Volume 20, Issue 3 (12-2023)                   JSDP 2023, 20(3): 141-182 | Back to browse issues page


XML Persian Abstract Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Abdollahi B, Harati A, Taherinia A. A review of Content Adaptive Image Steganography methods. JSDP 2023; 20 (3) : 10
URL: http://jsdp.rcisp.ac.ir/article-1-1302-en.html
Ferdowsi University of Mashhad (FUM)
Abstract:   (668 Views)
Steganography is the art of transferring information through secret communication. The essential aim of steganography is to minimize the distortion caused by embedding the secret message; so that the image containing the message (stego) cannot be distinguished from the original image (cover), and the existence of the hidden message cannot be detected.
The distortion in content-adaptive steganography depends on the local structure of the image. The embedding changes into the areas with rich textures are less detectable than smooth areas, so the textured areas have a higher modification priority. In this regard, three main steganography approaches are proposed: model-based, cost-based, and adversarial. The model-based approach considers a statistical model for the cover image and tries to preserve this model during the embedding process. The cost-based one focuses on minimizing the distortion obtained from the sum of the heuristic costs of modified pixels. The adversarial approach uses the competition between steganography and steganalysis to improve the embedding performance.
In the first section of this paper, the concept of steganography and its history is expressed. Digital steganography including three types of cover synthesis, selection, and modification is introduced in the second section. The focus of this paper is on steganography based on the cover modification. The goal is to estimate the best probability distribution of modifications, and embedding the message in the estimated places is left to existing coding algorithms. In the third section, the problem of estimating the probability distribution is formulated as an optimization problem with the aim of distortion minimization. The distortion-based methods compute the probability distribution of embedding changes using a pre-defined distortion function. In the additive distortion function, the embedding changes are assumed to be independent. Thus, the distortion function cannot capture interactions between changes caused by embedding, and it leads the performance to suboptimality. In this regard, the non-additive distortion functions are presented that consider the dependencies among the modification of adjacent pixels. The distortion-based methods include two model-based and cost-based approaches are introduced in the fourth section. Then, their most significant methods are reviewed in the fifth section.
Considering the competitive nature of steganography and steganalysis, a new steganography approach is presented in the sixth section that takes advantage of adversarial learning to improve secrecy. Adversarial learning includes two strategies: Generative adversarial networks (GANs) and adversarial attacks. In the concept of steganography, the GAN-based strategy tries to train the steganographic network against a steganalysis network. This is an iterative and dynamic game between steganographic and steganalysis networks to reach the Nash equilibrium. Another strategy attempts to simulate an adversarial attack and generate stego images that deceive the steganalysis network. The adversarial-based steganography methods are reviewed in the seventh section.
In the eighth section, different methods are compared from various points of view. The results of this study show that some techniques, such as smoothing the embedding changes, considering the interactions between the changes, using side-informed information, and exploring adversarial networks, can help to estimate the proper embedding probability map and improve performance and security. In the ninth section, suggestions are stated that can be considered for future research. Finally, the conclusion is expressed in the tenth section.
 
Article number: 10
Full-Text [PDF 2169 kb]   (134 Downloads)    
Type of Study: Research | Subject: Paper
Received: 2022/03/4 | Accepted: 2023/07/18 | Published: 2024/01/14 | ePublished: 2024/01/14

