| Citation: | WANG Y G,YAO Y Z,YU N H. Cover selection method for batch image steganography based on multivariate optimization[J]. Journal of Beijing University of Aeronautics and Astronautics,2025,51(7):2468-2477 (in Chinese) doi: 10.13700/j.bh.1001-5965.2023.0380 |
Batch image steganography provides an effective means for covert communication on social networks by embedding secret messages into multiple cover images through cover selection. Compared with traditional image steganography, a key challenge of batch image steganography lies in designing an effective cover selection method while ensuring good undetectability performance. In this paper, a multivariate optimization-based cover selection method for batch image steganography was proposed. By jointly analyzing embedding distortion, image correlation, and embedding capacity, this method modelled the cover selection for batch image steganography as a multivariate optimization problem. Additionally, to enhance the batch image steganography robustness against the possible compression of images after steganography by social networks, a secret message fragmentation and reassembly strategy was designed. Experimental results demonstrate that the proposed method for batch image steganography achieves satisfactory performance in undetectability, embedding capacity, and robustness, providing technical support for covert communication on social networks.
| [1] |
SALMAN A. Facebook by the numbers[EB/OL]. (2022-12-08)[2023-04-13]. http://omnicoreagency.com/-facebook-statistics/.
|
| [2] |
SIMMONS G J. The prisoners’ problem and the subliminal channel[C]//Advances in Cryptology. Berlin: Springer, 1984: 51-67.
|
| [3] |
FILLER T, JUDAS J, FRIDRICH J. Minimizing additive distortion in steganography using syndrome-trellis codes[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 920-935. doi: 10.1109/TIFS.2011.2134094
|
| [4] |
HOLUB V, FRIDRICH J. Digital image steganography using universal distortion[C]//Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security. New York: ACM, 2013: 59-68.
|
| [5] |
GUO L J, NI J Q, SHI Y Q. Uniform embedding for efficient JPEG steganography[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(5): 814-825. doi: 10.1109/TIFS.2014.2312817
|
| [6] |
COGRANNE R, GIBOULOT Q, BAS P. Steganography by minimizing statistical detectability: the cases of JPEG and color images[C]//Proceedings of the ACM Workshop on Information Hiding and Multimedia Security. New York: ACM, 2020: 161-167.
|
| [7] |
PAN Y F, NI J Q, SU W K. Improved uniform embedding for efficient JPEG steganography[C]//Cloud Computing and Security. Berlin: Springer, 2016: 125-133.
|
| [8] |
WANG Z C, ZHANG X P, YIN Z X. Hybrid distortion function for JPEG steganography[J]. Journal of Electronic Imaging, 2016, 25: 050501. doi: 10.1117/1.JEI.25.5.050501
|
| [9] |
WEI Q D, YIN Z X, WANG Z C, et al. Distortion function based on residual blocks for JPEG steganography[J]. Multimedia Tools and Applications, 2018, 77(14): 17875-17888. doi: 10.1007/s11042-017-5053-7
|
| [10] |
张卫明, 王宏霞, 李斌, 等. 多媒体隐写研究进展[J]. 中国图象图形学报, 2022, 27(6): 1918-1943. doi: 10.11834/jig.211272
ZHANG W M, WANG H X, LI B, et al. Overview of steganography on multimedia[J]. Journal of Image and Graphics, 2022, 27(6): 1918-1943(in Chinese). doi: 10.11834/jig.211272
|
| [11] |
KER A D. Batch steganography and pooled steganalysis[C]//Information Hiding. Berlin: Springer, 2007: 265-281.
|
| [12] |
KER A D. Perturbation hiding and the batch steganography problem[C]//Information Hiding. Berlin: Springer, 2008: 45-59.
|
| [13] |
LIAO X, YIN J J, CHEN M L, et al. Adaptive payload distribution in multiple images steganography based on image texture features[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(2): 897-911.
|
| [14] |
WANG Z C, FENG G R, SHEN L Q, et al. Cover selection for steganography using image similarity[J]. IEEE Transactions on Dependable and Secure Computing, 2023, 20(3): 2328-2340.
|
| [15] |
YIN Z X, KE L F. Robust adaptive steganography based on dither modulation and modification with re-compression[J]. IEEE Transactions on Signal and Information Processing Over Networks, 2021, 7: 336-345. doi: 10.1109/TSIPN.2021.3081373
|
| [16] |
DUAN X L, LI B, YIN Z X, et al. Robust image steganography against lossy JPEG compression based on embedding domain selection and adaptive error correction[J]. Expert Systems with Applications, 2023, 229: 120416. doi: 10.1016/j.eswa.2023.120416
|
| [17] |
KER A D. A capacity result for batch steganography[J]. IEEE Signal Processing Letters, 2007, 14(8): 525-528. doi: 10.1109/LSP.2006.891319
|
| [18] |
EVSUTIN O, KOKURINA A, MESHCHERYAKOV R. Approach to the selection of the best cover image for information embedding in JPEG images based on the principles of the optimality[J]. Journal of Decision Systems, 2018, 27(S1): 256-264. doi: 10.1080/12460125.2018.1460163
|
| [19] |
ZHONG N, QIAN Z X, WANG Z C, et al. Batch steganography via generative network[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2021, 31(1): 88-97. doi: 10.1109/TCSVT.2020.2974884
|
| [20] |
WANG Z C, ZHANG X P, QIAN Z X. Practical cover selection for steganography[J]. IEEE Signal Processing Letters, 2019, 27: 71-75.
|
| [21] |
WANG Z C, ZHANG X P, YIN Z X. Joint cover-selection and payload-allocation by steganographic distortion optimization[J]. IEEE Signal Processing Letters, 2018, 25(10): 1530-1534. doi: 10.1109/LSP.2018.2865888
|
| [22] |
HOLUB V, FRIDRICH J, DENEMARK T. Universal distortion function for steganography in an arbitrary domain[J]. EURASIP Journal on Information Security, 2014, 2014(1): 1. doi: 10.1186/1687-417X-2014-1
|
| [23] |
KODOVSKY J, FRIDRICH J, HOLUB V. Ensemble classifiers for steganalysis of digital media[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 432-444. doi: 10.1109/TIFS.2011.2175919
|
| [24] |
KODOVSKÝ J, FRIDRICH J. Steganalysis of JPEG images using rich models[C]//Media Watermarking, Security, and Forensics, Bellingham: SPIE, 2012, 8303: 7.
|
| [25] |
JESSICA F. BOSSbase[EB/OL]. (2018-10-23)[2023-04-13]. http://dde.binghamton.edu/download/.
|