A Network-Flow-Based Method for Embedding Rectification

  • Wanqi Li
  • Heng Wang
  • Zhiwei He
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6987)

Abstract

In this article, the interactions of pixel changes are interpreted as flows in a state transition network. By relating the cost of each state transition to detectability, the problem of embedding impact minimization is solved using polynomial-time network flow algorithms. The newly proposed scheme rectifies pixel changes after the embedding process and it’s compatible with the majority of existing embedding schemes. The experimental result shows that this method is applicable to the full range of embedding rates.

Keywords

Steganography network flows embedding impact embedding rectification 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Solanki, K., Sullivan, K., Madhow, U., Manjunath, B.S., Chandrasekaran, S.: Statistical Restoration for Robust and Secure Steganography. In: ICIP, vol. (2), pp. 1118–1121 (2005)Google Scholar
  2. 2.
    Pevný, T., Filler, T., Bas, P.: Using High-Dimensional Image Models to Perform Highly Undetectable Steganography. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 161–177. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  3. 3.
    Filler, T., Pevný, T., Bas, P.: BOSS (July 2010), http://boss.gipsa-lab.grenobleinp.fr/BOSSRank/
  4. 4.
    Fridrich, J., Kodovsk, J., Goljan, M., Holub, V.: Breaking HUGO: the Process Discovery. In: Information Hiding (to appear, 2011)Google Scholar
  5. 5.
    Shuo-Zhong, W., Zhang, X.P., Wei-Ming, Z.: Recent Advances in Image-Based Steganalysis Research. Chinese Journal of Computers 32(7), 1247–1263 (2009)CrossRefGoogle Scholar
  6. 6.
    Cachin, C.: An Information-Theoretic Model for Steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306–318. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  7. 7.
    Provos, N., Honeyman, P.: Hide and Seek: An Introduction to Steganography. IEEE Security & Privacy, 32–44 (2003)Google Scholar
  8. 8.
    Ker, A.D.: Steganalysis of LSB Matching in Grayscale Images. IEEE Signal Processing Letters 12(6), 441–444 (2005)CrossRefGoogle Scholar
  9. 9.
    Ker, A.D.: Resampling and the Detection of LSB Matching in Color Bitmaps. In: Security, Steganography, and Watermarking of Multimedia Contents, pp. 1–15 (2005)Google Scholar
  10. 10.
    Harmsen, J.J., Bowers, K.D., Pearlman, W.A.: Fast Additive Noise Steganalysis. In: Security, Steganography, and Watermarking of Multimedia Contents, pp. 489–495 (2004)Google Scholar
  11. 11.
    Chandramouli, R., Memon, N.: Steganography Capacity: A Steganalysis Perspective. In: Proc. SPIE, Security and Watermarking of Multimedia Contents V, Santa Clara, CA, USA, vol. 5020, pp. 173–177 (2003)Google Scholar
  12. 12.
    Westfeld, A.: F5-A Steganographic Algorithm. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  13. 13.
    Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG Images: Breaking the F5 Algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 310–323. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  14. 14.
    Fridrich, J., Pevný, T., Kodovský, J.: Statistically undetectable jpeg steganography: dead ends challenges, and opportunities. In: MM & Sec, pp. 3–14 (2007)Google Scholar
  15. 15.
    Fridrich, J., Filler, T.: Practical Methods for Minimizing Embedding Impact Steganography. In: Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, CA, 02-03, vol. 6505 (2007)Google Scholar
  16. 16.
    Fridrich, J., Goljan, M., Soukal, D.: Wet paper codes with improved embedding efficiency. IEEE Transactions on Information Forensics and Security, 102–110 (2006)Google Scholar
  17. 17.
    Filler, T., Judas, J., Fridrich, J.: Minimizing embedding impact in steganography using trellis-coded quantization. In: Media Forensics and Security (2010)Google Scholar
  18. 18.
    Filler, T., Fridrich, J.: Gibbs Construction in Steganography. IEEE Trans. on Info. Forensics and Security 5(4), 705–720 (2010)CrossRefGoogle Scholar
  19. 19.
    Fridrich, J., Goljan, M., Lisonek, P., Soukal, D.: Writing on wet paper. In: Security, Steganography, and Watermarking of Multimedia Contents, pp. 328–340 (2005)Google Scholar
  20. 20.
    Filler, T., Judas, J., Fridrich, J.: Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes. In: Media Forensics and Security (to appear, 2011)Google Scholar
  21. 21.
    Ahuja, R.K., Magnanti, T.L., Orlin, J.B.: Network Flows: Theory, Algorithms, and Applications. Prentice Hall, Englewood Cliffs (1993)MATHGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Wanqi Li
    • 1
  • Heng Wang
    • 1
  • Zhiwei He
    • 1
  1. 1.Computer Science and Engineering DepartmentSichuan University Jinjiang CollegePenshanChina

Personalised recommendations