References
1. [1] Fridrich, J. Steganography in digital media: principles, algorithms, and applications. Cambridge University Press, 2009.
2. [2] Kipper, G. Investigator's guide to steganography. crc press, 2003.
3. [3] Bacon, F. and Watts, G., "Of the advancement and proficience of learning, or, the partitions of sciences, ix bookes," 1983.
4. [4] Britannica, E., "A dictionary of arts, sciences, and general literature," Edinburgh: Adam and Charles Black, 1875.
5. [5] Simmons, G. J., "The prisoners' problem and the subliminal channel," in Advances in Cryptology, pp.51-67, Springer, 1984.
6. [6] Ker, A. D., Bas, P., Böhme, R., Cogranne, R., Craver, S., Filler, T., Fridrich, J., and Pevnỳ, T., "Moving steganography and steganalysis from the laboratory into the real world," in Proceedings of the first ACM workshop on Information hiding and multimedia security, pp.45-58, 2013.
7. [7] Holub, V. and others,. Content Adaptive Steganography: Design and Detection. Citeseer, 2014.
8. [8] Fridrich, J., Soukal, D., "Matrix embedding for large payloads", Information Forensics and Security, IEEE Transactions on, Vol. 1, pp. 390-395, 2006.
9. [9] Gao, Y., Li, X., Zeng, T., Yang, B., "Improving embedding efficiency via matrix embedding: a case study", in Image Processing (ICIP), 16th IEEE International Conference on, pp. 109-112, 2009.
10. [10] Zhang, X., Zhang, W., Wang, S., "Efficient double-layered steganographic embedding", Electronics letters, Vol. 43, pp. 482-483, 2007.
11. [12] Mahdavi M, Samavi S, Khodami E. Steganography in Halftone Images based on Relative Complexity of Pixels. Journal of Iranian Association of Electrical and Electronics Engineers, 6 (1) :37-49, 2009.
12. [14] Soleimani, R, Haghbin, S, Niazi, M, "A New Method of Comparative Steganography with Scalable Capacity and High Visual Quality," Quarterly Journal of Modern Defense Science and Technology. No. 4, pp. 1-14, 2013
13. [16] Pourmohammadali, A, Pourmohiabadi, M, Nezamabadi, H, "Safe steganography based on matrix embedding to increase embedding rate and efficiency," Journal of Machine Vision and Image Processing, No. 4, pp. 17-28, 2017
14. [18] Fateh, M., Rezvani, M. and Irani, Y., A new method of coding for steganography based on LSB matching revisited. Security and Communication Networks, pp.1-15, 2021.
15. [19] Bhardwaj, R. and Sharma, V., Image steganography based on complemented message and inverted bit LSB substitution. Procedia Computer Science, 93, pp.832-838, 2016.
16. [20] Sahu, A.K. and Swain, G., High fidelity based reversible data hiding using modified LSB matching and pixel difference. Journal of King Saud University-Computer and Information Sciences, 34(4), pp.1395-1409, 2022.
17. [21] Noorazar, A, Nowruzi, Z, Mir, M, "Providing an improved method for image steganography based on linear code features," Electronic and cyber defense. No. 5, pp. 43-53, 2017
18. [24] Sabeti, V, Ahmadi, S, "Adaptive steganography of images in the difference of discrete cosine coefficients," Journal of Soft Computing and Information Technology. No. 9, pp. 55-66, 2019
19. [25] Filler, T. and Fridrich, J., "Gibbs construction in steganography," IEEE Transactions on Information Forensics and Security, vol.5, no.4, pp.705-720, 2010.
20. [26] Li, B., Tan, S., Wang, M., and Huang, J., "Investigation on cost assignment in spatial image steganography," IEEE Transactions on Information Forensics and Security, vol.9, no.8, pp.1264-1277, 2014.
21. [27] Pevný, T., Filler, T., and Bas, P., "Using high-dimensional image models to perform highly undetectable steganography," in International Workshop on Information Hiding, pp.161-177, Springer, 2010.
22. [28] Holub, V. and Fridrich, J., "Designing steganographic distortion using directional filters," in 2012 IEEE International workshop on information forensics and security (WIFS), pp.234-239, IEEE, 2012.
23. [29] Holub, V., Fridrich, J., and Denemark, T., "Universal distortion function for steganography in an arbitrary domain," EURASIP Journal on Information Security, vol.2014, no.1, p.1, 2014.
24. [30] Fridrich, J. and Kodovský, J., "Multivariate gaussian model for designing additive distortion for steganography," in 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, pp.2949-2953, IEEE, 2013.
25. [31] Sedighi, V., Cogranne, R., and Fridrich, J., "Content ¬adaptive steganography by minimizing statistical detectability," IEEE Transactions on Information Forensics and Security, vol.11, no.2, pp.221-234, 2015.
