Enhancing reliability and efficiency for real-time robust adaptive steganography using cyclic redundancy check codes
The development of multimedia and deep learning technology bring new challenges to steganography and steganalysis techniques. Meanwhile, robust steganography, as a class of new techniques aiming to solve the problem of covert communication under lossy channels, has become a new research hotspot in t...
Gespeichert in:
Veröffentlicht in: | Journal of real-time image processing 2020-02, Vol.17 (1), p.115-123 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 123 |
---|---|
container_issue | 1 |
container_start_page | 115 |
container_title | Journal of real-time image processing |
container_volume | 17 |
creator | Zhang, Yi Luo, Xiangyang Zhu, Xiaodong Li, Zhenyu Bors, Adrian G. |
description | The development of multimedia and deep learning technology bring new challenges to steganography and steganalysis techniques. Meanwhile, robust steganography, as a class of new techniques aiming to solve the problem of covert communication under lossy channels, has become a new research hotspot in the field of information hiding. To improve the communication reliability and efficiency for current real-time robust steganography methods, a concatenated code, composed of Syndrome–Trellis codes (STC) and cyclic redundancy check (CRC) codes, is proposed in this paper. The enhanced robust adaptive steganography framework proposed is this paper is characterized by a strong error detection capability, high coding efficiency, and low embedding costs. On this basis, three adaptive steganographic methods resisting JPEG compression and detection are proposed. Then, the fault tolerance of the proposed steganography methods is analyzed using the residual model of JPEG compression, thus obtaining the appropriate coding parameters. Experimental results show that the proposed methods have a significantly stronger robustness against compression, and are more difficult to be detected by statistical based steganalytic methods. |
doi_str_mv | 10.1007/s11554-019-00905-7 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2918673984</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2918673984</sourcerecordid><originalsourceid>FETCH-LOGICAL-c363t-6e53670415361045ddf690fe471566d041b0f6b4bd7a13f5b55cad194847444d3</originalsourceid><addsrcrecordid>eNp9kMtKxDAUhosoOI6-gKuA62gyzaVdyjBeYMCNrkOaSydjJ61JKvTtzVjRnav_wH858BXFNUa3GCF-FzGmlECEa4hQjSjkJ8UCVwzDaoXr098bofPiIsY9Qoyzki6KtPE76ZXzLQimc7JxnUsTkF4DY61Tzng1AduHbMsOJncwIPTNGBOQWg7JfRoQk2ml79sgh90ExngcU5PqnMolPXotjxtqZ9Q7UL028bI4s7KL5upHl8Xbw-Z1_QS3L4_P6_stVCUrE2SGlowjgrNgRKjWltXIGsIxZUxno0GWNaTRXOLS0oZSJTWuSUU4IUSXy-Jm3h1C_zGamMS-H4PPL8WqzkR4WVckp1ZzSoU-xmCsGII7yDAJjMSRrpjpikxXfNMVPJfKuRRz2Lcm_E3_0_oCXBR-TQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2918673984</pqid></control><display><type>article</type><title>Enhancing reliability and efficiency for real-time robust adaptive steganography using cyclic redundancy check codes</title><source>SpringerNature Journals</source><source>ProQuest Central UK/Ireland</source><source>ProQuest Central</source><creator>Zhang, Yi ; Luo, Xiangyang ; Zhu, Xiaodong ; Li, Zhenyu ; Bors, Adrian G.</creator><creatorcontrib>Zhang, Yi ; Luo, Xiangyang ; Zhu, Xiaodong ; Li, Zhenyu ; Bors, Adrian G.</creatorcontrib><description>The development of multimedia and deep learning technology bring new challenges to steganography and steganalysis techniques. Meanwhile, robust steganography, as a class of new techniques aiming to solve the problem of covert communication under lossy channels, has become a new research hotspot in the field of information hiding. To improve the communication reliability and efficiency for current real-time robust steganography methods, a concatenated code, composed of Syndrome–Trellis codes (STC) and cyclic redundancy check (CRC) codes, is proposed in this paper. The enhanced robust adaptive steganography framework proposed is this paper is characterized by a strong error detection capability, high coding efficiency, and low embedding costs. On this basis, three adaptive steganographic methods resisting JPEG compression and detection are proposed. Then, the fault tolerance of the proposed steganography methods is analyzed using the residual model of JPEG compression, thus obtaining the appropriate coding parameters. Experimental results show that the proposed methods have a significantly stronger robustness against compression, and are more difficult to be detected by statistical based steganalytic methods.