Steganographic strategies for a square distortion function
نویسنده
چکیده
Recent results on the information theory of steganography suggest, and under some conditions prove, that the detectability of payload is proportional to the square of the number of changes caused by the embedding. Assuming that result in general, this paper examines the implications for an embedder when a payload is to be spread amongst multiple cover objects. A number of variants are considered: embedding with and without adaptive source coding, in uniform and nonuniform covers, and embedding in both a fixed number of covers (so-called batch steganography) as well as establishing a covert channel in an infinite stream (sequential steganography, studied here for the first time). The results show that steganographic capacity is sublinear, and strictly asymptotically greater in the case of a fixed batch than an infinite stream. In the former it is possible to describe optimal embedding strategies; in the latter the situation is much more complex, with a continuum of strategies which approach the unachievable asymptotic optimum.
منابع مشابه
Locally Square Distortion and Batch Steganographic Capacity
A fundamental question of the steganography problem is to determine the amount of data which can be hidden undetectably. Its answer is of direct importance to the embedder, but also aids a forensic investigator in bounding the size of payload which might be communicated. Recent results on the information theory of steganography suggest that the detectability of payload in an individual object i...
متن کاملOn importance of steganographic cost for network steganography
Network steganography encompasses the information hiding techniques that can be applied in communication network environments and that utilize hidden data carriers for this purpose. In this paper, we introduce a characteristic called steganographic cost, which is an indicator for the degradation or distortion of the carrier caused by the application of the steganographic method. Based on exempl...
متن کاملInfluence of embedding strategies on security of steganographic methods in the JPEG domain
In this paper, we study how specific design principles and elements of steganographic schemes for the JPEG format influence their security. Our goal is to shed some light on how the choice of the embedding operation and domain, adaptive selection channels, and syndrome coding influence statistical detectability. In the experimental part of this paper, the detectability is evaluated using a stat...
متن کاملAn Adaptive JPEG Steganographic Scheme Based on the Block Entropy of DCT Coefficients
Minimizing the embedding impact is a practically feasible philosophy in designing steganographic systems. The development of steganographic systems can be formulated as the construction of distortion profile reflecting the embedding impact and the design of syndrome coding based on a certain code. The authors devise a new distortion profile exploring both the block complexity and the distortion...
متن کاملImproving the Adaptive Steganographic Methods Based on Modulus Function
This letter improves two adaptive steganographic methods in Refs. [5], [6], which utilize the remainders of two consecutive pixels to record the information of secret data. Through analysis, we point out that they perform mistakenly under some conditions, and the recipient cannot extract the secret data exactly. We correct these by enlarging the adjusting range of the remainders of two consecut...
متن کامل