26. [32] Sedighi, V., Fridrich, J., and Cogranne, R., "Content ¬adaptive pentary steganography using the multivariate generalized Gaussian cover model," in Media Watermarking, Security, and Forensics 2015, vol.9409, pp.144-156, International Society for Optics and Photonics, 2015.
27. [33] Li, B., Wang, M., Huang, J., and Li, X., "A new cost function for spatial image steganography," in 2014 IEEE International Conference on Image Processing (ICIP), pp.4206-4210, IEEE, 2014.
28. [34] Li, B., Wang, M., Li, X., Tan, S., and Huang, J., "A strategy of clustering modification directions in spatial image steganography," IEEE Transactions on Information Forensics and Security, vol.10, no.9, pp.1905-1917, 2015.
29. [35] Denemark, T. and Fridrich, J., "Improving steganographic security by synchronizing the selection channel," in Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, pp.5-14, ACM, 2015.
30. [36] Zhang, W., Zhang, Z., Zhang, L., Li, H., and Yu, N., "Decomposing joint distortion for adaptive steganography," IEEE Transactions on Circuits and Systems for Video Technology, vol.27, no.10, pp.2274-2280, 2016.
31. [37] Su, W., Ni, J., Hu, X., and Fridrich, J., "Image steganography with symmetric embedding using gaussian markov random field model," IEEE Transactions on Circuits and Systems for Video Technology, 2020.
32. ]38[ عبدالهی, بهناز, هراتی, احد, طاهری‌نیا, امیرحسین. "پنهان‌نگاری متقارن مبتنی بر استنتاج میدان متوسط"، علوم رایانش و فناوری اطلاعات, 1401.
33. [39] B. Abdollahi, A. Harati, and A. Taherinia, "Non-additive image steganographic framework based on variational inference in Markov Random Fields," Journal of Information Security and Applications, vol. 68, p. 103254, 2022.
34. [40] Denemark, T., Sedighi, V., Holub, V., Cogranne,R., and Fridrich, J., "Side-informed steganography with additive distortion," In IEEE International Workshop on Information Forensics and Security, Rome, Italy,
35. November 16-19 2015.
36. [41] T. Denemark and J. Fridrich. "Model based steganography with precover," In A. Alattar and N. D. Memon, editors, Proceedings IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2017, San Francisco, CA, January 29-February 1, 2017.
37. [42] T. Denemark, "Side-Information For Steganography Design And Detection", State University of New York at Binghamton, 2018.
38. [43] Boroumand, M., Fridrich, J., "Synchronizing embedding changes in side-informed steganography", Electronic Imaging, vol 2020, no 4, bll 290-291, 2020
39. [44] W. Su, J. Ni, X. Li, and Y. Q. Shi, "A new distortion function design for jpeg steganography using the generalized uniform embedding strategy," IEEE Transactions on Circuits and Systems for Video Technology, vol. 28, no. 12, pp. 3545-3549, 2018.
40. [45] L. Guo, J. Ni, W. Su, C. Tang, and Y. Q. Shi, "Using statistical image model for JPEG steganography: Uniform embedding revisited," IEEE Transactions on Information Forensics and Security, vol. 10, no. 12, pp. 2669-2680, 2015.
41. [46] X. Hu, J. Ni, and Y. Q. Shi, "Efficient jpeg steganography using domain transformation of embedding entropy," IEEE Signal Processing Letters, vol. 25, no. 6, pp. 773-777, 2018.
42. [47] K. Chen, H. Zhou, W. Zhou, W. Zhang, and N. Yu, "Defining cost functions for adaptive jpeg steganography at the microscale," IEEE Transactions on Information Forensics and Security, vol. 14, no. 4, pp. 1052-1066, 2019.
43. [48] X. Liao, Y. Yu, B. Li, Z. Li, en Z. Qin, "A new payload partition strategy in color image steganography", IEEE Transactions on Circuits and Systems for Video Technology, vol 30, no 3, bll 685-696, 2019.
44. [49] Q. Giboulot, R. Cogranne, and P. Bas. Synchronization Minimizing Statistical Detectability for Side-Informed JPEG Steganography. In IEEE International Workshop on Information Forensics and Security, New York, NY, December 6-11, 2020.
45. [50] J. Butora and J. Fridrich. Steganography and its detection in JPEG images obtained with the "trunc" quantizer. In Proceedings IEEE, International Conference on Acoustics, Speech, and Signal Processing, Barcelona, Spain, May 4-8, 2020.
46. [51] R. Cogranne, Q. Giboulot, en P. Bas, "Efficient Steganography in JPEG Images by Minimizing Performance of Optimal Detector", IEEE Transactions on Information Forensics and Security, 2021.
