差异聚类和误差纹理合成的生成式信息隐藏
Generation information hiding method combining difference clustering and error texture synthesis
- 2019年24卷第12期 页码:2126-2148
收稿:2019-01-04,
修回:2019-6-12,
录用:2019-6-19,
纸质出版:2019-12-16
DOI: 10.11834/jig.190008
移动端阅览

浏览全部资源
扫码关注微信
收稿:2019-01-04,
修回:2019-6-12,
录用:2019-6-19,
纸质出版:2019-12-16
移动端阅览
目的
2
搜索式无载体信息隐藏容量小、搜索量大,涉及大量载体密集传输;纹理构造式隐藏只能生成简单非自然纹理;纹理合成式隐藏存在固定映射以及编码、非编码小块的明显区别特征,且未考虑样本小块差异度和遭受攻击时的类别提取错误,抵抗攻击能力十分有限。针对以上问题,提出一种差异聚类和误差纹理合成的生成式信息隐藏。
方法
2
在嵌入时,通过差异均值聚类获取编码样本小块,结合多重映射将代表秘密信息的编码样本小块随机放置在空白图像上,按最小误差优先拼接策略生成含密纹理。在提取时,通过密钥截取样本小块,寻找最接近编码样本小块,并结合秘密信息MD5(message-digest algorithm 5)值和随机坐标来恢复秘密信息。
结果
2
所提方法与MD5值和密钥紧密绑定,密钥参数、MD5值以及样例图的改变都将导致秘密信息的提取误码率趋近于0.5。同现有方法相比,结合最小误差优先拼接策略,所提方法的像素累计差异更小,含密纹理视觉质量较好且对密钥极度敏感,以实验样本为例,当遭受质量因子为5070的JPEG压缩和5% 15%的椒盐噪声攻击时,秘密信息可完整提取。即使遭受25% 40%的椒盐噪声攻击,提取误码率低于7%。
结论
2
所提方法避免了固定映射和编码、非编码小块的区别特征,含密掩体视觉质量较好且具有较强的抗攻击能力。
Objective
2
Two typical methods of coverless information hiding are currently available. One is search-based coverless information hiding
which transmits secret information by querying a text or image containing secret information from a database
and the other is texture generation-based information hiding
which relays secret information by generating a stego texture similar to a given image texture. Search-based information hiding has a small embedding capacity and a large search space and involves the intensive transmission of numerous carriers. Although every isolated text or image in this method is a normal text or image without modification
the method is still suspicious because of the dense transmission of carriers. Texture generation-based information hiding can be further divided into texture construction and texture synthesis-based information hiding. Generating a real natural texture directly is challenging. In texture synthesis-based information hiding
apparent distinguishing features between coded and non-coded blocks and a fixed mapping relationship between secret information and coded blocks exist. The method has low security and disregards the difference degree among various coded blocks and category errors during attacks. To address these problems
this work proposes a generation information hiding method that combines difference clustering and minimum error texture synthesis.
Method
2
First
in the embedding process
sample blocks are randomly captured in the sample texture image by a key. Then
the mean square errors of the kernel regions between the sample blocks and the random key template are calculated. These errors are divided into several categories through a difference mean clustering strategy
in which the sample block closest to the cluster center position is selected as the coded sample block in each category. Second
a multiple mapping relationship is established to obtain the coded sample block number through secret information decimal numbers
the MD5 (message-digest algorithm 5) value of the secret information
random coordinates
and the coded sample blocks. Finally
the coded sample blocks that represent the secret information decimal numbers are placed randomly in a blank image. The nearest sample blocks are selected to cover the secret information and generate a stego texture image through minimum error priority stitching
where the splicing order is determined by the minimum difference among adjacent blocks. This strategy always selects the least difference error line for minimum difference splicing. In the extraction process
all stego blocks are truncated in the stego texture image by the key
and the same coded sample blocks are obtained by difference mean clustering through the given sample image. All of the closest coded block numbers corresponding to the truncated stego blocks are identified via a similarity comparison and used to recover the binary secret information by combining these block numbers with the secret information's MD5 value and random coordinates.
Result
2
The proposed method is tightly bound to the plaintext attribute of the secret information's MD5 value and the key. The method completely depends on the key
MD5 value
and sample texture image. Only the correct key
MD5 value
and sample texture image can completely recover secret information. Any change or changes in individual or multiple key variables and the texture sample image will result in errors. For example
the EBR (error bit rate) of the extracted secret information could approach 0.5
and half of the extracted secret information bits cannot be fetched with the maximum uncertainty. Through the minimum error priority
the proposed method has a smaller pixel cumulative difference on the minimum error line compared with existing methods
and the generated stego texture image has better visual quality and is extremely sensitive to the key. The visual quality of stego texture maps decreases whether in salt-and-pepper noise
graffiti
or JPEG compression. However
during high-intensity salt-and-pepper noise and large-scale graffiti attacks
most of the bits embedded into the secret information can be accurately extracted or even completely fetched. In the given experiment samples
the quality factors are set from 50 to 70 for JPEG compression attacks
the EBR of the recovered secret information is always 0
and the entire secret information is completely restored. For 5% to 15% salt-and-pepper noise attacks
the EBR of the recovered secret information is still 0
and the secret information can be completely fetched. Even under 25% to 40% high-intensity salt-and-pepper noise attacks
the EBR of the extracted secret information remains very low
that is
less than 7%. Thus
the proposed method has a strong attack tolerance to high-intensity salt-and-pepper noise and large-scale graffiti attacks. The method can also resist low-quality JPEG compression attacks.
Conclusion
2
The proposed method does not require many samples to build a large database. It avoids the retrieval of big data
and its computation cost is small. The proposed method only involves single carrier embedding
and its embedding capacity is high. It can produce high-quality texture to cover secret information. The introduced random key template and the established multiple mapping relationship between random coordinates and coded sample blocks avoid the fixed mapping relationship between secret information and coded sample blocks. The coded sample blocks have the largest inter-class difference because of sample difference mean clustering. Therefore
the proposed method has a robust recovery process that is entirely dependent on the key
and its security is high. The splicing order is determined according to the minimum difference among adjacent blocks
and the least difference error line that can cover the secret information with high quality is selected for splicing. Moreover
difference minimum error line splicing that can cover secret information with high quality is selected.
Chen X Y and Chen S. 2019. Text coverless information hiding based on compound and selection of words. Soft Computing, 23(15):6323-6330[DOI:10.1007/s00500-018-3286-7]
Chen X Y, Chen S and Wu Y L. 2017. Coverless information hiding method based on the Chinese character encoding. Journal of Internet Technology, 18(2):313-320[DOI:10.6138/JIT.2017.18.2.20160815]
Chen X Y, Sun H Y, Tobe Y, Zhou Z L and Sun X M. 2015. Coverless information hiding method based on the Chinese mathematical expression//Proceedings of the 1st International Conference on Cloud Computing and Security. Nanjing, China: Springer, 133-143[ DOI:10.1007/978-3-319-27051-7_12 http://dx.doi.org/10.1007/978-3-319-27051-7_12 ]
Efros A A and Freeman W T. 2001. Image quilting for texture synthesis and transfer//Proceeding of the 28th Annual Conference on Computer Graphics and Interactive Techniques. New York, NY, USA: ACM, 341-346[ DOI:10.1145/383259.383296 http://dx.doi.org/10.1145/383259.383296 ]
