无损载体和鲁棒代价结合的JPEG图像鲁棒隐写
Robust JPEG steganography based on lossless carrier and robust cost
- 2022年27卷第1期 页码:238-251
收稿日期:2021-06-07,
修回日期:2021-07-27,
录用日期:2021-8-3,
纸质出版日期:2022-01-16
DOI: 10.11834/jig.210406
移动端阅览
浏览全部资源
扫码关注微信
收稿日期:2021-06-07,
修回日期:2021-07-27,
录用日期:2021-8-3,
纸质出版日期:2022-01-16
移动端阅览
目的
2
传统隐写技术在实际社交网络信道上难以保护秘密信息的完整性。在社交网络中,图像往往经过有损压缩信道进行传输,从而导致隐蔽通信失效。为了保证经过压缩信道传输的载密图像鲁棒性,设计安全鲁棒的隐蔽通信技术具有实际应用价值。基于最小化图像信息损失,本文提出无损载体和鲁棒代价结合的JPEG图像鲁棒隐写。
方法
2
首先,指出构造无损载体能有效维持隐写安全性和鲁棒性的平衡,对经过压缩信道前后的JPEG图像空域像素块进行差分,构造无损载体以确定鲁棒嵌入域;其次,通过对离散余弦变换(discrete cosine transform,DCT)系数进行“±1”操作,并计算空域信息在压缩传输前后的损失,设计衡量DCT系数抗压缩性能的鲁棒代价;同时,验证在低质量因子压缩信道下鲁棒代价更能区分DCT系数的鲁棒能力,最后,利用校验子格编码(syndrome-trellis code
STC),结合无损载体和鲁棒代价对秘密信息进行嵌入。
结果
2
实验在BossBase1.01图像库上进行对比实验,相比于传统JPEG隐写技术,构造无损载体作为嵌入域能有效地将信息平均提取错误率降低24.97 %,图像的正确提取成功率提高了21.35 %;在此基础上,鲁棒代价进一步将信息平均提取错误率降低1.05 %,将图像的正确提取成功率提高16.12 %,验证了本文方法显著提高了隐写抗压缩性能。与J-UNIWARD (JPEG universal wavelet relative distortion)、JCRISBE (JPEG compression resistant solution with BCH code)和AutoEncoder (autoencoder and adaptive BCH encoding)3种现有典型隐写方法相比,提出的方法信息平均提取错误率分别降低了95.78 %、93.17 %和87.38 %,图像的正确提取成功率为另外3种隐写方法的86.69倍、30.74倍和4.13倍。图像视觉质量逼近传统隐写方法,并保持较好的抗检测性。
结论
2
本文提出的抗低质量因子JPEG压缩鲁棒隐写方法,获得的中间图像在经过压缩信道后,具有较强的抗压缩性和抗检测性,并保持较高的图像质量。
Objective
2
A huge amount of digital images are transmitted via new media online. In order to reduce the storage cost
initial digital images processing is conducted and
transmitted via the lossy compression channels. Based on original steganography scheme
it is often unable to extract the correct embedded secret messages from the transmitted compressed stego image completely when a stego image is transmitted via the lossy compression channel. The information loss leads to the failure of covert communication. The previous steganography method ignores the robustness performance
and the integrity of secret messages is difficult to be persistent. As an extension of branch of data hiding
some robust watermarking methods cannot ensure that the embedded watermark is extracted entirely. In order to achieve the robustness of the embedded watermark
the size of a watermark is often smaller than the size of secret messages in image steganography. In addition
the robust watermarking schemes ignore the anti-detection performance which decreases the statistical security in common. Hence
a secure and robust JPEG steganography technology is required in practice to ensure the robustness of the transmitted compressed stego images and protect the integrity of secret messages. A challenge to illustrate a robust steganography algorithm with strong anti-compression performance
strong anti-detection performance and high imperceptibility of stego images need to be dealt with. To minimize the loss of image information
a robust steganography algorithm for JPEG image based on the lossless carrier construction and the robust cost design is proposed.
Method
2
First
the relevance between security and robustness in steganography is analyzed and demonstrated. The current robust steganography methods utilize syndrome-trellis code (STC) to improve the security of stego image as usual. The amount of modified pixels is decreased via minimizing the distortion. To avoid the influence of error diffusion caused by STC
the presentation of the modified DCT coefficients should be stable excluding other modified coefficients. By constructing the lossless carrier
the balance between security and robustness can be effectively maintained. After differentiating the spatial blocks of a compressed JPEG image processing in the lossy channel
the lossless carrier can be acquired as the robust embedding domain. Next
the distortion minimization in STC is transformed into the minimization of image information loss. By calculating the spatial information loss with a secret bit embedding
a robust cost is designed to measure the anti-compression performance of each DCT coefficient. And the robust cost can efficiently distinguish the robustness of DCT coefficients in lossy compression channels with lower quality factors. At last
STC is utilized to embed secret messages in relation to lossless carrier and robust cost
and an intermediate image is generated. The transmitted compressed stego image maintains high visual quality and strong anti-detection via the lossy compression channel. The secret messages can resist JPEG compression and can be extracted in the right way.
