Enhancing reliability and efficiency for real-time robust adaptive steganography using cyclic redundancy check codes

The development of multimedia and deep learning technology bring new challenges to steganography and steganalysis techniques. Meanwhile, robust steganography, as a class of new techniques aiming to solve the problem of covert communication under lossy channels, has become a new research hotspot in t...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of real-time image processing 2020-02, Vol.17 (1), p.115-123
Hauptverfasser: Zhang, Yi, Luo, Xiangyang, Zhu, Xiaodong, Li, Zhenyu, Bors, Adrian G.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 123
container_issue 1
container_start_page 115
container_title Journal of real-time image processing
container_volume 17
creator Zhang, Yi
Luo, Xiangyang
Zhu, Xiaodong
Li, Zhenyu
Bors, Adrian G.
description The development of multimedia and deep learning technology bring new challenges to steganography and steganalysis techniques. Meanwhile, robust steganography, as a class of new techniques aiming to solve the problem of covert communication under lossy channels, has become a new research hotspot in the field of information hiding. To improve the communication reliability and efficiency for current real-time robust steganography methods, a concatenated code, composed of Syndrome–Trellis codes (STC) and cyclic redundancy check (CRC) codes, is proposed in this paper. The enhanced robust adaptive steganography framework proposed is this paper is characterized by a strong error detection capability, high coding efficiency, and low embedding costs. On this basis, three adaptive steganographic methods resisting JPEG compression and detection are proposed. Then, the fault tolerance of the proposed steganography methods is analyzed using the residual model of JPEG compression, thus obtaining the appropriate coding parameters. Experimental results show that the proposed methods have a significantly stronger robustness against compression, and are more difficult to be detected by statistical based steganalytic methods.
doi_str_mv 10.1007/s11554-019-00905-7
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2918673984</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2918673984</sourcerecordid><originalsourceid>FETCH-LOGICAL-c363t-6e53670415361045ddf690fe471566d041b0f6b4bd7a13f5b55cad194847444d3</originalsourceid><addsrcrecordid>eNp9kMtKxDAUhosoOI6-gKuA62gyzaVdyjBeYMCNrkOaSydjJ61JKvTtzVjRnav_wH858BXFNUa3GCF-FzGmlECEa4hQjSjkJ8UCVwzDaoXr098bofPiIsY9Qoyzki6KtPE76ZXzLQimc7JxnUsTkF4DY61Tzng1AduHbMsOJncwIPTNGBOQWg7JfRoQk2ml79sgh90ExngcU5PqnMolPXotjxtqZ9Q7UL028bI4s7KL5upHl8Xbw-Z1_QS3L4_P6_stVCUrE2SGlowjgrNgRKjWltXIGsIxZUxno0GWNaTRXOLS0oZSJTWuSUU4IUSXy-Jm3h1C_zGamMS-H4PPL8WqzkR4WVckp1ZzSoU-xmCsGII7yDAJjMSRrpjpikxXfNMVPJfKuRRz2Lcm_E3_0_oCXBR-TQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2918673984</pqid></control><display><type>article</type><title>Enhancing reliability and efficiency for real-time robust adaptive steganography using cyclic redundancy check codes</title><source>SpringerNature Journals</source><source>ProQuest Central UK/Ireland</source><source>ProQuest Central</source><creator>Zhang, Yi ; Luo, Xiangyang ; Zhu, Xiaodong ; Li, Zhenyu ; Bors, Adrian G.</creator><creatorcontrib>Zhang, Yi ; Luo, Xiangyang ; Zhu, Xiaodong ; Li, Zhenyu ; Bors, Adrian G.</creatorcontrib><description>The development of multimedia and deep learning technology bring new challenges to steganography and steganalysis techniques. Meanwhile, robust steganography, as a class of new techniques aiming to solve the problem of covert communication under lossy channels, has become a new research hotspot in the field of information hiding. To improve the communication reliability and efficiency for current real-time robust steganography methods, a concatenated code, composed of Syndrome–Trellis codes (STC) and cyclic redundancy check (CRC) codes, is proposed in this paper. The enhanced robust adaptive steganography framework proposed is this paper is characterized by a strong error detection capability, high coding efficiency, and low embedding costs. On this basis, three adaptive steganographic methods resisting JPEG compression and detection are proposed. Then, the fault tolerance of the proposed steganography methods is analyzed using the residual model of JPEG compression, thus obtaining the appropriate coding parameters. Experimental results show that the proposed methods have a significantly stronger robustness against compression, and are more difficult to be detected by statistical based steganalytic methods.