Abstract
As a kind of covert communication technology, stegangoraphy can transmit cryptography using public cover on the internet. However, the behavior is easy to be found because of the cover distortion. To solve this problem, we define two distortion functions to measure the impact of embedding secret. They are called cover perception distortion (CPD) and statistical property distortion (SPD). Then a security stegangoraphy strategy can be generated adaptively by minimizing the two distortion functions. The experiment results demonstrate the effectiveness of our work.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Huang, X., Ono, N., Echizen, I., Nishimura, A.: Reversible audio information hiding based on integer DCT coefficients with adaptive hiding locations. In: Shi, Y.Q., Kim, H.-J., Pérez-González, F. (eds.) IWDW 2013. LNCS, vol. 8389, pp. 376–389. Springer, Heidelberg (2014)
Filler, T., Judas, J., Fridrich, J.: Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes. IEEE Trans. Inf. Forensics Security 6(3), 920–934 (2011)
Kondovsky, J., Fridrih, J.: Calibration revisited. In: Proceedings of the 11th ACM Multimedia and Security Workshop, Princeton, NJ, September 7–8, 2009
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Ding, X., Huang, W., Zhang, M., Zhao, J. (2015). POSTER: A Security Adaptive Steganography System Applied on Digital Audio. In: Thuraisingham, B., Wang, X., Yegneswaran, V. (eds) Security and Privacy in Communication Networks. SecureComm 2015. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 164. Springer, Cham. https://doi.org/10.1007/978-3-319-28865-9_32
Download citation
DOI: https://doi.org/10.1007/978-3-319-28865-9_32
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-28864-2
Online ISBN: 978-3-319-28865-9
eBook Packages: Computer ScienceComputer Science (R0)