Research article Special Issues

Steganography in beautified images

  • Received: 02 January 2019 Accepted: 04 March 2019 Published: 15 March 2019
  • Existing distortion functions in steganography which achieved high undetectability are designed for unprocessed natural image. Nowadays, a large number of images are filtered before transmitting for the sake of beautification. In this situation, existing distortion functions should be improved to fit the properties of these beautified images. This paper proposes a distortion function optimization method for steganography on beautified images. Given an unprocessed image, a popular image beautification software is employed to produce two similar beautified images. One of them is used for embedding and the other one is employed as reference. Guided by the reference, existing distortion functions are improved by distinguishing the embedding costs for ±1 embedding. After embedding, the stego image is closer to the reference, which results in a higher undetectability against steganalysis. Experimental results also proved the increasing of undetectability when examined by modern steganalytic tools.

    Citation: Liyun Liu, Zichi Wang, Zhenxing Qian, Xinpeng Zhang, Guorui Feng. Steganography in beautified images[J]. Mathematical Biosciences and Engineering, 2019, 16(4): 2322-2333. doi: 10.3934/mbe.2019116

    Related Papers:

  • Existing distortion functions in steganography which achieved high undetectability are designed for unprocessed natural image. Nowadays, a large number of images are filtered before transmitting for the sake of beautification. In this situation, existing distortion functions should be improved to fit the properties of these beautified images. This paper proposes a distortion function optimization method for steganography on beautified images. Given an unprocessed image, a popular image beautification software is employed to produce two similar beautified images. One of them is used for embedding and the other one is employed as reference. Guided by the reference, existing distortion functions are improved by distinguishing the embedding costs for ±1 embedding. After embedding, the stego image is closer to the reference, which results in a higher undetectability against steganalysis. Experimental results also proved the increasing of undetectability when examined by modern steganalytic tools.


    加载中


    [1] B. Li, S. Tan and M. Wang, et al., Investigation on cost assignment in spatial image steganography, IEEE. TIFS., 9 (2014), 1264–1277.
    [2] Y. Ma, X. Luo and X. Li, et al., Selection of rich model steganalysis features based on decision rough set α-Positive region reduction, IEEE. TCSVT., (2018), In press.
    [3] Y. Zhang, C. Qin and W. Zhang, et al., On the fault-tolerant performance for a class of robust image steganography, J. Sigpro., 146 (2018), 99–111.
    [4] S. Li and X. Zhang, Towards construction based data hiding: from secrets to fingerprint images, IEEE. TIP., 28 (2019), 1482–1497.
    [5] J.Frdrich and D. Soukal, Matrix embedding for large payloads, IEEE. TIFS., 1(2006), 390–395.
    [6] X. Zhang and S. Wang, Efficient steganographic embedding by exploiting modification direction, IEEE. LCOMM., 10 (2016), 781–783.
    [7] W. Zhang, X. Zhang and S. Wang, Maximizing steganographic embedding efficiency by combining hamming codes and wet paper codes, Proc. IH2008, Santa Barbara, CA, USA, (2008), 60–71.
    [8] T. Filler, J.Judas and J. Fridrich, Minimizing additive distortion in steganography using syndrome-trellis codes, IEEE. TIFS., 6 (2011), 920–935.
    [9] X. Luo, X. Song and X. Li, et al., Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes, MTAP., 75 (2016), 13557–13583.
    [10] T. Pevný, T. Filler and P. Bas, Using high-dimensional image models to perform highly undetectable steganography, Proc. IH2008, Calgary, Canada, (2010), 161–177.
    [11] V. Holub and J. Fridrich, Designing steganographic distortion using directional filters, Proc. IEEE. WIFS., Binghamton, NY, USA, (2012), 234–239.
    [12] B Li, M. Wang, and J. Huang, et al., A new cost function for spatial image steganography, Proc. IEEE. ICIP., Paris, France, (2014), 4206–4210.
    [13] V. Sedighi, J. Fridrich and R. Cogranne, Content-adaptive pentary steganography using the multivariate generalized gaussian cover model, Proc. SOP., San Francisco, California, USA, (2015), 94090H–94090H–13.
    [14] V. Holub and J. Fridrich, Digital image steganography using universal distortion, Proc. ACM IH&MMS., New York, NY, USA, (2013), 59–68.
    [15] L. J. Guo, J. Q. Ni and Y. Q. Shi, uniform embedding for efficient JPEG steganography, IEEE. TIFS., 9 (2014), 814–825.
    [16] L. J. Guo, J. Q. Ni and W. K. Su, et al., Using statistical image model for JPEG steganography: Uniform Embedding Revisited, IEEE. TIFS., 10 (2015), 2669–2680.
    [17] Z. Wang, X. Zhang and Z. Yin, Hybrid distortion function for JPEG steganography, JEI., 25 (2016), 050501.
    [18] Z. Wang, Z. Qian and X. Zhang, et al., On improving distortion functions for JPEG steganography, IEEE Access, 6 (2018), 74917–74930.
    [19] C. Qin, C. Chang and Y. Chiu, A novel joint data-hiding and compression scheme based on SMVQ and image inpainting, IEEE. TIP., 23 (2014), 969–978.
    [20] Z. Qian, H. Zhou and X. Zhang, et al., Separable reversible data hiding in encrypted JPEG bitstreams, IEEE. TDSC., 15 (2018), 1055–1067.
    [21] Z. Qian and X. Zhang, Reversible data hiding in encrypted image with distributed source encoding, IEEE. TCSVT., 26 (2016), 636–646.
    [22] Z. Qian, X. Zhang and S. Wang, Reversible data hiding in encrypted JPEG bitstream, IEEE. TMM., 16 (2014), 1486–1491.
    [23] C. Qin, W. Zhang and F. Cao, et al., Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection, J. Sigpro., 153 (2018), 09–122.
    [24] J. Deng, W. Dong and R. Socher, et al., ImageNet: A large-scale hierarchical image satabase, IEEE CVPR., (2009), 248–255.
    [25] Beautification softwares "BeautyCam", Meitu Company, Fujian, China, 2018, Available from: https://mt.meipai.com/.
    [26] Beautification softwares "CAMERA360", Chengdu Pinguo technology co. LTD, Chengdu, China, 2015, Available from: http://www.camera360.com/.
    [27] Beautification softwares "TianTianPiTu", Tencent Company, Shenzhen, China, 2014, Available from: https://tu.qq.com/.
    [28] P. Joshi, D. M. Esciriva and V. Godoy, Opencv By example, Penerbit Packt Publishing Ltd, (2016), 87–92.
    [29] Z. Wang, J. Lv and Q. Wei, et al., Distortion function for spatial image steganography based on the polarity of embedding change, Proc. IWDW., Beijing, China, (2016), 487–493.
    [30] V. Holub and J. Fridrich, Low complexity features for JPEG steganalysis using undecimated DCT, IEEE. TIFS.,10 (2014), 219–228.
    [31] J. Kodovsky, J. Fridrich and V. Holub, Ensemble classifiers for steganalysis of digital media, IEEE. TIFS., 7 (2012), 432–444.
    [32] J. Kodovsky and J. Fridrich, Steganalysis of JPEG images using rich models, Proc. ISOP., San Francisco, CA, USA, (2012), 83030A–83030A–13.
  • Reader Comments
  • © 2019 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(4529) PDF downloads(697) Cited by(0)

Article outline

Figures and Tables

Figures(9)  /  Tables(1)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog