期刊文献+

Fast Carrier Selection of JPEG Steganography Appropriate for Application

Fast Carrier Selection of JPEG Steganography Appropriate for Application
原文传递
导出
摘要 In recent years,the improvement of the security of steganography mainly involves not only carrier security but also distortion function.In the actual environment,the existing method of carrier selection is limited by its complex algorithm and slow running speed,making it not appropriate for rapid communication.This study proposes a method for selecting carriers and improving the security of steganography.JPEG images are decompressed to spatial domain.Then correlation coefficients between two adjacent pixels in the horizontal,vertical,counter diagonal,and major diagonal directions are calculated.The mean value of the four correlation coefficients is used to evaluate the security of each JPEG image.The images with low correlation coefficients are considered safe carriers and used for embedding in our scheme.The experimental results indicate that the stego images generated from the selected carriers exhibit a higher anti-steganalysis capability than those generated from the randomly selected carriers.Under the premise of the same security level,the images with low correlation coefficients have a high capacity.Our algorithm has a very fast running speed,and the running time of a 2048×2048 image is less than 1 s. In recent years,the improvement of the security of steganography mainly involves not only carrier security but also distortion function.In the actual environment,the existing method of carrier selection is limited by its complex algorithm and slow running speed,making it not appropriate for rapid communication.This study proposes a method for selecting carriers and improving the security of steganography.JPEG images are decompressed to spatial domain.Then correlation coefficients between two adjacent pixels in the horizontal,vertical,counter diagonal,and major diagonal directions are calculated.The mean value of the four correlation coefficients is used to evaluate the security of each JPEG image.The images with low correlation coefficients are considered safe carriers and used for embedding in our scheme.The experimental results indicate that the stego images generated from the selected carriers exhibit a higher anti-steganalysis capability than those generated from the randomly selected carriers.Under the premise of the same security level,the images with low correlation coefficients have a high capacity.Our algorithm has a very fast running speed,and the running time of a 2048×2048 image is less than 1 s.
出处 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2020年第5期614-624,共11页 清华大学学报(自然科学版(英文版)
基金 supported by the National Key Program of Natural Science Foundation of China(No.U1536204) the National Natural Science Foundation of China(Nos.U1836112,61876134,and 61872275)。
关键词 STEGANOGRAPHY STEGANALYSIS CARRIER JPEG correlation coefficients steganography steganalysis carrier JPEG correlation coefficients
  • 相关文献

参考文献2

二级参考文献11

  • 1Shirali-Shahreza M. Steganography in MMS. In. IEEE International Multitopic Conference (INMIC'07). Lahore, Pakistan, 2007. 1-4.
  • 2Wang Z H, Chang C C, Kieu T D, et al. Emoticon-based text steganography in chat. In. Asia-Pacific Conference on Computational Intelligence and Industrial Applications (PACIIA'09). Wuhan, China, 2009, 2. 457-460.
  • 3Wang H, Wang S. Cyber warfare. Steganography vs. ste- ganalysis. Communications of the ACM, 2004, 47(10). 76-82.
  • 4Wang Y, Moulin P. Perfectly secure steganography. Ca- pacity, error exponents, and code constructions. 1EEE Transactions on Information Theory, 2008, 54(6). 2706-2722.
  • 5Chand V, Orgun C O. Exploiting linguistic features in lexical steganography. Design and proof-of-concept im- plementation. In. Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06). New York, USA, 2006, 6. 126b.
  • 6Liu T Y, Tsai W H. A new steganographic method for data hiding in microsoft word documents by a change tracking technique. IEEE Transactions on Information Forensics and Security, 2010, 2(1). 24-30.
  • 7Khairullah M. A novel text steganography system using font color of the invisible characters in microsoft word documents. In. Second International Conference on Com- puter and Electrical Engineering (ICCEE'09). Dubai, UAE, 2009, 1. 482-484.
  • 8Liu Y L, Sun X M, Gan C, et al. An efficient linguistic steganography for Chinese text. In. IEEE International Conference on Multimedia and Expo. Beijing, China, 2007. 2094-2097.
  • 9Shirali-Shahreza M H, Shirali-Shahreza M. A new syno- nym text steganography. In. International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP'08). Harbin, China, 2008.1524-1526.
  • 10Langford J, Hopper N, von Ahn L. Provably secure steg- anography, extended abstract. In. Advances in Cryptology (CRYPTO'02). Santa Barbara, California, USA, 2002, 2442.119-123.

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部