A Secure Steganography Preserving High Order Statistics
نویسندگان
چکیده
With the development of steganalysis, the security of steganography is faced with tremendous challenge. High order statistical analysis is an effective and common detecting method that can defeat many hiding scheme. This paper proposes a secure steganography that can effectively resist image steganalysis based on high order statistical analysis. We have analyzed Haar wavelet decomposition characteristics and obtained a theorem about keeping high order statistics invariability. Based on the theorem, the hiding method that can preserve high order statistics of H, V, and D sub-bands of images decomposed by Haar wavelet is devised. In order to strengthen the security of our steganographic scheme, the approach to generate the set of random embedding location is presented. Finally, the capability of proposed algorithm is discussed in theory and proved by experiments. The results show our method possesses perfect imperceptibility and can effectively resist high order statistics analysis and RS analysis.
منابع مشابه
Improved Adaptive LSB Steganography Based on Chaos and Genetic Algorithm
We propose a novel steganographic method in JPEG images with high performance. Firstly, we propose improved adaptive LSB steganography, which can achieve high capacity while preserving the first-order statistics. Secondly, in order to minimize visual degradation of the stego image, we shuffle bits-order of the message based on chaos whose parameters are selected by the genetic algorithm. Shuffl...
متن کاملNew High Secure Network Steganography Method Based on Packet Length
In network steganography methods based on packet length, the length of the packets is used as a carrier for exchanging secret messages. Existing methods in this area are vulnerable against detections due to abnormal network traffic behaviors. The main goal of this paper is to propose a method which has great resistance to network traffic detections. In the first proposed method, the sender embe...
متن کاملImproved LSB-matching Steganography for Preserving Second-order Statistics
In the paper, for enhancing the security of the traditional LSB matching, two improved LSB-matching methods are proposed. In the steganograhical procedure, the Markov chain distance based on the second-order statistics is chosen as the security metric to control the modification directions of ±1 embedding. The first method is based on stochastic modification, which directly determines the modif...
متن کاملHard Communication Channels for Steganography
This paper considers steganography – the concept of hiding the presence of secret messages in legal communications – in the computational setting and its relation to cryptography. Very recently the first (non-polynomial time) steganographic protocol has been shown which, for any communication channel, is provably secure, reliable, and has nearly optimal bandwidth. The security is unconditional,...
متن کاملA Communications Approach to Image Steganography
Steganography is the art of communicating a message by embedding it into multimedia data. It is desired to maximize the amount of hidden information (embedding rate) while preserving security against detection by unauthorized parties. An appropriate information-theoretic model for steganography has been proposed by Cachin. A steganographic system is perfectly secure when the statistics of the c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Journal of Multimedia
دوره 5 شماره
صفحات -
تاریخ انتشار 2010