Result
2
The experiments are conducted via comparing with the conventional JPEG steganography and the common robust steganography on BossBase1.01 image database. Compared with traditional JPEG steganography
the proposed lossless carrier construction as the embedding domain can effectively reduce the average error rate of secret messages extraction by 24.97 %
and improve the average success rate of stego images by 21.35 %. The robust cost can further reduce the average error rate of secret messages extraction by 1.05 %
and improve the average success rate of stego images by 16.12 %
which demonstrates the improved anti-compression performance intensively. Compared with other steganography schemes
the average error rate of secret message extraction is decreased by 95.78 %
93.17 %
and 87.38 %
respectively. And the average success rate of stego images extraction is 86.69 times
30.74 times and 4.13 times of other three compared steganography methods. The visual qualities of intermediate images and transmitted compressed stego images keep close to that of the original steganography scheme. In the lossy compression channels with quality factors 50
60
and 70
the visual qualities of the intermediate images generated by the proposed method are all above 55 dB
and the visual qualities of the transmitted compressed stego images are all above 50 dB. The anti-detection performance is qualified.
Conclusion
2
The illustrated steganography method can resist JPEG compression with a low-quality factor and high compression rate. The lossless carrier construction and robust cost design are analyzed and verified for good robustness performance via minimizing the spatial information loss of stego images.
Bas P, Filler T and Pevny T. 2011. "Break our steganographic system": the ins and outs of organizing BOSS//Proceedings of the 13th International Workshop on Information Hiding. Prague, Czech Republic: Springer: 59-70 [ DOI: 10.1007/978-3-642-24178-9_5 http://dx.doi.org/10.1007/978-3-642-24178-9_5 ]
Chen Y, Li Z, Zhang J and Wang G M. 2019. Robust watermarking algorithm for diffusion weighted images. Journal of Image and Graphics, 24(9): 1434-1449
陈怡, 李智, 张健, 王国美. 2019. 弥散加权图像的鲁棒水印算法研究. 中国图象图形学报, 24(9): 1434-1449 [DOI: 10.11834/jig.180672]
Devi M and Sharma N. 2014. Improved detection of least Significant bit steganography algorithms in color and gray scale images//Proceedings of the 2014 Recent Advances in Engineering and Computational Sciences (RAECS). Chandigarh, India: IEEE: 1-5 [ DOI: 10.1109/RAECS.2014.6799507 http://dx.doi.org/10.1109/RAECS.2014.6799507 ]
Filler T, Judas J and Fridrich J. 2010. Minimizing embedding impact in steganography using trellis-coded quantization//Proceedings Volume 7541, Media Forensics and Security II. San Jose, California, USA: SPIE: #754105 [ DOI: 10.1117/12.838002 http://dx.doi.org/10.1117/12.838002 ]
Fridrich J, Pevny T and Kodovsky J. 2007. Statistically undetectable jpeg steganography: dead ends challenges, and opportunities//Proceedings of the 9th Workshop on Multimedia and Security. Dallas Texas, USA: ACM: 3-14 [ DOI: 10.1145/1288869.1288872 http://dx.doi.org/10.1145/1288869.1288872 ]
Guo L J, Ni J Q and Shi Y Q. 2012. An efficient JPEG steganographic scheme using uniform embedding//Proceedings of 2012 IEEE International Workshop on Information Forensics and Security (WIFS). Costa Adeje, Spain: IEEE: 169-174 [ DOI: 10.1109/WIFS.2012.6412644 http://dx.doi.org/10.1109/WIFS.2012.6412644 ]
Guo L J, Ni J Q and Shi Y Q. 2014. Uniform embedding for efficient JPEG steganography. IEEE Transactions on Information Forensics and Security, 9(5): 814-825 [DOI: 10.1109/TIFS.2014.2312817]
Holub V and Fridrich J. 2013. Digital image steganography using universal distortion//Proceedings of the first ACM Workshop on Information Hiding and Multimedia Security. Montpellier, France: ACM: 59-68 [ DOI: 10.1145/2482513.2482514 http://dx.doi.org/10.1145/2482513.2482514 ]
Holub V and Fridrich J. 2015a. Low-complexity features for JPEG steganalysis using undecimated DCT. IEEE Transactions on Information Forensics and Security, 10(2): 219-228 [DOI: 10.1109/TIFS.2014.2364918]
