Loading...

Secure steganography based on embedding capacity

Sajedi, H ; Sharif University of Technology | 2009

335 Viewed
  1. Type of Document: Article
  2. DOI: 10.1007/s10207-009-0089-y
  3. Publisher: 2009
  4. Abstract:
  5. Mostly the embedding capacity of steganography methods is assessed in non-zero DCT coefficients. Due to unequal distribution of non-zero DCT coefficients in images with different contents, images with the same number of non-zero DCT coefficients may have different actual embedding capacities. This paper introduces embedding capacity as a property of images in the presence of multiple steganalyzers, and discusses a method for computing embedding capacity of cover images. Using the capacity constraint, embedding can be done more secure than the state when the embedder does not know how much data can be hidden securely in an image. In our proposed approach, an ensemble system that uses different steganalyzer units determines the security limits for embedding in cover images. In this system, each steganalyzer unit is formed by a combination of multiple steganalyzers from the same type, which are sensitive to different payloads. The confidence of each steganalyzer on an image leads us to determine the upper bound of embedding rate for the image. Considering embedding capacity, the steganographer can minimize the risk of detection by selecting a proper cover image that is secure for a certain payload. Moreover, we analyzed the relation between complexity and embedding capacity of images. Experimental results showed the effectiveness of the proposed approach in enhancing the security of stego images. © Springer-Verlag 2009
  6. Keywords:
  7. Embedding capacity ; Ensemble method ; Image complexity ; Steganalysis ; Steganography ; Support vector machine ; Embedding capacity ; Ensemble method ; Image complexity ; Steganalysis ; Steganography ; Cosine transforms ; Discrete cosine transforms ; Image retrieval ; Support vector machines ; Cryptography
  8. Source: International Journal of Information Security ; Volume 8, Issue 6 , 2009 , Pages 433-445 ; 16155262 (ISSN)
  9. URL: https://link.springer.com/article/10.1007/s10207-009-0089-y