首页> 外文OA文献 >Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography
【2h】

Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography

机译:利用秘密和掩盖图像之间的相似性来提高数字隐写术中的嵌入效率和安全性

摘要

The rapid advancements in digital communication technology and huge increase in computer power have generated an exponential growth in the use of the Internet for various commercial, governmental and social interactions that involve transmission of a variety of complex data and multimedia objects. Securing the content of sensitive as well as personal transactions over open networks while ensuring the privacy of information has become essential but increasingly challenging. Therefore, information and multimedia security research area attracts more and more interest, and its scope of applications expands significantly. Communication security mechanisms have been investigated and developed to protect information privacy with Encryption and Steganography providing the two most obvious solutions. Encrypting a secret message transforms it to a noise-like data which is observable but meaningless, while Steganography conceals the very existence of secret information by hiding in mundane communication that does not attract unwelcome snooping. Digital steganography is concerned with using images, videos and audio signals as cover objects for hiding secret bit-streams. Suitability of media files for such purposes is due to the high degree of redundancy as well as being the most widely exchanged digital data. Over the last two decades, there has been a plethora of research that aim to develop new hiding schemes to overcome the variety of challenges relating to imperceptibility of the hidden secrets, payload capacity, efficiency of embedding and robustness against steganalysis attacks. Most existing techniques treat secrets as random bit-streams even when dealing with non-random signals such as images that may add to the toughness of the challenges.This thesis is devoted to investigate and develop steganography schemes for embedding secret images in image files. While many existing schemes have been developed to perform well with respect to one or more of the above objectives, we aim to achieve optimal performance in terms of all these objectives. We shall only be concerned with embedding secret images in the spatial domain of cover images.udThe main difficulty in addressing the different challenges stems from the fact that the act of embedding results in changing cover image pixel values that cannot be avoided, although these changes may not be easy to detect by the human eye. These pixel changes is a consequence of dissimilarity between the cover LSB plane and the secretimage bit-stream, and result in changes to the statistical parameters of stego-image bit-planes as well as to local image features. Steganalysis tools exploit these effects to model targeted as well as blind attacks. These challenges are usually dealt with by randomising the changes to the LSB, using different/multiple bit-planes to embed one or more secret bits using elaborate schemes, or embedding in certain regions that are noise-tolerant. Our innovative approach to deal with these challenges is first to develop some image procedures and models that result in increasing similarity between the cover image LSB plane and the secret image bit-stream. This will be achieved in two novel steps involving manipulation of both the secret image and the cover image, prior to embedding, that result a higher 0:1 ratio in both the secret bit-stream and the cover pixels‘ LSB plane.udFor the secret images, we exploit the fact that image pixel values are in general neither uniformly distributed, as is the case of random secrets, nor spatially stationary. We shall develop three secret image pre-processing algorithms to transform the secret image bit-stream for increased 0:1 ratio. Two of these