Lu S F, Jaffer A, Jin X G and Zhao H L. 2012. Mathematical marbling. IEEE Computer Graphics and Applications, 32(6):26-35[DOI:10.1109/mcg.2011.51]
Pan L, Qian Z X and Zhang X P. 2016. Steganography by constructing texture images. Journal of Applied Sciences, 34(5):625-632
潘琳, 钱振兴, 张新鹏. 2016.基于构造纹理图像的数字隐写.应用科学学报, 34(5):625-632)[DOI:10.3969/j.issn.0255-8297.2016.05.015]
Otori H and Kuriyama S. 2007. Data-embeddable texture synthesis//Proceedings of the 8th International Symposium on Smart Graphics. Kyoto, Japan: Springer, 146-157[DOI: 10.1007/978-3-540-73214-3_13 http://dx.doi.org/10.1007/978-3-540-73214-3_13 ]
Otori H and Kuriyama S. 2009. Texture synthesis for mobile data communications. IEEE Computer Graphics and Applications, 29(6):74-81[DOI:10.1109/MCG.2009.127]
Qian Z X, Pan L, Li S and Zhang X P. 2018. Steganography by constructing marbling texture//Proceedings of the 4th International Conference on Cloud Computing and Security. Haikou, China: Springer, 428-439[ DOI:10.1007/978-3-030-00015-8_37 http://dx.doi.org/10.1007/978-3-030-00015-8_37 ]
Qian Z X, Zhou H, Zhang W M and Zhang X P. 2016. Robust steganography using texture synthesis//Proceedings of the 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Kaohsiung, China: Springer, 25-33[ DOI:10.1007/978-3-319-50209-0_4 http://dx.doi.org/10.1007/978-3-319-50209-0_4 ]
Qin Z C, Li M and Wu B. 2017. Robust steganography via patch-based texture synthesis//Proceedings of the 9th International Conference on Internet Multimedia Computing and Service. Qingdao, China: Springer, 429-439[ DOI:10.1007/978-981-10-8530-7_42 http://dx.doi.org/10.1007/978-981-10-8530-7_42 ]
Xu J Y, Mao X Y, Jin X G, Jaffer A, Lu S F, Li L and Toyoura M. 2013. Stego-marbling-texture//Proceedings of 2013 International Conference on Computer-Aided Design and Computer Graphics. Guangzhou, China: IEEE, 236-243[ DOI:10.1109/CADGraphics.2013.38 http://dx.doi.org/10.1109/CADGraphics.2013.38 ]
Xu J Y, Mao X Y, Jin X G and Jaffer A. 2015. Hidden message in a deformation-based texture. The Visual Computer, 31(12):1653-1669[DOI:10.1007/s00371-014-1045-z]
Xia Z H and Li X. 2017. Coverless information hiding method based on LSB of the character's Unicode. Journal of Internet Technology, 18(6):1353-1360[DOI:10.6138/JIT.2017.18.6.20160815b]
Yuan C S, Xia Z H and Sun X M. 2017. Coverless image steganography based on SIFT and BOF. Journal of Internet Technology, 18(2):435-442[DOI:10.6138/JIT.2017.18.2.20160624c]
Zhou H, Chen K J, Zhang W M and Yu N H. 2017. Comments on "Steganography using reversible texture synthesis". IEEE Transactions on Image Processing, 26(4):1623-1625[DOI:10.1109/TIP.2017.2657886]
Zhou Z L, Cao Y and Sun X M. 2016a. Coverless information hiding based on Bag-of-Words model of image. Journal of Applied Sciences, 34(5):527-536
周志立, 曹燚, 孙星明. 2016.基于图像Bag-of-Words模型的无载体信息隐藏.应用科学学报, 34(5):527-536)[DOI:10.3969/j.issn.0255-8297.2016.05.005]
Zhou Z L, Mu Y, Yang C N and Zhao N S. 2016b. Coverless multi-keywords information hiding method based on text. International Journal of Security and Its Application, 10(9):309-320[DOI:10.14257/ijsia.2016.10.9.30]
Zhou Z L, Mu Y, Zhao N S, Jonathan W Q M and Yang C N. 2016c. Coverless information hiding method based on multi-keywords//Proceedings of the 2nd International Conference on Cloud Computing and Security. Nanjing, China: Springer, 39-47[ DOI:10.1007/978-3-319-48671-0_4 http://dx.doi.org/10.1007/978-3-319-48671-0_4 ]
Zhou Z L, Sun H Y, Harit R, Chen X Y and Sun X M. 2015. Coverless image steganography without embedding//Proceedings of the 1st International Conference on Cloud Computing and Security. Nanjing, China: Springer, 123-132[ DOI:10.1007/978-3-319-27051-7_11 http://dx.doi.org/10.1007/978-3-319-27051-7_11 ]
Wu K C and Wang C M. 2015. Steganography using reversible texture synthesis. IEEE Transactions on Image Processing, 24(1):130-139[DOI:10.1109/TIP.2014.2371246]
相关作者
相关机构
京公网安备11010802024621