Abstract
Most modern secure image steganographic schemes define distortion functions for constraining the embedding changes to those parts of the image that are difficult to model such as textured or noisy regions. However, thus arguments disregard Kerckhoffs’ principle: the warden also knows the adaptivity criterion as well and may be able reproduce or estimate it. This paper proposes a new idea that the embedding distortion is designed based on game theory. We present a two-player zero-sum game between steganographer and attacker related to the security of practical steganography, and there exists a unique mixed strategy Nash equilibrium. The distortion function is first achieved from the original method S-UNIWARD (Spatial-UNIversal Wavelet Relative Distortion), and then we readjust the distortion function according to the above Nash equilibrium. The new distortion not only ensures the embedding changes focus on textured region but also correlates to the Kerckhoffs’ principle. Experiment results show that the statistical security of the proposed method is improved by approximately 6.2 % with the features of modern rich models.




Similar content being viewed by others
References
Bas P, Filler T, Pevny T (2011) Break our steganographic system-the ins and outs of organizing boss. In: Proceedings of international workshop on information hiding, Springer, pp 59–70
Böhme R (2009) An epistemological approach to steganography. In: Proceedings of international workshop on information hiding, Springer, pp 15–30
Bohme R (2010) Advanced statistical steganalysis. Springer, Berlin
Cayre F, Bas P (2008) Kerckhoffs-based embedding security classes for WOA data hiding. IEEE Trans Inf Forensic Secur 3(1):1–15
Denemark T, Sedighi V, Holub V, Cogranne R, Fridrich J (2014) Selection-channel-aware rich model for steganalysis of digital images. In: Proceeding of IEEE international workshop on information forensics and security, pp 48–53
Ettinger M (1998) Steganalysis and game equilibria. In: Proceedings of international workshop on information hiding, Springer, pp 319–328
Filler T, Fridrich J (2010) Minimizing additive distortion functions with non-binary embedding operation in steganography. In: Proceedings of IEEE workshop on information forensics and security, pp 1–6
Filler T, Ker AD, Fridrich J (2009) The square root law of steganographic capacity for markov covers. In: Proceedings of SPIE international society for optical engineering, media forensics and security, pp 08–18
Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using Syndrome-Trellis Codes. IEEE Trans Inf Forensic Secur 6(3):920–935
Fridrich J (2009) Steganography in digital media: principles, algorithms, and applications. Cambridge Univisity Press, Cambridge
Fridrich J, Filler T (2007) Practical methods for minimizing embedding impact in steganography. In: Proceedings of electronic imaging, security, steganography, and watermarking of multimedia contents IX, pp 02–03
Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensic Secur 7(3):868–882
Fridrich J, Goljan M, Lisonek P, Soukal D (2005) Writing on wet paper. IEEE Trans Signal Process 53(10):3923–3935
Fridrich J, Golian M, Soukal D (2006) Wet paper codes with improved embedding efficiency. IEEE Trans Inf Forensic Secur 1(1):102–110
Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: Proceedings of IEEE workshop on information forensic and security, pp 234–239
Holub V, Fridrich J, Denemark T (2014) Universal distortion function for steganography in an arbitrary domain. Eurasip J Inf Secur 1:1–13
Johnson B, Schottle P, Böhme R (2012) Where to hide the bits? In: Proceedings of international conference on decision and game theory for security, Springer, pp 1–17
Ker AD (2007) Batch steganography and the threshold game. In: Proceedings of SPIE international society for optical engineering, media forensics and security, pp 0401–0413
Kerckhoffs A (1883) La cryptographie militaire. J Sci Mil IX:5–38
Kodovsky J, Fridrich J, Holub V (2011) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensic Secur 7(2):432–444
Li B, Wang M, Huang J, Li X (2014) A new cost function for spatial image steganography. In: Proceedings of IEEE international conference on image process, pp 4206–4210
Liao X, Shu C (2015) Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J Vis Commun Image Represent 28(4):21–27
Nash J (1951) Non-cooperative games. Ann Math 54:286–295
Niu K, Li J, Liu J, Yang XY (2015) Strategic adaptive steganography based on game theory model. J Xidian Univ 42(4):165–170
Pevný T, Bas P, Fridrich J (2010a) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensic Secur 5(2):215–224
Pevný T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: Proceedings of international workshop on information hiding, Springer, pp 161–177
Qin C, Chang C-C, Chiu Y-P (2014) A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Trans Image Process 23(3):969–978
Schoettle P, Laszka A, Johnson B, Grossklags J, Böhme R. (2013) A game-theoretic analysis of content-adaptive ste-ganography with independent embedding. In: Proceedings of European signal processing conference, pp 1–5
Schottle P, Böhme R (2013) A game-theoretic approach to content-adaptive steganography. In: Proceedings of international conference on information hiding, Springe, pp.125-141
Sedighi V, Fridrich J, Cogranne R (2015) Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model. In: Proceedings of SPIE media watermarking, security and forensics, pp 1–13
Tang W, Li H, Luo W, Huang J (2014) Adaptive steganalysis against WOW embedding algorithm. In: Procedding of ACM workshop on information hiding and multimedia security, pp. 91–96
Xia Z, Wang X, Sun X, Liu Q, Xiong N (2014a) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed Tools Appl 75(4):1947–1962
Xia Z, Wang X, Sun X, Wang B (2014b) Steganalysis of least significant bit matching using multi-order differences. Secur Commun Netw 7(8):1283–1291
Acknowledgments
This work is supported by the National Natural Science Foundation of China (Grant No. 61379152, No. 61402162), Hunan Provincial Natural Science Foundation of China (Grant No. 14JJ7024), and Specialized Research Fund for the Doctoral Program of Higher Education (Grant No. 20130161120004).
Author information
Authors and Affiliations
Corresponding authors
Rights and permissions
About this article
Cite this article
Li, J., Yang, X., Liao, X. et al. A game-theoretic method for designing distortion function in spatial steganography. Multimed Tools Appl 76, 12417–12431 (2017). https://doi.org/10.1007/s11042-016-3632-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-016-3632-7