Investigation on Cost Assignment in Spatial Image Steganography

Relating the embedding cost in a distortion function to statistical detectability is an open vital problem in modern steganography. In this paper, we take one step forward by formulating the process of cost assignment into two phases: 1) determining a priority profile and 2) specifying a cost-value...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on information forensics and security 2014-08, Vol.9 (8), p.1264-1277
Hauptverfasser: Li, Bin, Tan, Shunquan, Wang, Ming, Huang, Jiwu
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1277
container_issue 8
container_start_page 1264
container_title IEEE transactions on information forensics and security
container_volume 9
creator Li, Bin
Tan, Shunquan
Wang, Ming
Huang, Jiwu
description Relating the embedding cost in a distortion function to statistical detectability is an open vital problem in modern steganography. In this paper, we take one step forward by formulating the process of cost assignment into two phases: 1) determining a priority profile and 2) specifying a cost-value distribution. We analytically show that the cost-value distribution determines the change rate of cover elements. Furthermore, when the cost-values are specified to follow a uniform distribution, the change rate has a linear relation with the payload, which is a rare property for content-adaptive steganography. In addition, we propose some rules for ranking the priority profile for spatial images. Following such rules, we propose a five-step cost assignment scheme. Previous steganographic schemes, such as HUGO, WOW, S-UNIWARD, and MG, can be integrated into our scheme. Experimental results demonstrate that the proposed scheme is capable of better resisting steganalysis equipped with high-dimensional rich model features.
doi_str_mv 10.1109/TIFS.2014.2326954
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_1546144921</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6822611</ieee_id><sourcerecordid>3378373661</sourcerecordid><originalsourceid>FETCH-LOGICAL-c356t-c19fdbc0c3bbd96e0940ab146a5be4746bea337c759569a282be699f02846ef63</originalsourceid><addsrcrecordid>eNpdkNFLwzAQxoMoOKd_gPhSEMGXzlySXpsnkeG0MPBh87mkWVo72nQmnbD_3syNPQgHd3C_7-PuI-QW6ASAyqdlPltMGAUxYZyhTMQZGUGSYIyUwflpBn5JrrxfUyoEYDYiz7n9MX5oajU0vY1CTXs_RC_eN7XtjB2ixkaLTdiqNso7VZtoMZha2b52avO1uyYXlWq9uTn2MfmcvS6n7_H84y2fvsxjzRMcYg2yWpWaal6WK4mGSkFVCQJVUhqRCiyN4jzVaSITlIplrDQoZUVZJtBUyMfk8eC7cf33NlxcdI3Xpm2VNf3WF-E_iZmENA3o_T903W-dDdcFSiAIIRkECg6Udr33zlTFxjWdcrsCaLGPtNhHWuwjLY6RBs3D0Vl5rdrKKasbfxKyDCXiH3d34BpjzGmNGWMIwH8BjU99_Q</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1546144921</pqid></control><display><type>article</type><title>Investigation on Cost Assignment in Spatial Image Steganography</title><source>IEEE Electronic Library (IEL)</source><creator>Li, Bin ; Tan, Shunquan ; Wang, Ming ; Huang, Jiwu</creator><creatorcontrib>Li, Bin ; Tan, Shunquan ; Wang, Ming ; Huang, Jiwu</creatorcontrib><description>Relating the embedding cost in a distortion function to statistical detectability is an open vital problem in modern steganography. In this paper, we take one step forward by formulating the process of cost assignment into two phases: 1) determining a priority profile and 2) specifying a cost-value distribution. We analytically show that the cost-value distribution determines the change rate of cover elements. Furthermore, when the cost-values are specified to follow a uniform distribution, the change rate has a linear relation with the payload, which is a rare property for content-adaptive steganography. In addition, we propose some rules for ranking the priority profile for spatial images. Following such rules, we propose a five-step cost assignment scheme. Previous steganographic schemes, such as HUGO, WOW, S-UNIWARD, and MG, can be integrated into our scheme. Experimental results demonstrate that the proposed scheme is capable of better resisting steganalysis equipped with high-dimensional rich model features.