are similar, but one in the spatial domain and the other in the Wavelet domain. In both cases, the most frequent pixels are mapped onto bytes with more 0s. The third method, process blocks by subtracting their means from their pixel values and hence reducing the require number of bits to represent these blocks. In other words, this third algorithm also reduces the length of the secret image bit-stream without loss of information. We shall demonstrate that these algorithms yield a significant increase in the secret image bit-stream 0:1 ratio, the one that based on the Wavelet domain is the best-performing with 80% ratio.For the cover images, we exploit the fact that pixel value decomposition schemes, based on Fibonacci or other defining sequences that differ from the usual binary scheme, expand the number of bit-planes and thereby may help increase the 0:1 ratio in cover image LSB plane. We investigate some such existing techniques and demonstrate that these schemes indeed lead to increased 0:1 ratio in the corresponding cover image LSB plane. We also develop a new extension of the binary decomposition scheme that is the best-performing one with 77% ratio.udWe exploit the above two steps strategy to propose a bit-plane(s) mapping embedding technique, instead of bit-plane(s) replacement to make each cover pixel usable for secret embedding. This is motivated by the observation that non-binary pixel decomposition schemes also result in decreasing the number of possible patterns for the three first bit-planes to 4 or 5 instead of 8. We shall demonstrate that the combination of the mapping-based embedding scheme and the two steps strategy produces stego-images that have minimal distortion, i.e. reducing the number of the cover pixels changes after message embedding and increasing embedding efficiency. We shall also demonstrate that these schemes result in reasonable stego-image quality and are robust against all the targeted steganalysis tools but not against the blind SRM tool.udWe shall finally identify possible future work to achieve robustness against SRM at some payload rates and further improve stego-image quality.
机译:数字通信技术的飞速发展和计算机能力的巨大提高,已使互联网用于涉及各种复杂数据和多媒体对象传输的各种商业,政府和社会互动的使用呈指数增长。在确保信息私密性的同时,确保开放网络上敏感交易和个人交易内容的安全已变得至关重要,但挑战也越来越大。因此,信息和多媒体安全研究领域引起了越来越多的兴趣,其应用范围也大大扩展。已对通信安全机制进行了研究和开发,以通过提供两种最明显的解决方案的加密和隐写术来保护信息隐私。加密秘密消息会将其转换为可观察到但毫无意义的类似噪声的数据,而隐秘术则通过隐藏在平常的通信中来掩盖秘密信息的存在,这种通信不会引起不受欢迎的监听。数字隐写术涉及使用图像,视频和音频信号作为掩盖对象来隐藏秘密比特流。媒体文件对此类目的的适用性是由于高度的冗余以及交换最广泛的数字数据所致。在过去的二十年中,进行了大量的研究,旨在开发新的隐藏方案,以克服与隐藏秘密的不可感知性,有效负载能力,嵌入效率和抵抗隐写分析攻击的鲁棒性有关的各种挑战。即使处理诸如图像之类的非随机信号时,大多数现有技术仍将秘密视为随机比特流,这可能会增加挑战的难度。本文致力于研究和开发将秘密图像嵌入图像文件中的隐写方案。尽管已经开发出许多现有方案来实现上述一个或多个目标的良好性能,但我们旨在实现所有这些目标的最佳性能。我们将只关注将秘密图像嵌入到封面图像的空间域中。 ud解决不同挑战的主要困难源于以下事实:嵌入行为导致更改封面图像像素值是无法避免的,尽管这些变化可能不容易被人眼察觉。这些像素变化是覆盖LSB平面和秘密图像位流之间不相似的结果,并导致隐身图像位平面的统计参数以及局部图像特征发生变化。隐身分析工具利用这些效果对目标攻击和盲目攻击进行建模。这些挑战通常通过以下方式解决:将LSB的变化随机化,使用不同/多个位平面,通过精心设计的方案嵌入一个或多个秘密比特,或嵌入某些耐噪声的区域。我们应对这些挑战的创新方法是,首先开发一些图像处理程序和模型,以使封面图像LSB平面与秘密图像比特流之间的相似度不断提高。这将通过两个新颖的步骤来实现,其中涉及在嵌入之前对秘密图像和覆盖图像进行操作,从而在秘密比特流和覆盖像素的LSB平面中产生更高的0:1比率。机密图像,我们利用这样一个事实,即图像像素值通常不像随机机密一样均匀分布,也不在空间上固定。我们将开发三种秘密图像预处理算法,以将秘密图像比特流转换为增加的0:1比率。其中两个是相似的,但一个在空间域,另一个在小波域。在这两种情况下,最频繁的像素都映射到具有更多0的字节上。第三种方法是通过从像素值中减去其均值来处理块,从而减少表示这些块所需的位数。换句话说,该第三算法还减小了秘密图像比特流的长度,而不会丢失信息。我们将证明这些算法在秘密图像比特流0:1的比例上有显着提高,基于小波域的算法的最佳性能是80%的比例。对于封面图像,我们利用以下事实:基于斐波那契或不同于常规二进制方案的其他定义序列的像素值分解方案扩展了位平面的数量,从而可以帮助增加封面图像LSB平面中的0:1比率。我们研究了一些这样的现有技术,并证明了这些方案确实导致相应的封面图像LSB平面中0:1比率增加。我们还开发了二进制分解方案的新扩展,它是性能最高的二进制分解方案,比率为77%。 ud我们利用以上两步策略提出了一种位平面映射嵌入技术,而不是替换位平面,以使每个覆盖像素可用于秘密嵌入。这是因为观察到非二进制像素分解方案还导致将三个第一位平面的可能模式的数量减少到4或5而不是8。我们将证明基于映射的嵌入方案的组合而两步策略产生的隐身图像具有最小的失真,即减少了嵌入消息后覆盖像素变化的数量并提高了嵌入效率。我们还将证明这些方案可产生合理的隐秘图像质量,并且对所有目标隐写分析工具均具有鲁棒性,但对盲目SRM工具则不具鲁棒性。提高隐身图像质量。

著录项

  • 作者

    Abdulla Alan Anwer;

  • 作者单位
  • 年度 2015
  • 总页数
  • 原文格式 PDF
  • 正文语种 en
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号