47. [52] Filler, T., Judas, J., and Fridrich, J., "Minimizing additive distortion in steganography using syndrome¬trellis codes," IEEE Transactions on Information Forensics and Security, vol.6, no.3, pp.920-935, 2011.
48. [53] Pevny, T., Bas, P., and Fridrich, J., "Steganalysis by subtractive pixel adjacency matrix," IEEE Transactions on information Forensics and Security, vol.5, no.2, pp.215-224, 2010.
49. [54] Fridrich, J. and Kodovsky, J., "Rich models for steganalysis of digital images," IEEE Transactions on Information Forensics and Security, vol.7, no.3, pp.868-882, 2012.
50. [55] Goodfellow, I., Pouget¬Abadie, J., Mirza, M., Xu, B., Warde¬Farley, D., Ozair, S., Courville, A., and Bengio, Y., "Generative adversarial nets," in Advances in neural information processing systems, pp.2672-2680,2014
51. [56] Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I., and Fergus, R., "Intriguing properties of neural networks," arXiv preprint arXiv:1312.6199, 2013.
52. [57] Zhang, Y., Zhang, W., Chen, K., Liu, J., Liu, Y., and Yu, N., "Adversarial examples against deep neural network based steganalysis," in Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, pp.67-72.2018.
53. [58] Tang, W., Li, B., Tan, S., Barni, M., and Huang, J., "Cnn¬ based adversarial embedding for image steganography," IEEE Transactions on Information Forensics and Security, vol.14, no.8, pp.2074-2087, 2019.
54. [59] Ma, S., Zhao, X., and Liu, Y., "Adaptive spatial steganography based on adversarial examples," Multimedia Tools and Applications, vol.78, no.22, pp.32503-32522, 2019.
55. [60] Liu, M., Song, T., Luo, W., Zheng, P. and Huang, J., "Adversarial steganography embedding via stego generation and selection" IEEE Transactions on Dependable and Secure Computing, 2022.
56. [61] Qin, X., Li, B., Tan, S., Tang, W., Huang , en J., "Gradually Enhanced Adversarial Perturbations on Color Pixel Vectors for Image Steganography", IEEE Transactions on Circuits and Systems for Video Technology, 2022.
57. [62] Tang, W., Tan, S., Li, B., and Huang, J., "Automatic steganographic distortion learning using a generative adversarial network," IEEE Signal Processing Letters, vol.24, no.10, pp.1547-1551, 2017.
58. [63] Yang, J., Ruan, D., Huang, J., Kang, X., and Shi, Y.¬Q., "An embedding cost learning framework using gan," IEEE Transactions on Information Forensics and Security, vol.15, pp.839-851, 2019.
59. [64] Li, F., Yu, Z. and Qin, C.," GAN-based spatial image steganography with cross feedback mechanism" Signal Processing, 190, p.108341, 2022.
60. [65] Kodovsky, J., Fridrich, J., and Holub, V., "On dangers of overtraining steganography to incomplete cover model," in Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, pp.69-76, 2011.
61. [66] Kouider, S., Chaumont, M., and Puech, W., "Adaptive steganography by oracle (aso)," in 2013 IEEE International Conference on Multimedia and Expo (ICME), pp.1-6, IEEE, 2013.
62. [67] Zhang, K. A., Cuesta¬Infante, A., Xu, L., and Veeramachaneni, K., "Steganogan: high capacity image steganography with gans," arXiv preprint arXiv:1901.03892, 2019.
63. [68] Yedroudj, M., Comby, F., and Chaumont, M., "Steganography using a 3¬player game," Journal of Visual Communication and Image Representation, p.102910, 2020.
64. [69] W. Shi and S. Liu, "Hiding Message Using a Cycle Generative Adversarial Network," ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), 2022.
65. [70] Bas, P., Filler, T., and Pevný, T., "break our steganographic system": the ins and outs of organizing boss," in International workshop on information hiding, pp.59-70, Springer, 2011.
66. [71] Denemark, T., Sedighi, V., Holub, V., Cogranne, R., and Fridrich, J., "Selection -channel¬ aware rich model for steganalysis of digital images," in 2014 IEEE International Workshop on Information Forensics and Security (WIFS), pp.48-53, IEEE, 2014.
67. [72] Ker, A. D., Pevny, T., and Bas, P., "Rethinking optimal embedding," in Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, pp.93-102, 2016.
68. [73] Butora, J., Yousfi, Y., and Fridrich, J., "Turning cost ¬based steganography into model¬ based," in Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security, pp.151-159, 2020.

Add your comments about this article : Your username or Email:
CAPTCHA

Send email to the article author


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

© 2015 All Rights Reserved | Signal and Data Processing