</description><identifier>ISSN: 1861-8200</identifier><identifier>EISSN: 1861-8219</identifier><identifier>DOI: 10.1007/s11554-019-00905-7</identifier><language>eng</language><publisher>Berlin/Heidelberg: Springer Berlin Heidelberg</publisher><subject>Algorithms ; Codes ; Coding ; Communication ; Computer Graphics ; Computer Science ; Costs ; Deep learning ; Efficiency ; Error correction &amp; detection ; Error detection ; Fault tolerance ; Image compression ; Image Processing and Computer Vision ; Multimedia ; Multimedia Information Systems ; Pattern Recognition ; Real time ; Redundancy ; Reliability ; Robustness ; Signal,Image and Speech Processing ; Special Issue Paper ; Steganography ; Trellis coding</subject><ispartof>Journal of real-time image processing, 2020-02, Vol.17 (1), p.115-123</ispartof><rights>Springer-Verlag GmbH Germany, part of Springer Nature 2019</rights><rights>Springer-Verlag GmbH Germany, part of Springer Nature 2019.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c363t-6e53670415361045ddf690fe471566d041b0f6b4bd7a13f5b55cad194847444d3</citedby><cites>FETCH-LOGICAL-c363t-6e53670415361045ddf690fe471566d041b0f6b4bd7a13f5b55cad194847444d3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11554-019-00905-7$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2918673984?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,780,784,21388,27924,27925,33744,41488,42557,43805,51319,64385,64389,72469</link.rule.ids></links><search><creatorcontrib>Zhang, Yi</creatorcontrib><creatorcontrib>Luo, Xiangyang</creatorcontrib><creatorcontrib>Zhu, Xiaodong</creatorcontrib><creatorcontrib>Li, Zhenyu</creatorcontrib><creatorcontrib>Bors, Adrian G.</creatorcontrib><title>Enhancing reliability and efficiency for real-time robust adaptive steganography using cyclic redundancy check codes</title><title>Journal of real-time image processing</title><addtitle>J Real-Time Image Proc</addtitle><description>The development of multimedia and deep learning technology bring new challenges to steganography and steganalysis techniques. Meanwhile, robust steganography, as a class of new techniques aiming to solve the problem of covert communication under lossy channels, has become a new research hotspot in the field of information hiding. To improve the communication reliability and efficiency for current real-time robust steganography methods, a concatenated code, composed of Syndrome–Trellis codes (STC) and cyclic redundancy check (CRC) codes, is proposed in this paper. The enhanced robust adaptive steganography framework proposed is this paper is characterized by a strong error detection capability, high coding efficiency, and low embedding costs. On this basis, three adaptive steganographic methods resisting JPEG compression and detection are proposed. Then, the fault tolerance of the proposed steganography methods is analyzed using the residual model of JPEG compression, thus obtaining the appropriate coding parameters. Experimental results show that the proposed methods have a significantly stronger robustness against compression, and are more difficult to be detected by statistical based steganalytic methods.</description><subject>Algorithms</subject><subject>Codes</subject><subject>Coding</subject><subject>Communication</subject><subject>Computer Graphics</subject><subject>Computer Science</subject><subject>Costs</subject><subject>Deep learning</subject><subject>Efficiency</subject><subject>Error correction &amp; detection</subject><subject>Error detection</subject><subject>Fault tolerance</subject><subject>Image compression</subject><subject>Image Processing and Computer Vision</subject><subject>Multimedia</subject><subject>Multimedia Information Systems</subject><subject>Pattern Recognition</subject><subject>Real time</subject><subject>Redundancy</subject><subject>Reliability</subject><subject>Robustness</subject><subject>Signal,Image and Speech Processing</subject><subject>Special Issue Paper</subject><subject>Steganography</subject><subject>Trellis coding</subject><issn>1861-8200</issn><issn>1861-8219</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kMtKxDAUhosoOI6-gKuA62gyzaVdyjBeYMCNrkOaSydjJ61JKvTtzVjRnav_wH858BXFNUa3GCF-FzGmlECEa4hQjSjkJ8UCVwzDaoXr098bofPiIsY9Qoyzki6KtPE76ZXzLQimc7JxnUsTkF4DY61Tzng1AduHbMsOJncwIPTNGBOQWg7JfRoQk2ml79sgh90ExngcU5PqnMolPXotjxtqZ9Q7UL028bI4s7KL5upHl8Xbw-Z1_QS3L4_P6_stVCUrE2SGlowjgrNgRKjWltXIGsIxZUxno0GWNaTRXOLS0oZSJTWuSUU4IUSXy-Jm3h1C_zGamMS-H4PPL8WqzkR4WVckp1ZzSoU-xmCsGII7yDAJjMSRrpjpikxXfNMVPJfKuRRz2Lcm_E3_0_oCXBR-TQ</recordid><startdate>20200201</startdate><enddate>20200201</enddate><creator>Zhang, Yi</creator><creator>Luo, Xiangyang</creator><creator>Zhu, Xiaodong</creator><creator>Li, Zhenyu</creator><creator>Bors, Adrian G.</creator><general>Springer Berlin Heidelberg</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope></search><sort><creationdate>20200201</creationdate><title>Enhancing reliability and efficiency for real-time robust adaptive steganography using cyclic redundancy check codes</title><author>Zhang, Yi ; Luo, Xiangyang ; Zhu, Xiaodong ; Li, Zhenyu ; Bors, Adrian G.