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2014.2326954</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York, NY: IEEE</publisher><subject>Additives ; Applied sciences ; Artificial intelligence ; Computer information security ; Computer science; control theory; systems ; Cryptography ; Distortion ; Educational institutions ; Encoding ; Exact sciences and technology ; Feature extraction ; Information, signal and communications theory ; Mathematical analysis ; Mathematical models ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Pattern recognition. Digital image processing. Computational geometry ; Payloads ; Priorities ; Security ; Signal and communications theory ; Software ; Steganography ; Telecommunications and information theory ; Vectors</subject><ispartof>IEEE transactions on information forensics and security, 2014-08, Vol.9 (8), p.1264-1277</ispartof><rights>2015 INIST-CNRS</rights><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Aug 2014</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c356t-c19fdbc0c3bbd96e0940ab146a5be4746bea337c759569a282be699f02846ef63</citedby><cites>FETCH-LOGICAL-c356t-c19fdbc0c3bbd96e0940ab146a5be4746bea337c759569a282be699f02846ef63</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6822611$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6822611$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=28696654$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Li, Bin</creatorcontrib><creatorcontrib>Tan, Shunquan</creatorcontrib><creatorcontrib>Wang, Ming</creatorcontrib><creatorcontrib>Huang, Jiwu</creatorcontrib><title>Investigation on Cost Assignment in Spatial Image Steganography</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>Relating the embedding cost in a distortion function to statistical detectability is an open vital problem in modern steganography. In this paper, we take one step forward by formulating the process of cost assignment into two phases: 1) determining a priority profile and 2) specifying a cost-value distribution. We analytically show that the cost-value distribution determines the change rate of cover elements. Furthermore, when the cost-values are specified to follow a uniform distribution, the change rate has a linear relation with the payload, which is a rare property for content-adaptive steganography. In addition, we propose some rules for ranking the priority profile for spatial images. Following such rules, we propose a five-step cost assignment scheme. Previous steganographic schemes, such as HUGO, WOW, S-UNIWARD, and MG, can be integrated into our scheme. Experimental results demonstrate that the proposed scheme is capable of better resisting steganalysis equipped with high-dimensional rich model features.</description><subject>Additives</subject><subject>Applied sciences</subject><subject>Artificial intelligence</subject><subject>Computer information security</subject><subject>Computer science; control theory; systems</subject><subject>Cryptography</subject><subject>Distortion</subject><subject>Educational institutions</subject><subject>Encoding</subject><subject>Exact sciences and technology</subject><subject>Feature extraction</subject><subject>Information, signal and communications theory</subject><subject>Mathematical analysis</subject><subject>Mathematical models</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Pattern recognition. Digital image processing. Computational geometry</subject><subject>Payloads</subject><subject>Priorities</subject><subject>Security</subject><subject>Signal and communications theory</subject><subject>Software</subject><subject>Steganography</subject><subject>Telecommunications and information theory</subject><subject>Vectors</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpdkNFLwzAQxoMoOKd_gPhSEMGXzlySXpsnkeG0MPBh87mkWVo72nQmnbD_3syNPQgHd3C_7-PuI-QW6ASAyqdlPltMGAUxYZyhTMQZGUGSYIyUwflpBn5JrrxfUyoEYDYiz7n9MX5oajU0vY1CTXs_RC_eN7XtjB2ixkaLTdiqNso7VZtoMZha2b52avO1uyYXlWq9uTn2MfmcvS6n7_H84y2fvsxjzRMcYg2yWpWaal6WK4mGSkFVCQJVUhqRCiyN4jzVaSITlIplrDQoZUVZJtBUyMfk8eC7cf33NlxcdI3Xpm2VNf3WF-E_iZmENA3o_T903W-dDdcFSiAIIRkECg6Udr33zlTFxjWdcrsCaLGPtNhHWuwjLY6RBs3D0Vl5rdrKKasbfxKyDCXiH3d34BpjzGmNGWMIwH8BjU99_Q</recordid><startdate>20140801</startdate><enddate>20140801</enddate><creator>Li, Bin</creator><creator>Tan, Shunquan</creator><creator>Wang, Ming</creator><creator>Huang, Jiwu</creator><general>IEEE</general><general>Institute of Electrical and Electronics Engineers</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope></search><sort><creationdate>20140801</creationdate><title>Investigation on Cost Assignment in Spatial Image Steganography</title><author>Li, Bin ; Tan, Shunquan ; Wang, Ming ; Huang, Jiwu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c356t-c19fdbc0c3bbd96e0940ab146a5be4746bea337c759569a282be699f02846ef63</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Additives</topic><topic>Applied sciences</topic><topic>Artificial intelligence</topic><topic>Computer information security</topic><topic>Computer science; control theory; systems</topic><topic>Cryptography</topic><topic>Distortion</topic><topic>Educational institutions</topic><topic>Encoding</topic><topic>Exact sciences and technology</topic><topic>Feature extraction</topic><topic>Information, signal and communications theory</topic><topic>Mathematical analysis</topic><topic>Mathematical models</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Pattern recognition. Digital image processing. Computational geometry</topic><topic>Payloads</topic><topic>Priorities</topic><topic>Security</topic><topic>Signal and communications theory</topic><topic>Software</topic><topic>Steganography</topic><topic>Telecommunications and information theory</topic><topic>Vectors</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Li, Bin</creatorcontrib><creatorcontrib>Tan, Shunquan</creatorcontrib><creatorcontrib>Wang, Ming</creatorcontrib><creatorcontrib>Huang, Jiwu</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>Pascal-Francis</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Li, Bin</au><au>Tan, Shunquan</au><au>Wang, Ming</au><au>Huang, Jiwu</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Investigation on Cost Assignment in Spatial Image Steganography</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2014-08-01</date><risdate>2014</risdate><volume>9</volume><issue>8</issue><spage>1264</spage><epage>1277</epage><pages>1264-1277</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>Relating the embedding cost in a distortion function to statistical detectability is an open vital problem in modern steganography. In this paper, we take one step forward by formulating the process of cost assignment into two phases: 1) determining a priority profile and 2) specifying a cost-value distribution. We analytically show that the cost-value distribution determines the change rate of cover elements. Furthermore, when the cost-values are specified to follow a uniform distribution, the change rate has a linear relation with the payload, which is a rare property for content-adaptive steganography. In addition, we propose some rules for ranking the priority profile for spatial images. Following such rules, we propose a five-step cost assignment scheme. Previous steganographic schemes, such as HUGO, WOW, S-UNIWARD, and MG, can be integrated into our scheme. Experimental results demonstrate that the proposed scheme is capable of better resisting steganalysis equipped with high-dimensional rich model features.</abstract><cop>New York, NY</cop><pub>IEEE</pub><doi>10.1109/TIFS.2014.2326954</doi><tpages>14</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1556-6013
ispartof IEEE transactions on information forensics and security, 2014-08, Vol.9 (8), p.1264-1277
issn 1556-6013
1556-6021
language eng
recordid cdi_proquest_journals_1546144921
source IEEE Electronic Library (IEL)
subjects Additives
Applied sciences
Artificial intelligence
Computer information security
Computer science
control theory
systems
Cryptography
Distortion
Educational institutions
Encoding
Exact sciences and technology
Feature extraction
Information, signal and communications theory
Mathematical analysis
Mathematical models
Memory and file management (including protection and security)
Memory organisation. Data processing
Pattern recognition. Digital image processing. Computational geometry
Payloads
Priorities
Security
Signal and communications theory
Software
Steganography
Telecommunications and information theory
Vectors
title Investigation on Cost Assignment in Spatial Image Steganography
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-01T00%3A46%3A02IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Investigation%20on%20Cost%20Assignment%20in%20Spatial%20Image%20Steganography&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Li,%20Bin&rft.date=2014-08-01&rft.volume=9&rft.issue=8&rft.spage=1264&rft.epage=1277&rft.pages=1264-1277&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2014.2326954&rft_dat=%3Cproquest_RIE%3E3378373661%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1546144921&rft_id=info:pmid/&rft_ieee_id=6822611&rfr_iscdi=true