Holub V and Fridrich J. 2015b. Phase-aware projection model for steganalysis of JPEG images//Proceedings Volume 9409, Media Watermarking, Security, and Forensics 2015. San Francisco, USA: SPIE: #94090T [ DOI: 10.1117/12.2075239 http://dx.doi.org/10.1117/12.2075239 ]
Holub V, Fridrich J and Denemark T. 2014. Universal distortion function for steganography in an arbitrary domain. EURASIP Journal on Information Security, 2014: 1-13 [DOI: 10.1186/1687-417X-2014-1]
Huang Y and Kang M H. 2018. Adaptive steganography in the spatial domain using quadtree segmentation. Journal of Image and Graphics, 23(5): 629-639
黄颖, 康明红. 2018. 使用四叉树分割进行自适应空域隐写. 中国图象图形学报, 23(5): 629-639 [DOI: 10.11834/jig.170227]
Liao X, Yu Y B, Li B, Li Z P and Qin Z. 2020. A new payload partition strategy in color image steganography. IEEE Transactions on Circuits and Systems for Video Technology, 30(3): 685-696 [DOI: 10.1109/TCSVT.2019.2896270]
Lu W, He L Y, Yeung Y, Xue Y J, Liu H M and Feng B W. 2019. Secure binary image steganography based on fused distortion measurement. IEEE Transactions on Circuits and Systems for Video Technology, 29(6): 1608-1618 [DOI: 10.1109/TCSVT.2018.2852702]
Lu W, Zhang J H, Zhao X F, Zhang W M and Huang J W. 2021. Secure robust JPEG steganography based on AutoEncoder with adaptive BCH encoding. IEEE Transactions on Circuits and Systems for Video Technology, 31(7): 2909-2922 [DOI: 10.1109/TCSVT.2020.3027843]
Nazari M and Ahmadi I D. 2020. A novel chaotic steganography method with three approaches for color and grayscale images based on FIS and DCT with flexible capacity. Multimedia Tools and Applications, 79(19): 13693-13724 [DOI: 10.1007/s11042-019-08415-1]
Preda R O and Vizireanu D N. 2015. Watermarking-based image authentication robust to JPEG compression. Electronics Letters, 51(23): 1873-1875 [DOI: 10.1049/el.2015.2522]
Qiao T, Wang S, Luo X Y and Zhu Z Q. 2021. Robust steganography resisting JPEG compression by improving selection of cover element. Signal Processing, 183: #108048 [DOI: 10.1016/j.sigpro.2021.108048]
Song X F, Liu F L, Yang C F, Luo X Y and Zhang Y. 2015. Steganalysis of adaptive JPEG steganography using 2D Gabor filters//Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security. Portland Oregon, USA: ACM: 15-23 [ DOI: 10.1145/2756601.2756608 http://dx.doi.org/10.1145/2756601.2756608 ]
Tao J Y, Li S, Zhang X P and Wang Z C. 2019. Towards robust image steganography. IEEE Transactions on Circuits and Systems for Video Technology, 29(2): 594-600 [DOI: 10.1109/TCSVT.2018.2881118]
Wang R, Xue X Y, Ping X J, Niu S Z and Zhang T. 2018. Steganalysis of JPEG images based on image classification and segmentation. Journal of Image and Graphics, 23(10): 1472-1482
汪然, 薛小燕, 平西建, 牛少彰, 张涛. 2018. 分类与分割相结合的JPEG图像隐写分析. 中国图象图形学报, 23(10): 1472-1482 [DOI: 10.11834/jig.180037]
Wang Y F, Zhang W M, Li W X, Yu X Z and Yu N H. 2020. Non-additive cost functions for color image steganography based on inter-channel correlations and differences. IEEE Transactions on Information Forensics and Security, 15: 2081-2095 [DOI: 10.1109/TIFS.2019.2956590]
Yeung Y, Lu W, Xue Y J, Huang J W and Shi Y Q. 2020. Secure binary image steganography with distortion measurement based on prediction. IEEE Transactions on Circuits and Systems for Video Technology, 30(5): 1423-1434 [DOI: 10.1109/TCSVT.2019.2903432]
Zhang Y, Qin C, Zhang W M, Liu F L and Luo X Y. 2018a. On the fault-tolerant performance for a class of robust image steganography. Signal Processing, 146: 99-111 [DOI: 10.1016/j.sigpro.2018.01.011]
Zhang Y, Zhu X D, Qin C, Yang C F and Luo X Y. 2018b. Dither modulation based adaptive steganography resisting JPEG compression and statistic detection. Multimedia Tools and Applications, 77(14): 17913-17935 [DOI: 10.1007/s11042-017-4506-3]
Zhao Z Z, Guan Q X, Zhang H and Zhao X F. 2019. Improving the robustness of adaptive steganographic algorithms based on transport channel matching. IEEE Transactions on Information Forensics and Security, 14(7): 1843-1856 [DOI: 10.1109/TIFS.2018.2885438]
Zhu L Y, Luo X Y, Yang C F, Zhang Y and Liu F L. 2021. Invariances of JPEG-quantized DCT coefficients and their application in robust image steganography. Signal Processing, 183: #108015 [DOI: 10.1016/j.sigpro.2021.108015]
相关作者
相关机构