Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Effect of Cover Quantization on Steganographic Fisher Information

Published: 01 February 2013 Publication History

Abstract

The square-root law of imperfect steganography ties the embedding change rate and the cover length with statistical detectability. In this paper, we extend the law to consider the effects of cover quantization. Assuming the individual cover elements are quantized i.i.d. samples drawn from an underlying continuous-valued “precover” distribution, the steganographic Fisher information scales as $\triangle^{s}$, where $\triangle$ is the quantization step and $s$ is determined jointly by the smoothness of the precover distribution and the properties of the embedding function. This extension is relevant for understanding the effects of the pixel color depth and the JPEG quality factor on the length of secure payload.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security  Volume 8, Issue 2
February 2013
147 pages

Publisher

IEEE Press

Publication History

Published: 01 February 2013

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Information theoretic steganalysis of processed image LSB steganographyMultimedia Tools and Applications10.1007/s11042-022-13931-882:9(13595-13615)Online publication date: 26-Sep-2022
  • (2020)Simulating Suboptimal Steganographic EmbeddingProceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security10.1145/3369412.3395071(121-126)Online publication date: 22-Jun-2020
  • (2019)AHCMIEEE Transactions on Information Forensics and Security10.1109/TIFS.2019.289520014:8(2217-2231)Online publication date: 1-Aug-2019
  • (2017)An embedding mechanism for natural steganography after down-sampling2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)10.1109/ICASSP.2017.7952532(2127-2131)Online publication date: 5-Mar-2017
  • (2015)What makes the stego image undetectable?Proceedings of the 7th International Conference on Internet Multimedia Computing and Service10.1145/2808492.2808539(1-6)Online publication date: 19-Aug-2015
  • (2015)Steganographic schemes with multiple q-ary changes per block of pixelsSignal Processing10.1016/j.sigpro.2014.09.008108:C(206-219)Online publication date: 1-Mar-2015
  • (2015)Multi-layer assignment steganography using graph-theoretic approachMultimedia Tools and Applications10.1007/s11042-014-2050-y74:18(8171-8196)Online publication date: 1-Sep-2015
  • (2013)Moving steganography and steganalysis from the laboratory into the real worldProceedings of the first ACM workshop on Information hiding and multimedia security10.1145/2482513.2482965(45-58)Online publication date: 17-Jun-2013
  • (2013)Digital image steganography using universal distortionProceedings of the first ACM workshop on Information hiding and multimedia security10.1145/2482513.2482514(59-68)Online publication date: 17-Jun-2013

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media