Abstract
In this paper, a pentary steganography scheme is proposed employing the multi-layered STCs, which takes the embedding interactions into consideration. First, based on the definition of local correlation for the four-neighborhood, we link the modification direction of the central pixel with that of its four-neighborhood. Secondly, a modification degree strategy (MDS) is proposed to adjust the costs of the pixels dynamically. And the cost of pixels is assigned utilizing the MDS, which divides the process of distortion calculation into two steps of initializing and updating distortion cost. Finally, the scheme is obtained incorporating the MDS with the existing adaptive scheme S-UNIWARD of pentary version. Experimental results show that the proposed scheme is capable of providing large capacity, and has a better performance than adaptive steganography scheme S-UNIWARD of pentary version in resisting the SRM and maxSRMd2 detection when the payload is larger than 0.5 bpp. Also, the strategy could be combined with other adaptive steganography schemes of pentary version. Besides, the proposed scheme outperforms some ternary adaptive schemes with both feature sets SRM and maxSRMd2 when the payload is from 0.05bpp to 0.5bpp.
Similar content being viewed by others
References
Bas P, Filler T, Penvy T (2011) “Break our steganographic system”: the ins and outs of organizing BOSS[C]. information hiding. Springer, Berlin Heidelberg, pp 59–70
Denemark T, Fridrich J (2015) Improving steganographic security by synchronizing the selection channel[C]. Proc 3rd ACM Workshop Inform Hiding Multimed Sec. ACM: 5–14
Denemark T, Sedighi V, Holub V, et al. (2014) Selection-channel-aware rich model for steganalysis of digital images[C]. Inform Forensics Sec (WIFS), 2014 I.E. Int Workshop. IEEE: 48–53
Filler T, Fridrich J (2010) Minimizing additive distortion functions with non-binary embedding operation in steganography[C]. Inform Forensics Sec (WIFS), 2010 I.E. Int Work. IEEE: 1–6
Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images[J]. Inform Forensics Sec, IEEE Trans 7(3):868–882
Fridrich JJ, Kodovsky J (2013) Multivariate generalized gaussian model for designing additive distortion for steganography[C]. ICASSP: 2949–2953
Gul G, Kurugollu F (2011) A new methodology in steganalysis: breaking highly undetectable steganograpy (HUGO)[C]. Information Hiding. Springer Berlin Heidelberg, 2011:71-84. Lecture Notes in Computer Science, vol. 6958, Prague, Czech, Republic, May 2011, pp. 71–84
Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters[C]. Information Forensics and Security (WIFS), 2012 I.E. Int Workshop. IEEE: 234–239
Holub V, Fridrich J (2013) Digital image steganography using universal distortion[C]. Proc first ACM Workshop Inform Hiding Multimed Secur. ACM: 59–68
Huang W, Zhao X Novel cover selection criterion for spatial steganography using linear pixel prediction error[J]. Sci Chin Inform Sci: 1–3
Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media[J]. Inform Forensics Sec, IEEE Trans 7(2):432–444
Li B, Tan S, Wang M et al (2014) Investigation on cost assignment in spatial image steganography [J]. Inform Forensics Sec, IEEE Trans 9(8):1264–1277
Li B, Tan S, Wang M et al (2015) A strategy of clustering modification directions in spatial Image steganography[J]. Inform Forensics Sec, IEEE Trans 10(9):1905–1917
Li B, Wang M, Huang J, et al (2014) A new cost function for spatial image steganography[C]. Image Process (ICIP), 2014 I.E. Int Conf. IEEE: 4206–4210
Li J, Yang X, Liao X, et al. (2016) A game-theoretic method for designing distortion function in spatial steganography[J]. Multimed Tools Appl: 1–15
Liao X, Shu C (2015) Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels[J]. J Vis Commun Image Represent 28:21–27
Pevny T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix[J]. Inform Forensics Sec IEEE Trans 5(2):215–224
Sedighi V, Cogranne R, Fridrich J (2016) Content-adaptive steganography by minimizing statistical detectability[J]. Inform Forensics Sec, IEEE Trans 11(2):221–234
Sedighi V, Fridrich J, Cogranne R (2015) Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model[C]. IS&T/SPIE Electron Imag. Int Soc Optics Photo: 94090H-94090H-13.
Xia Z, Wang X, Sun X et al (2016) Steganalysis of LSB matching using differences between nonadjacent pixels[J]. Multimed Tools Appl 75(4):1947–1962
Acknowledgments
The authors appreciate the anonymous reviewers and thank the members of DDE Laboratory in SUNY Binghamton for sharing their implementation codes. Also, the authors thank Professor Bin Li and his student Ming Wang from the College of Information Engineering, ShenZhen University, for providing the CMD code and useful advice.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Bian, Y., Tang, G., Gao, Z. et al. A distortion cost modification strategy for adaptive pentary steganography. Multimed Tools Appl 76, 20643–20662 (2017). https://doi.org/10.1007/s11042-016-3986-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-016-3986-x