</description><identifier>ISSN: 1861-8200</identifier><identifier>EISSN: 1861-8219</identifier><identifier>DOI: 10.1007/s11554-019-00905-7</identifier><language>eng</language><publisher>Berlin/Heidelberg: Springer Berlin Heidelberg</publisher><subject>Algorithms ; Codes ; Coding ; Communication ; Computer Graphics ; Computer Science ; Costs ; Deep learning ; Efficiency ; Error correction & detection ; Error detection ; Fault tolerance ; Image compression ; Image Processing and Computer Vision ; Multimedia ; Multimedia Information Systems ; Pattern Recognition ; Real time ; Redundancy ; Reliability ; Robustness ; Signal,Image and Speech Processing ; Special Issue Paper ; Steganography ; Trellis coding</subject><ispartof>Journal of real-time image processing, 2020-02, Vol.17 (1), p.115-123</ispartof><rights>Springer-Verlag GmbH Germany, part of Springer Nature 2019</rights><rights>Springer-Verlag GmbH Germany, part of Springer Nature 2019.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c363t-6e53670415361045ddf690fe471566d041b0f6b4bd7a13f5b55cad194847444d3</citedby><cites>FETCH-LOGICAL-c363t-6e53670415361045ddf690fe471566d041b0f6b4bd7a13f5b55cad194847444d3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11554-019-00905-7$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2918673984?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,780,784,21388,27924,27925,33744,41488,42557,43805,51319,64385,64389,72469</link.rule.ids></links><search><creatorcontrib>Zhang, Yi</creatorcontrib><creatorcontrib>Luo, Xiangyang</creatorcontrib><creatorcontrib>Zhu, Xiaodong</creatorcontrib><creatorcontrib>Li, Zhenyu</creatorcontrib><creatorcontrib>Bors, Adrian G.</creatorcontrib><title>Enhancing reliability and efficiency for real-time robust adaptive steganography using cyclic redundancy check codes</title><title>Journal of real-time image processing</title><addtitle>J Real-Time Image Proc</addtitle><description>The development of multimedia and deep learning technology bring new challenges to steganography and steganalysis techniques. Meanwhile, robust steganography, as a class of new techniques aiming to solve the problem of covert communication under lossy channels, has become a new research hotspot in the field of information hiding. To improve the communication reliability and efficiency for current real-time robust steganography methods, a concatenated code, composed of Syndrome–Trellis codes (STC) and cyclic redundancy check (CRC) codes, is proposed in this paper. The enhanced robust adaptive steganography framework proposed is this paper is characterized by a strong error detection capability, high coding efficiency, and low embedding costs. On this basis, three adaptive steganographic methods resisting JPEG compression and detection are proposed. Then, the fault tolerance of the proposed steganography methods is analyzed using the residual model of JPEG compression, thus obtaining the appropriate coding parameters. Experimental results show that the proposed methods have a significantly stronger robustness against compression, and are more difficult to be detected by statistical based steganalytic methods.</description><subject>Algorithms</subject><subject>Codes</subject><subject>Coding</subject><subject>Communication</subject><subject>Computer Graphics</subject><subject>Computer Science</subject><subject>Costs</subject><subject>Deep learning</subject><subject>Efficiency</subject><subject>Error correction & detection</subject><subject>Error detection</subject><subject>Fault tolerance</subject><subject>Image compression</subject><subject>Image Processing and Computer Vision</subject><subject>Multimedia</subject><subject>Multimedia Information Systems</subject><subject>Pattern Recognition</subject><subject>Real time</subject><subject>Redundancy</subject><subject>Reliability</subject><subject>Robustness</subject><subject>Signal,Image and Speech Processing</subject><subject>Special Issue Paper</subject><subject>Steganography</subject><subject>Trellis coding</subject><issn>1861-8200</issn><issn>1861-8219</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kMtKxDAUhosoOI6-gKuA62gyzaVdyjBeYMCNrkOaSydjJ61JKvTtzVjRnav_wH858BXFNUa3GCF-FzGmlECEa4hQjSjkJ8UCVwzDaoXr098bofPiIsY9Qoyzki6KtPE76ZXzLQimc7JxnUsTkF4DY61Tzng1AduHbMsOJncwIPTNGBOQWg7JfRoQk2ml79sgh90ExngcU5PqnMolPXotjxtqZ9Q7UL028bI4s7KL5upHl8Xbw-Z1_QS3L4_P6_stVCUrE2SGlowjgrNgRKjWltXIGsIxZUxno0GWNaTRXOLS0oZSJTWuSUU4IUSXy-Jm3h1C_zGamMS-H4PPL8WqzkR4WVckp1ZzSoU-xmCsGII7yDAJjMSRrpjpikxXfNMVPJfKuRRz2Lcm_E3_0_oCXBR-TQ</recordid><startdate>20200201</startdate><enddate>20200201</enddate><creator>Zhang, Yi</creator><creator>Luo, Xiangyang</creator><creator>Zhu, Xiaodong</creator><creator>Li, Zhenyu</creator><creator>Bors, Adrian G.</creator><general>Springer Berlin Heidelberg</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope></search><sort><creationdate>20200201</creationdate><title>Enhancing reliability and efficiency for real-time robust adaptive steganography using cyclic redundancy check codes</title><author>Zhang, Yi ; Luo, Xiangyang ; Zhu, Xiaodong ; Li, Zhenyu ; Bors, Adrian G.