Abstract
Most of the existing model-based image steganographic schemes in spatial domain assume the independence among adjacent pixels, thus ignores the embedding interactions among neighbouring pixels. In this paper, we propose a new image steganographic scheme by taking advantages of the correlations between each pixel and its eight-neighbourhood and determine the embedding cost of the pixel through the minimization of the KL-divergence between the cover and stego objects. Experimental results demonstrate that our scheme show superior or comparable performance to two state-of-the-art algorithms: HILL and MiPOD in resisting steganalysis detectors.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Scikit-learn 0.19.1 documentation. https://scikit-learn.org/stable/modules/covariance.html. Accessed 7 Nov 2019
Bas, P., Filler, T., Pevný, T.: Break our steganographic system: the ins and outs of organizing BOSS. In: Proceedings of the 13th International Workshop on Information Hiding, pp. 59–70 (2011)
Chen, G., Zhu, F., Heng, P.A.: An efficient statistical method for image noise level estimation. In: 2015 IEEE International Conference on Computer Vision (ICCV), pp. 477–485 (2015). https://doi.org/10.1109/ICCV.2015.62
Chen, X., Zhang, Z., Qiu, A., Xia, Z., Xiong, N.N.: Novel coverless steganography method based on image selection and stargan. IEEE Trans. Netw. Sci. Eng. 9(1), 219–230 (2022). https://doi.org/10.1109/TNSE.2020.3041529
Denemark, T., Sedighi, V., Holub, V., Cogranne, R., Fridrich, J.: Selection-channel-aware rich model for steganalysis of digital images. In: IEEE International Workshop on Information Forensics and Security (2014). https://doi.org/10.1109/WIFS.2014.7084302
Filler, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Forens. Secur. 6(3), 920–935 (2011). https://doi.org/10.1109/TIFS.2011.2134094
Fridrich, J., Kodovský, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forens. Secur. 7(3), 868–882 (2012). https://doi.org/10.1109/TIFS.2012.2190402
Fridrich, J., Kodovsky, J.: Multivariate gaussian model for designing additive distortion for steganography. In: IEEE ICASSP, pp. 2949–2953 (2013). https://doi.org/10.1109/ICASSP.2013.6638198
Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: International Workshop on Information Forensics and Security, pp. 234–239 (2012). https://doi.org/10.1109/WIFS.2012.6412655
Holub, V., Fridrich, J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inf. Secur. 2014(1), 1–13 (2014). https://doi.org/10.1186/1687-417X-2014-1
Kodovský, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forens. Secur. 7(2), 432–444 (2012). https://doi.org/10.1109/TIFS.2011.2175919
Li, B., Tan, S., Wang, M., Huang, J.: Investigation on cost assignment in spatial image steganography. IEEE Trans. Inf. Forens. Secur. 9(8), 1264–1277 (2014). https://doi.org/10.1109/TIFS.2014.2326954
Li, B., Wang, M., Huang, J., Li, X.: A new cost function for spatial image steganography. In: International Conference on Image Processing, ICIP, pp. 4206–4210 (2014). https://doi.org/10.1109/ICIP.2014.7025854
Luo, Y., Qin, J., Xiang, X., Tan, Y.: Coverless image steganography based on multi-object recognition. IEEE Trans. Circuits Syst. Video Technol. 31(7), 2779–2791 (2021). https://doi.org/10.1109/TCSVT.2020.3033945
Pevný, T., Bas, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Forens. Secur. 5(2), 215–224 (2010). https://doi.org/10.1145/1597817.1597831
Pevný, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: Information Hiding, 12th International Conference, vol. 6387, pp. 161–177 (2010). https://doi.org/10.1007/978-3-642-16435-4_13
Sedighi, V., Cogranne, R., Fridrich, J.: Content-adaptive steganography by minimizing statistical detectability. IEEE Trans. Inf. Forens. Secur. 11(2), 221–234 (2016). https://doi.org/10.1109/TIFS.2015.2486744
Sedighi, V., Fridrich, J.J., Cogranne, R.: Content-adaptive pentary steganography using the multivariate generalized gaussian cover model. In: Proceedings of the SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2015, vol. 9409 (2015). https://doi.org/10.1117/12.2080272
Yang, Z.L., Guo, X.Q., Chen, Z.M., Huang, Y.F., Zhang, Y.J.: RNN-stega: linguistic steganography based on recurrent neural networks. IEEE Trans. Inf. Forens. Secur. 14(5), 1280–1295 (2019). https://doi.org/10.1109/TIFS.2018.2871746
Acknowledgements
This work was supported in part by the National Natural Science Foundation of China under Grants U1726315, 61772573 and U1936212 and U19B2022, in part by the Key-Area Research and Development Program of Guangdong Province under grant 2019B010139003, and in part by Shenzhen R&D Program under grant GJHZ20180928155814437.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendices
Appendix
A Decomposition of \(p(0 \sim 8)\)
Figure 1, illustrates 9 pixels of one block with index \(\mathrm{{\{ 0}} \sim \mathrm{{8\} }}\), where every two pixels are adjacent if connected or independent if disconnected. Based on conditional independence, for two independent pixels, i, j, we can easily obtain:
Let \(i \leftrightarrow j\) represents adjacent pixels i, j, we proceed with a group of pixels according to conditional independence:
Then, it’s obvious to get (17) and subsequently we take the second term of former formula repeatedly and use (16) to simply them:
For the numerator and denominator in first term in (21):
Substitute (22), (23) and (24) into (21), (21) into (20), (20) into (19), (19) into (18) and (18) into (17) in turn, (17) can be expressed as:
B 2D and 4D Steganographic Fisher Information matrix
We mimic Eq. (3), where one-dimensional steganographic Fisher Information proposed, to construct 2D and 4D steganographic Fisher Information matrix in this proof. First, elements in 2D steganographic Fisher Information matrix are approximated as:
\({p_{m,n}}\), the abbreviation of \( p_{m,n}^{i,j}\), is the probability \(P\{ {i} = m,{j} = n\}\), which can viewed as a point \(f({x_i = m},{x_j = n})\) in the two-dimensional Gaussian distribution. Although \({x_i},{x_j}\) are both discrete integer variables, we suppose \(f({x_i},{x_j})\) is continuous for differentiate:
Given \({p_{m,n}} = f(m,n),{p_{m \pm 1,n}} = f(m \pm 1,n),{p_{m,n \pm 1}} = f(m,n \pm 1)\), considering the Taylor approximation at points \((m \pm 1,n),(m,n \pm 1)\), we have:
After substituting (5), (27), (30) and (31) into (26), and taking variables m, n, s, t continuous, we can finally derive (32)–(34). We give an example formula for element ij in 4\(\,\times \,\)4 Fisher Information matrix as (35), which can be easily generalized to other elements, their calculation results do not list because of the length limit.
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Tong, Y., Ni, J., Su, W., Hu, X. (2022). Spatial Image Steganography Incorporating Adjacent Dependencies. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2022. Lecture Notes in Computer Science, vol 13340. Springer, Cham. https://doi.org/10.1007/978-3-031-06791-4_33
Download citation
DOI: https://doi.org/10.1007/978-3-031-06791-4_33
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-06790-7
Online ISBN: 978-3-031-06791-4
eBook Packages: Computer ScienceComputer Science (R0)