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c363t-6e53670415361045ddf690fe471566d041b0f6b4bd7a13f5b55cad194847444d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Algorithms</topic><topic>Codes</topic><topic>Coding</topic><topic>Communication</topic><topic>Computer Graphics</topic><topic>Computer Science</topic><topic>Costs</topic><topic>Deep learning</topic><topic>Efficiency</topic><topic>Error correction &amp; detection</topic><topic>Error detection</topic><topic>Fault tolerance</topic><topic>Image compression</topic><topic>Image Processing and Computer Vision</topic><topic>Multimedia</topic><topic>Multimedia Information Systems</topic><topic>Pattern Recognition</topic><topic>Real time</topic><topic>Redundancy</topic><topic>Reliability</topic><topic>Robustness</topic><topic>Signal,Image and Speech Processing</topic><topic>Special Issue Paper</topic><topic>Steganography</topic><topic>Trellis coding</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zhang, Yi</creatorcontrib><creatorcontrib>Luo, Xiangyang</creatorcontrib><creatorcontrib>Zhu, Xiaodong</creatorcontrib><creatorcontrib>Li, Zhenyu</creatorcontrib><creatorcontrib>Bors, Adrian G.</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Journal of real-time image processing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Zhang, Yi</au><au>Luo, Xiangyang</au><au>Zhu, Xiaodong</au><au>Li, Zhenyu</au><au>Bors, Adrian G.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Enhancing reliability and efficiency for real-time robust adaptive steganography using cyclic redundancy check codes</atitle><jtitle>Journal of real-time image processing</jtitle><stitle>J Real-Time Image Proc</stitle><date>2020-02-01</date><risdate>2020</risdate><volume>17</volume><issue>1</issue><spage>115</spage><epage>123</epage><pages>115-123</pages><issn>1861-8200</issn><eissn>1861-8219</eissn><abstract>The development of multimedia and deep learning technology bring new challenges to steganography and steganalysis techniques. Meanwhile, robust steganography, as a class of new techniques aiming to solve the problem of covert communication under lossy channels, has become a new research hotspot in the field of information hiding. To improve the communication reliability and efficiency for current real-time robust steganography methods, a concatenated code, composed of Syndrome–Trellis codes (STC) and cyclic redundancy check (CRC) codes, is proposed in this paper. The enhanced robust adaptive steganography framework proposed is this paper is characterized by a strong error detection capability, high coding efficiency, and low embedding costs. On this basis, three adaptive steganographic methods resisting JPEG compression and detection are proposed. Then, the fault tolerance of the proposed steganography methods is analyzed using the residual model of JPEG compression, thus obtaining the appropriate coding parameters. Experimental results show that the proposed methods have a significantly stronger robustness against compression, and are more difficult to be detected by statistical based steganalytic methods.</abstract><cop>Berlin/Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/s11554-019-00905-7</doi><tpages>9</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1861-8200
ispartof Journal of real-time image processing, 2020-02, Vol.17 (1), p.115-123
issn 1861-8200
1861-8219
language eng
recordid cdi_proquest_journals_2918673984
source SpringerNature Journals; ProQuest Central UK/Ireland; ProQuest Central
subjects Algorithms
Codes
Coding
Communication
Computer Graphics
Computer Science
Costs
Deep learning
Efficiency
Error correction & detection
Error detection
Fault tolerance
Image compression
Image Processing and Computer Vision
Multimedia
Multimedia Information Systems
Pattern Recognition
Real time
Redundancy
Reliability
Robustness
Signal,Image and Speech Processing
Special Issue Paper
Steganography
Trellis coding
title Enhancing reliability and efficiency for real-time robust adaptive steganography using cyclic redundancy check codes
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-20T10%3A13%3A39IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Enhancing%20reliability%20and%20efficiency%20for%20real-time%20robust%20adaptive%20steganography%20using%20cyclic%20redundancy%20check%20codes&rft.jtitle=Journal%20of%20real-time%20image%20processing&rft.au=Zhang,%20Yi&rft.date=2020-02-01&rft.volume=17&rft.issue=1&rft.spage=115&rft.epage=123&rft.pages=115-123&rft.issn=1861-8200&rft.eissn=1861-8219&rft_id=info:doi/10.1007/s11554-019-00905-7&rft_dat=%3Cproquest_cross%3E2918673984%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2918673984&rft_id=info:pmid/&rfr_iscdi=true