Skip to main content
Log in

A distortion cost modification strategy for adaptive pentary steganography

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, a pentary steganography scheme is proposed employing the multi-layered STCs, which takes the embedding interactions into consideration. First, based on the definition of local correlation for the four-neighborhood, we link the modification direction of the central pixel with that of its four-neighborhood. Secondly, a modification degree strategy (MDS) is proposed to adjust the costs of the pixels dynamically. And the cost of pixels is assigned utilizing the MDS, which divides the process of distortion calculation into two steps of initializing and updating distortion cost. Finally, the scheme is obtained incorporating the MDS with the existing adaptive scheme S-UNIWARD of pentary version. Experimental results show that the proposed scheme is capable of providing large capacity, and has a better performance than adaptive steganography scheme S-UNIWARD of pentary version in resisting the SRM and maxSRMd2 detection when the payload is larger than 0.5 bpp. Also, the strategy could be combined with other adaptive steganography schemes of pentary version. Besides, the proposed scheme outperforms some ternary adaptive schemes with both feature sets SRM and maxSRMd2 when the payload is from 0.05bpp to 0.5bpp.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Bas P, Filler T, Penvy T (2011) “Break our steganographic system”: the ins and outs of organizing BOSS[C]. information hiding. Springer, Berlin Heidelberg, pp 59–70

    Google Scholar 

  2. Denemark T, Fridrich J (2015) Improving steganographic security by synchronizing the selection channel[C]. Proc 3rd ACM Workshop Inform Hiding Multimed Sec. ACM: 5–14

  3. Denemark T, Sedighi V, Holub V, et al. (2014) Selection-channel-aware rich model for steganalysis of digital images[C]. Inform Forensics Sec (WIFS), 2014 I.E. Int Workshop. IEEE: 48–53

  4. Filler T, Fridrich J (2010) Minimizing additive distortion functions with non-binary embedding operation in steganography[C]. Inform Forensics Sec (WIFS), 2010 I.E. Int Work. IEEE: 1–6

  5. Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images[J]. Inform Forensics Sec, IEEE Trans 7(3):868–882

    Article  Google Scholar 

  6. Fridrich JJ, Kodovsky J (2013) Multivariate generalized gaussian model for designing additive distortion for steganography[C]. ICASSP: 2949–2953

  7. Gul G, Kurugollu F (2011) A new methodology in steganalysis: breaking highly undetectable steganograpy (HUGO)[C]. Information Hiding. Springer Berlin Heidelberg, 2011:71-84. Lecture Notes in Computer Science, vol. 6958, Prague, Czech, Republic, May 2011, pp. 71–84

  8. Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters[C]. Information Forensics and Security (WIFS), 2012 I.E. Int Workshop. IEEE: 234–239

  9. Holub V, Fridrich J (2013) Digital image steganography using universal distortion[C]. Proc first ACM Workshop Inform Hiding Multimed Secur. ACM: 59–68

  10. Huang W, Zhao X Novel cover selection criterion for spatial steganography using linear pixel prediction error[J]. Sci Chin Inform Sci: 1–3

  11. Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media[J]. Inform Forensics Sec, IEEE Trans 7(2):432–444

    Article  Google Scholar 

  12. Li B, Tan S, Wang M et al (2014) Investigation on cost assignment in spatial image steganography [J]. Inform Forensics Sec, IEEE Trans 9(8):1264–1277

    Article  Google Scholar 

  13. Li B, Tan S, Wang M et al (2015) A strategy of clustering modification directions in spatial Image steganography[J]. Inform Forensics Sec, IEEE Trans 10(9):1905–1917

    Article  Google Scholar 

  14. Li B, Wang M, Huang J, et al (2014) A new cost function for spatial image steganography[C]. Image Process (ICIP), 2014 I.E. Int Conf. IEEE: 4206–4210

  15. Li J, Yang X, Liao X, et al. (2016) A game-theoretic method for designing distortion function in spatial steganography[J]. Multimed Tools Appl: 1–15

  16. Liao X, Shu C (2015) Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels[J]. J Vis Commun Image Represent 28:21–27

    Article  Google Scholar 

  17. Pevny T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix[J]. Inform Forensics Sec IEEE Trans 5(2):215–224

    Article  Google Scholar 

  18. Sedighi V, Cogranne R, Fridrich J (2016) Content-adaptive steganography by minimizing statistical detectability[J]. Inform Forensics Sec, IEEE Trans 11(2):221–234

    Article  Google Scholar 

  19. Sedighi V, Fridrich J, Cogranne R (2015) Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model[C]. IS&T/SPIE Electron Imag. Int Soc Optics Photo: 94090H-94090H-13.

  20. Xia Z, Wang X, Sun X et al (2016) Steganalysis of LSB matching using differences between nonadjacent pixels[J]. Multimed Tools Appl 75(4):1947–1962

    Article  Google Scholar 

Download references

Acknowledgments

The authors appreciate the anonymous reviewers and thank the members of DDE Laboratory in SUNY Binghamton for sharing their implementation codes. Also, the authors thank Professor Bin Li and his student Ming Wang from the College of Information Engineering, ShenZhen University, for providing the CMD code and useful advice.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuan Bian.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bian, Y., Tang, G., Gao, Z. et al. A distortion cost modification strategy for adaptive pentary steganography. Multimed Tools Appl 76, 20643–20662 (2017). https://doi.org/10.1007/s11042-016-3986-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3986-x

Keywords

Navigation