Abstract
Currently, the most successful approach to steganography in digital image is distortion-minimization framework, which reduces the steganographers’ work to the design of distortion function with the aid of practical coding schemes. Previous distortion functions for spatial images are all position dependent, in which cost is determined by the relationships between neighboring pixels. Noticing that Gamma encoding is usually involved in image preprocessing in many cameras or image processing software, which causes some pixels to change greatly, we believe these pixels sensitive to Gamma encoding are more suitable for modification, because they are hard to model due to their large variations. Inspired by this idea, we proposed a position independent scheme, where the cost is only linked to the gray level. The effectiveness of our work is verified by extensive experimental results, which reveal an interesting relationship between steganographic costs and gray levels. The speed test shows that the speed of proposed scheme is very high thus suitable to be used in the real-time applications.
Similar content being viewed by others
References
Alattar AM (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13(8):1147–1156
Bas P, Filler T, Pevnỳ T (2011) break our steganographic system: the ins and outs of organizing boss Information hiding. Springer, pp 59–70
Bas P, Furon T (2007) Bows2-original. http://bows2.ec-lille.fr/
Denemark T, Fridrich J (2015) Improving steganographic security by synchronizing the selection channel Proceedings of the 3rd ACM workshop on information hiding and multimedia security. ACM, pp 5–14
Filler T, Fridrich J (2010) Gibbs construction in steganography. IEEE Trans Inf Forensic Secur 5(4):705–720
Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inf Forensic Secur 6(3):920–935
Fridrich J (2009) Steganography in digital media: principles, algorithms, and applications. Cambridge University Press
Fridrich J, Filler T (2007) Practical methods for minimizing embedding impact in steganography Electronic imaging 2007. International Society for Optics and Photonics, pp 650,502–650,502
Fridrich J, Kodovskỳ J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensic Secur 7(3):868–882
Fridrich J, Kodovskỳ J (2013) Multivariate gaussian model for designing additive distortion for steganography ICASSP, pp 2949–2953
Guo L, Ni J, Shi YQ (2012) An efficient jpeg steganographic scheme using uniform embedding 2012 IEEE international workshop on information forensics and security (WIFS). IEEE, pp 169–174
Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters 2012 IEEE international workshop on information forensics and security (WIFS). IEEE, pp 234–239
Holub V, Fridrich J (2013) Digital image steganography using universal distortion Proceedings of the first ACM workshop on information hiding and multimedia security. ACM, pp 59–68
Huang F, Huang J, Shi YQ (2012) New channel selection rule for jpeg steganography. IEEE Trans Inf Forensic Secur 7(4):1181–1191
Kodovskỳ J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensic Secur 7(2):432–444
Kodovskỳ J, Pevnỳ T, Fridrich J (2010) Modern steganalysis can detect yass IS&T/SPIE electronic imaging. International Society for Optics and Photonics, pp 754,102–754,102
Li B, He J, Huang J, Shi YQ (2011) A survey on image steganography and steganalysis. J Inf Hiding Multimed Signal Process 2(2):142–172
Li B, Tan S, Wang M, Huang J (2014) Investigation on cost assignment in spatial image steganography. IEEE Trans Inf Forensic Secur 9(8):1264–1277
Li B, Wang M, Huang J, Li X (2014) A new cost function for spatial image steganography 2014 IEEE international conference on image processing (ICIP). IEEE, pp 4206–4210
Li B, Wang M, Li X, Tan S, Huang J (2015) A strategy of clustering modification directions in spatial image steganography. IEEE Trans Inf Forensic Secur 10(9):1905–1917
Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circ Syst Video Technol 16(3):354–362
Pevnỳ T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensic Secur 5(2):215–224
Pevnỳ T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography Information hiding. Springer, pp 161–177
Pevnỳ T, Fridrich J (2008) Benchmarking for steganography Information hiding. Springer, pp 251–267
Poynton CA (1998) Rehabilitation of gamma Photonics west’98 electronic imaging. International Society for Optics and Photonics, pp 232–249
Qin C, Chang CC, Hsu TJ (2015) Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimed Tools Appl 74(15):5861–5872
Qin C, Hu YC (2016) Reversible data hiding in vq index table with lossless coding and adaptive switching mechanism. Signal Process 129:48–55
Sedighi V, Cogranne R, Fridrich J (2016) Content-adaptive steganography by minimizing statistical detectability. IEEE Trans Inf Forensic Secur 11(2):221–234
Sedighi V, Fridrich J, Cogranne R (2015) Content-adaptive pentary steganography using the multivariate generalized gaussian cover model IS&T/SPIE electronic imaging. International Society for Optics and Photonics, pp 94,090H–94,090H
Thodi DM, Rodríguez JJ (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16(3):721–730
Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circ Systems Video Technol 13(8):890–896
Zhang W, Zhang Z, Zhang L, Li H, Yu N (2016) Decomposing joint distortion for adaptive steganography. IEEE Transactions on Circuits and Systems for Video Technology
Acknowledgements
This work was supported in part by the Natural Science Foundation of China under Grant U1636201, 61572452.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wei, Y., Zhang, W., Li, W. et al. Which gray level should be given the smallest cost for adaptive steganography?. Multimed Tools Appl 77, 17861–17874 (2018). https://doi.org/10.1007/s11042-017-4565-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-4565-5