A communications approach to image steganography

被引:31
作者
Eggers, JJ [1 ]
Bäuml, R [1 ]
Girod, B [1 ]
机构
[1] Univ Erlangen Nurnberg, Telecommun Lab, D-90158 Erlangen, Germany
来源
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV | 2002年 / 4675卷
关键词
steganography; scalar Costa scheme; histogram mapping;
D O I
10.1117/12.465284
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Steganography is the art of communicating a message by embedding it into multimedia data. It is desired to maximize the amount of hidden information (embedding rate) while preserving security against detection by unauthorized parties. An appropriate information-theoretic model for steganography has been proposed by Cachin. A steganographic system is perfectly secure when the statistics of the cover data and the stego data are identical, which means that the relative entropy between the cover data and the stego data is zero. For image data, another constraint is that the stego data must look like a "typical image." A tractable objective measure for this property is the (weighted) mean squared error between the cover image and the stego image (embedding distortion). Two different schemes are investigated. The first one is derived from a blind watermarking scheme. The second scheme is designed specifially for steganography such that perfect security is achieved, which means that the relative entropy between cover data and stego data tends to zero. In this case, a noiseless communication channel is assumed. Both schemes store the stego image in the popular JPEG format. The performance of the schemes is compared with respect to security, embedding distortion and embedding rate.
引用
收藏
页码:26 / 37
页数:12
相关论文
共 25 条
[1]  
CACHIN C, 1998, LECT NOTES COMP SCI, V1525
[2]   Digital watermarking and information embedding using dither modulation [J].
Chen, B ;
Wornell, GW .
1998 IEEE SECOND WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, 1998, :273-278
[3]  
Chen B, 1999, IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS, PROCEEDINGS VOL 1, P13, DOI 10.1109/MMCS.1999.779113
[4]   Preprocessed and postprocessed quantization index modulation methods for digital watermarking [J].
Chen, B ;
Wornell, GW .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS II, 2000, 3971 :48-59
[5]   Provably robust digital watermarking [J].
Chen, B ;
Wornell, GW .
MULTIMEDIA SYSTEMS AND APPLICATIONS II, 1999, 3845 :43-54
[6]  
CHOU J, 2000, P SPIE, V3974
[7]   WRITING ON DIRTY PAPER [J].
COSTA, MHM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (03) :439-441
[8]  
Cover T. M., 2005, ELEM INF THEORY, DOI 10.1002/047174882X
[9]   Watermarking as communications with side information [J].
Cox, IJ ;
Miller, ML ;
McKellips, AL .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1127-1141
[10]  
EGGERS J, 2000, P IEEE INT C IM PROC