P E D is the general knowledge, which is calculated from image library. On the other hand, Dα is for specific cover, which is needed to be determined on site. The estimating procedure is as follows: firstly, the sender solves the distortion D under his expected P E via P E D, and then calculates the corresponding secure payload α via Dα of the cover. For on-site operations, the most time-consuming part is calculating Dα function for cover image, which costs 1 time of STC coding. Besides this, the rest on-site operations are solving single-variable formulas, which can be easily tackled. Our approach is an efficient and practical solution for SPE problem.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Bas P, Filler T, Pevny T (2011) “Break our steganographic system”: the ins and outs of organizing BOSS. In: Proceedings of international workshop on information hiding, pp 59–70

  2. Chen Y-H, Huang H-C, Lin C-C (2016) Block-based reversible data hiding with multi-round estimation and difference alteration. Multimedia Tools and Applications 75(21):13679–13704

    Article  Google Scholar 

  3. Cheng C-J, Hwang W-J, Zeng H-Y, Lin Y-C (2014) A Fragile watermarking algorithm for hologram authentication. J Disp Technol 10(4):263–271

    Article  Google Scholar 

  4. Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687

    Article  Google Scholar 

  5. Denemark T, Sedighi V, Holub V, Fridrich J (2014) Selection-channel-aware rich model for steganalysis of digital images. In: Proceedings of 2014 IEEE international workshop on information forensics and security, pp 48–53

  6. Filler T, Fridrich J (2010) Gibbs construction in steganography. IEEE Trans Inf Forensics Secur 5(4):705–720

    Article  Google Scholar 

  7. Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inf Forensics Secur 6(3):920–935

    Article  Google Scholar 

  8. Fridrich J, Filler T (2007) Practical methods for minimizing embedding impact in steganography. In: Proceedings of the 9th IS&T/SPIE electronic imaging, vol 6505, pp 01–15

  9. Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensics Secur 7(3):868–882

    Article  Google Scholar 

  10. Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: Proceedings of 2012 IEEE international workshop on information forensics and security, pp 234–239

  11. Holub V, Fridrich J (2013) Digital image steganography using universal distortion. In: Proceedings of the 1st ACM workshop on information hiding and multimedia security, pp 59–68

  12. Holub V, Fridrich J (2015) Low-complexity features for JPEG steganalysis using undecimated DCT. IEEE Trans Inf Forensics Secur 10(2):219–228

    Article  Google Scholar 

  13. Huang H-C, Fang W-C (2011) Authenticity preservation with histogram-based reversible data hiding and quadtree concepts. Sensors 11(10):9717–9731

    Article  Google Scholar 

  14. Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensics Secur 7(2):432–444

    Article  Google Scholar 

  15. Li B, Wang M, Huang J, Li X (2014) A new cost function for spatial image steganography. In: Proceedings of 2014 IEEE international conference on image processing, pp 4206–4210

  16. Pevny T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensics Secur 5(2):215–224

    Article  Google Scholar 

  17. Pevny T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: Proceedings of the 12th international workshop on information hiding, vol 6387, pp 161–177

  18. Provos N (2001) Defending against statistical steganalysis. In: Proceedings of usenix security symposium, vol 10, pp 323–336

  19. Sallee P (2003) Model-based steganography. In: Proceedings of the 2nd international workshop on digital watermarking, pp 154–167

  20. Sedighi V, Cogranne R, Fridrich J (2016) Content-adaptive steganography by minimizing statistical detectability. IEEE Trans Inf Forensics Secur 11(2):221–234

    Article  Google Scholar 

  21. Song X, Liu F, Yang C, Luo X, Zhang Y (2015) Steganalysis of adaptive JPEG steganography using 2D Gabor filters. In: Proceedings of the 3rd ACM workshop on information hiding and multimedia security, pp 15–23

  22. Wazirali R, Chaczko Z (2017) Anticipatory quality assessment metric for measuring data hiding imperceptibility. Journal of Information Hiding and Multimedia Signal Processing 8(2):404–412

    Google Scholar 

  23. Westfeld A (2001) F5-a steganographic algorithm high capacity despite better steganalysis. In: Proceedings of the 4th international workshop on information hiding, vol 2137, pp 289–302

  24. Zhang L, Chen D, Cao Y, Zhao X (2015) A practical method to determine achievable rates for secure steganography. In: Proceedings of the 17th IEEE international conference on high performance computing and communications, the 7th IEEE international symposium on cyberspace safety and security, the 12th IEEE international conference on embedded software and systems, pp 1274–1281

  25. Zhang Z-W, Wu L-F, Lai H-G, Li H-B, Zheng C-H (2016) Double reversible watermarking algorithm for image tamper detection. Journal of Information Hiding and Multimedia Signal Processing 7(3):530–542

    Google Scholar 

Download references

Acknowledgements

Special thank to Prof. Jessica Fridrich. She pointed out that model of the work proposed in this paper can be named as PELS. The authors appreciate the members of DDE Laboratory in SUNY Binghamton for sharing their codes on the site: dde.binghamton.edu and the anonymous reviewers for their constructive suggestions for this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xianfeng Zhao.

Additional information

This work was supported by the NSFC under U1636102 and U1536105, National Key Technology R&D Program under 2014BAH41B01 and 2016YFB0801003, and Strategic Priority Research Program of CAS under XDA06030600.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ma, S., Zhao, X., Guan, Q. et al. A Priori knowledge based secure payload estimation. Multimed Tools Appl 77, 17889–17911 (2018). https://doi.org/10.1007/s11042-017-4955-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4955-8

Keywords

Navigation