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c363t-6e53670415361045ddf690fe471566d041b0f6b4bd7a13f5b55cad194847444d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Algorithms</topic><topic>Codes</topic><topic>Coding</topic><topic>Communication</topic><topic>Computer Graphics</topic><topic>Computer Science</topic><topic>Costs</topic><topic>Deep learning</topic><topic>Efficiency</topic><topic>Error correction & detection</topic><topic>Error detection</topic><topic>Fault tolerance</topic><topic>Image compression</topic><topic>Image Processing and Computer Vision</topic><topic>Multimedia</topic><topic>Multimedia Information Systems</topic><topic>Pattern Recognition</topic><topic>Real time</topic><topic>Redundancy</topic><topic>Reliability</topic><topic>Robustness</topic><topic>Signal,Image and Speech Processing</topic><topic>Special Issue Paper</topic><topic>Steganography</topic><topic>Trellis coding</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zhang, Yi</creatorcontrib><creatorcontrib>Luo, Xiangyang</creatorcontrib><creatorcontrib>Zhu, Xiaodong</creatorcontrib><creatorcontrib>Li, Zhenyu</creatorcontrib><creatorcontrib>Bors, Adrian G.</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Journal of real-time image processing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Zhang, Yi</au><au>Luo, Xiangyang</au><au>Zhu, Xiaodong</au><au>Li, Zhenyu</au><au>Bors, Adrian G.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Enhancing reliability and efficiency for real-time robust adaptive steganography using cyclic redundancy check codes</atitle><jtitle>Journal of real-time image processing</jtitle><stitle>J Real-Time Image Proc</stitle><date>2020-02-01</date><risdate>2020</risdate><volume>17</volume><issue>1</issue><spage>115</spage><epage>123</epage><pages>115-123</pages><issn>1861-8200</issn><eissn>1861-8219</eissn><abstract>The development of multimedia and deep learning technology bring new challenges to steganography and steganalysis techniques. Meanwhile, robust steganography, as a class of new techniques aiming to solve the problem of covert communication under lossy channels, has become a new research hotspot in the field of information hiding. To improve the communication reliability and efficiency for current real-time robust steganography methods, a concatenated code, composed of Syndrome–Trellis codes (STC) and cyclic redundancy check (CRC) codes, is proposed in this paper. The enhanced robust adaptive steganography framework proposed is this paper is characterized by a strong error detection capability, high coding efficiency, and low embedding costs. On this basis, three adaptive steganographic methods resisting JPEG compression and detection are proposed. Then, the fault tolerance of the proposed steganography methods is analyzed using the residual model of JPEG compression, thus obtaining the appropriate coding parameters. Experimental results show that the proposed methods have a significantly stronger robustness against compression, and are more difficult to be detected by statistical based steganalytic methods.</abstract><cop>Berlin/Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/s11554-019-00905-7</doi><tpages>9</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1861-8200 |
ispartof | Journal of real-time image processing, 2020-02, Vol.17 (1), p.115-123 |
issn | 1861-8200 1861-8219 |
language | eng |
recordid | cdi_proquest_journals_2918673984 |
source | SpringerNature Journals; ProQuest Central UK/Ireland; ProQuest Central |
subjects | Algorithms Codes Coding Communication Computer Graphics Computer Science Costs Deep learning Efficiency Error correction & detection Error detection Fault tolerance Image compression Image Processing and Computer Vision Multimedia Multimedia Information Systems Pattern Recognition Real time Redundancy Reliability Robustness Signal,Image and Speech Processing Special Issue Paper Steganography Trellis coding |
title | Enhancing reliability and efficiency for real-time robust adaptive steganography using cyclic redundancy check codes |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-20T10%3A13%3A39IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Enhancing%20reliability%20and%20efficiency%20for%20real-time%20robust%20adaptive%20steganography%20using%20cyclic%20redundancy%20check%20codes&rft.jtitle=Journal%20of%20real-time%20image%20processing&rft.au=Zhang,%20Yi&rft.date=2020-02-01&rft.volume=17&rft.issue=1&rft.spage=115&rft.epage=123&rft.pages=115-123&rft.issn=1861-8200&rft.eissn=1861-8219&rft_id=info:doi/10.1007/s11554-019-00905-7&rft_dat=%3Cproquest_cross%3E2918673984%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2918673984&rft_id=info:pmid/&rfr_iscdi=true |