Abstract
Hidden information behavior is becoming more difficult to be detected, causing illegal information spreading. To counter information hiding, more complex and high-dimensional steganalysis methods are applied, and have good detection for some specific information hiding algorithms. However, huge time consumption is needed and only suitable for offline usage with this method. In this paper, a destructive method with high quality and speed is proposed to counter information hiding. The experimental result presents that the extracting error rate of hiding information is around 50%, which means the method can destroy the possible covert communication completely. At the same time, the quality of covers after the destructive operation is good and the average time of operating an image is millisecond.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 234–239. IEEE (2012)
Filler, T., Fridrich, J.: Gibbs construction in steganography. IEEE Trans. Inf. Forensics Secur. 5(4), 705–720 (2010)
Holub, V., Fridrich, J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inf. Secur. 2014(1), 1 (2014)
Fridrich, J., Pevný, T., Kodovský, J.: Statistically undetectable jpeg steganography: dead ends challenges, and opportunities. In: Proceedings of the 9th Workshop on Multimedia & Security, pp. 3–14. ACM (2007)
Yan, X., Liu, X., Yang, C.N.: An enhanced threshold visual secret sharing based on random grids. J. Real-Time Image Process. 14(1), 61–73 (2018)
Denemark, T., Sedighi, V., Holub, V., Cogranne, R., Fridrich, J.: Selection-channel - aware rich model for steganalysis of digital images. In: 2014 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 48–53. IEEE (2014)
Huynh-Thu, Q., Ghanbari, M.: Scope of validity of PSNR in image/video quality assessment. Electron. Lett. 44(13), 800–801 (2008)
Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)
Qian, Z., Wang, Z., Zhang, X., Feng, G.: Breaking steganography: slight modification with distortion minimization. Int. J. Digit. Crime Forensics (IJDCF) 11(1), 114–125 (2019)
Acknowledgement
The authors would like to thank the anonymous reviewers for their valuable comments. This work is supported by the National Natural Science Foundation of China (Grant Number: 61602491).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Liu, F., Yan, X., Lu, Y. (2019). Destructive Method with High Quality and Speed to Counter Information Hiding. In: Cheng, X., Jing, W., Song, X., Lu, Z. (eds) Data Science. ICPCSEE 2019. Communications in Computer and Information Science, vol 1058. Springer, Singapore. https://doi.org/10.1007/978-981-15-0118-0_24
Download citation
DOI: https://doi.org/10.1007/978-981-15-0118-0_24
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0117-3
Online ISBN: 978-981-15-0118-0
eBook Packages: Computer ScienceComputer Science (R0)