没有合适的资源?快使用搜索试试~ 我知道了~
首页探究可比自适应隐写术差异下的失真函数演进
探究可比自适应隐写术差异下的失真函数演进
0 下载量 97 浏览量
更新于2024-08-28
收藏 318KB PDF 举报
"这篇研究论文探讨了如何利用可比自适应隐写术之间的差异来进化失真函数。文章由Wenbo Zhou、Weiming Zhang和Nenghai Yu合作完成,他们在中国科学技术大学的电磁空间信息国家重点实验室工作。该研究发表在2016年的第12届国际自然计算、模糊系统和知识发现会议上,ISBN号为978-1-5090-4093-3,由IEEE出版。" 在信息安全领域,隐写术是一种隐藏信息的技术,尤其是在数字媒体中,如图像、音频或视频。自适应隐写术是这一领域的高级形式,它能够根据载体(如图像)的特性调整隐藏信息的方式,以提高隐藏信息的鲁棒性和不可检测性。 论文指出,至今为止,最有效的自适应隐写术模型是通过最小化一个预先定义好的失真函数来实现的。这个失真函数决定了每个像素被修改的概率(MP)。然而,作者发现即使一组隐写方法在性能上接近,它们计算出的一些像素的修改概率可能会有显著差异。 这种差异揭示了一个新的研究方向:利用这些差异来改进失真函数。进化失真函数的目标是更好地平衡隐藏信息的容量、鲁棒性和隐蔽性。通过探索不同隐写方法之间的差异,研究人员可能能够开发出更先进、更难以检测的隐藏策略。 具体来说,他们可能采用机器学习或优化算法来分析各种自适应隐写术的像素修改模式,然后基于这些模式的差异来调整失真函数。这种方法有望提高现有隐写术的性能,使其在保持低检测率的同时,能隐藏更多的数据。 此外,这样的研究对于反隐写分析也有重要意义,因为理解隐写术的改进可以帮助开发更有效的检测工具。因此,这项工作的成果不仅将推动隐写术的发展,还将对信息安全领域的攻防对抗带来深远影响。
资源详情
资源推荐
978-1-5090-4093-3/16/$31.00 ©2016 IEEE 2262
2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)
Evolving Distortion Function By Exploiting The
Differences Among Comparable Adaptive
Steganography
Wenbo Zhou
CAS Key Laboratory of
Electro-magnetic Space Information
University of Science
and Technology of China
Hefei, China
Email:welbeckz@mail.ustc.edu.cn
Weiming Zhang
CAS Key Laboratory of
Electro-magnetic Space Information
University of Science
and Technology of China
Hefei, China
Tel.:0551-63600863
Email:zhangwm@ustc.edu.cn
Nenghai Yu
CAS Key Laboratory of
Electro-magnetic Space Information
University of Science
and Technology of China
Hefei, China
Tel.:0551-63600681
Abstract—So far, the most effective model for adaptive
steganography is to minimize a well-defined distortion function,
in which the distortion function determines the modification
probability (MP) of each pixel. We found that the MPs of some
pixels calculated by a group of steganographic methods may be
very different even though these methods have close performances
in resisting the detection of steganalysis. We call such pixels as
controversial pixels, and consider that steganalysis is not sensitive
to such pixels. Therefore we can assign more payloads to the
controversial pixels by increasing MPs on them to generate a
new steganographic distortion function. We call this evolutionary
strategy as the rule of Controversial Pixels Prior (CPP). Taking
the state-of-art methods {WOW, UNIWARD} and {HILL, MVG}
as two pairs of examples, we show that the principle of CPP can
improve the security of state of the art steganographic algorithms
for spatial images.
Index Terms—Steganography, evolutionary, distortion func-
tion, controversial pixels, modification probability, steganalysis
I. INTRODUCTION
Steganography is a technique for covert communication,
which aims to hide secret messages into ordinary digital
media without drawing suspicion [1], [2], [16]. Designing
steganographic algorithms for various cover sources is chal-
lenging due to the fundamental lack of accurate models.
Currently, the most successful approach to design content
adaptive steganography is based on minimizing the distortion
between the cover and the corresponding stego object. The
distortion is obtained by assigning a cost to each modified
cover element (e.g., pixel in spatial domain image), and the
messages are embedded while minimizing the total distortion
which is the sum of costs of all modified elements.
The first method based on the framework of minimizing
distortion is HUGO (highly undetectable stego) [3]. HUGO
defines the pixel’s distortion by the changing amplitude of
steganalyzer’s features caused by modifying the current pix-
el, and pixels that make the feature vectors deviated more
will have higher costs. The features of steganalyzer SPAM
(subtractive pixel adjacency matrix) [4] is used in HUGO.
Steganalyzer’s features are usually generated by exploiting
correlations between the predicted residuals of neighboring
pixels [4], [23]. Because the pixels in smooth areas can be
accurately predicted, the modifications in such areas will be
easily detected by steganalyzers. Therefore the embedding
changes of HUGO will be gathered within textured regions.
However, HUGO can be detected by steganalyzer with higher
dimension of features, such as SRM (spatial rich models) [6].
In SRM, the predicted residuals are generated in various
directions and manners, so the correlations between pixels can
be further exploited. If the pixel can be accurately modeled
in any direction, it should be considered as a smooth point
and assigned larger cost. With this insight, WOW has been
proposed [5], which assigns high costs to pixels that are more
predictable by a bank of directional filters. WOW improves the
security of HUGO under the detection of SRM (spatial rich
models) [6]. UNIWARD (universal wavelet relative distortion)
[7] generalizes the cost function of WOW to make it simpler
and more suitable for embedding in an arbitrary domain,
including spatial domain and DCT domain for JPEG images.
Hence UNIWARD has a similar performance compared to
WOW in spatial domain. Li et al. proposed the method HILL
[8], which improves WOW by spreading the costs with a low-
pass filter. In HILL [8], the local modification probabilities are
evened out and thus the modifications cluster in the complex
areas.
The above methods design cost function in an ad hoc
or empirical manner. Sedighi et al. proposed model-driven
approaches [9], [11], in which Multivariate Gaussian (MG) or
Multivariate Generalized Gaussian (MVG)’s distribution was
used to model noise residuals of pixels by assuming them to
be independent but have varying variances. The models are
established by estimating the variances and then the costs are
computed by minimizing the power of an optimal statistical
test. In fact, small costs will be assigned to residuals modeled
下载后可阅读完整内容,剩余9页未读,立即下载
weixin_38738422
- 粉丝: 3
- 资源: 922
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- 批量文件重命名神器:HaoZipRename使用技巧
- 简洁注册登录界面设计与代码实现
- 掌握Python字符串处理与正则表达式技巧
- YOLOv5模块改进 - C3与RFAConv融合增强空间特征
- 基于EasyX的C语言打字小游戏开发教程
- 前端项目作业资源包:完整可复现的开发经验分享
- 三菱PLC与组态王实现加热炉温度智能控制
- 使用Go语言通过Consul实现Prometheus监控服务自动注册
- 深入解析Python进程与线程的并发机制
- 小波神经网络均衡算法:MATLAB仿真及信道模型对比
- PHP 8.3 中文版官方手册(CHM格式)
- SSM框架+Layuimini的酒店管理系统开发教程
- 基于SpringBoot和Vue的招聘平台完整设计与实现教程
- 移动商品推荐系统:APP设计与实现
- JAVA代码生成器:一站式后台系统快速搭建解决方案
- JSP驾校预约管理系统设计与SSM框架结合案例解析
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功