Author : Ashly George 1
Date of Publication :18th October 2019
Abstract: Steganography is an emerging area which is used for secured data transmission over any public media. It is a process that involves hiding a message in an appropriate carrier like image or audio. The most successful approach to steganography in digital images is to embed the payload while minimizing a suitably defined distortion function. This concept allows the stenographer to evaluate distortion caused by embedding changes based on local image content, hence the name content adaptive steganography. The sender specifies the costs of changing each cover element and then embeds a given payload by minimizing the total embedding cost. The actual embedding algorithm is realized using syndrometrellis codes to minimize the expected distortion for a given payload
Reference :
-
- Vahid Sedighi, Remi Cogranne, Jessica Fridrich ”Content-Adaptive Steganography by Minimizing Statistical Detectability” IEEE Transactions on Information Forensics and Security, vol.11, Issue.2, pp.1-14, February 2016.
- T. Pevny, T. Filler, and P. Bas, Using high-dimensional image models to perform highly undetectable steganography Information Hiding,12th International Conference, vol.6387 of LNCS, (Calgary, Canada), pp.161177, Springer-Verlag, New York, June 2830, 2010.
- V. Holub and J. Fridrich, Designing steganographic distortion using directional filters, Proc. IEEE WIFS, (Tenerife, Spain), December 25, 2012.
- V. Holub, J. Fridrich, and T. Denemark, Universal distortion design for steganography in an arbitrary domain, EURASIP Journal on Information Security, Special Issue on Revised Selected Papers of the 1st ACM IH and MMS Workshop, vol.1, 2014
- B. Li, M. Wang, and J. Huang, A new cost function for spatial image steganography, Proceedings IEEE ICIP, (Paris, France), October 2730, 2014
- B. Li, S. Tan, M. Wang, and J. Huang, Investigation on cost assignment in spatial image steganography, IEEE TIFS,vol.9, pp.12641277, August 2014.
- R.Bohme, Advanced Statistical Steganalysis, Berlin Heidel berg: Springer-Verlag, 2010.
- A. D. Ker, P. Bas, R. Bohme, R. Cogranne, S. Craver, T. Filler, J. Fridrich, and T. Pevn, Moving steganography and steganalysis from the laboratory into the real world, 1st ACM IH MMSec.Workshop (W.Puech,M.Chaumont,J.Dittmann, and P. Campisi, eds.), (Montpellier, France), June 1719, 2013.
- T. Pevn, P. Bas, and J. Fridrich, Steganalysis by subtractive pixel adjacency matrix, IEEE TIFS, vol.5, pp.215224, June 2010.
- T. Filler and J. Fridrich, Design of adaptive steganographic schemes for digital images, Proceedings SPIE, Electronic Imaging, Media Watermarking, Security and Forensics III (A. Alattar, N. D. Memon, E. J. Delp, and J. Dittmann, eds.), vol.7880, (San Francisco, CA), pp.114, January 2326, 2011.