Volume 51 Issue 7
Jul.  2025
Turn off MathJax
Article Contents
WANG Y G,YAO Y Z,YU N H. Cover selection method for batch image steganography based on multivariate optimization[J]. Journal of Beijing University of Aeronautics and Astronautics,2025,51(7):2468-2477 (in Chinese) doi: 10.13700/j.bh.1001-5965.2023.0380
Citation: WANG Y G,YAO Y Z,YU N H. Cover selection method for batch image steganography based on multivariate optimization[J]. Journal of Beijing University of Aeronautics and Astronautics,2025,51(7):2468-2477 (in Chinese) doi: 10.13700/j.bh.1001-5965.2023.0380

Cover selection method for batch image steganography based on multivariate optimization

doi: 10.13700/j.bh.1001-5965.2023.0380
Funds:

National Key Research and Development Program of China (2018YFB0804102); National Natural Science Foundation of China (61802357); The Fundamental Research Funds for the Central Universities (WK3480000009)

More Information
  • Corresponding author: E-mail:yaoyz@hfut.edu.cn
  • Received Date: 16 Jun 2023
  • Accepted Date: 02 Sep 2023
  • Available Online: 11 Nov 2023
  • Publish Date: 08 Nov 2023
  • Batch image steganography provides an effective means for covert communication on social networks by embedding secret messages into multiple cover images through cover selection. Compared with traditional image steganography, a key challenge of batch image steganography lies in designing an effective cover selection method while ensuring good undetectability performance. In this paper, a multivariate optimization-based cover selection method for batch image steganography was proposed. By jointly analyzing embedding distortion, image correlation, and embedding capacity, this method modelled the cover selection for batch image steganography as a multivariate optimization problem. Additionally, to enhance the batch image steganography robustness against the possible compression of images after steganography by social networks, a secret message fragmentation and reassembly strategy was designed. Experimental results demonstrate that the proposed method for batch image steganography achieves satisfactory performance in undetectability, embedding capacity, and robustness, providing technical support for covert communication on social networks.

     

  • loading
  • [1]
    SALMAN A. Facebook by the numbers[EB/OL]. (2022-12-08)[2023-04-13]. http://omnicoreagency.com/-facebook-statistics/.
    [2]
    SIMMONS G J. The prisoners’ problem and the subliminal channel[C]//Advances in Cryptology. Berlin: Springer, 1984: 51-67.
    [3]
    FILLER T, JUDAS J, FRIDRICH J. Minimizing additive distortion in steganography using syndrome-trellis codes[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 920-935. doi: 10.1109/TIFS.2011.2134094
    [4]
    HOLUB V, FRIDRICH J. Digital image steganography using universal distortion[C]//Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security. New York: ACM, 2013: 59-68.
    [5]
    GUO L J, NI J Q, SHI Y Q. Uniform embedding for efficient JPEG steganography[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(5): 814-825. doi: 10.1109/TIFS.2014.2312817
    [6]
    COGRANNE R, GIBOULOT Q, BAS P. Steganography by minimizing statistical detectability: the cases of JPEG and color images[C]//Proceedings of the ACM Workshop on Information Hiding and Multimedia Security. New York: ACM, 2020: 161-167.
    [7]
    PAN Y F, NI J Q, SU W K. Improved uniform embedding for efficient JPEG steganography[C]//Cloud Computing and Security. Berlin: Springer, 2016: 125-133.
    [8]
    WANG Z C, ZHANG X P, YIN Z X. Hybrid distortion function for JPEG steganography[J]. Journal of Electronic Imaging, 2016, 25: 050501. doi: 10.1117/1.JEI.25.5.050501
    [9]
    WEI Q D, YIN Z X, WANG Z C, et al. Distortion function based on residual blocks for JPEG steganography[J]. Multimedia Tools and Applications, 2018, 77(14): 17875-17888. doi: 10.1007/s11042-017-5053-7
    [10]
    张卫明, 王宏霞, 李斌, 等. 多媒体隐写研究进展[J]. 中国图象图形学报, 2022, 27(6): 1918-1943. doi: 10.11834/jig.211272

    ZHANG W M, WANG H X, LI B, et al. Overview of steganography on multimedia[J]. Journal of Image and Graphics, 2022, 27(6): 1918-1943(in Chinese). doi: 10.11834/jig.211272
    [11]
    KER A D. Batch steganography and pooled steganalysis[C]//Information Hiding. Berlin: Springer, 2007: 265-281.
    [12]
    KER A D. Perturbation hiding and the batch steganography problem[C]//Information Hiding. Berlin: Springer, 2008: 45-59.
    [13]
    LIAO X, YIN J J, CHEN M L, et al. Adaptive payload distribution in multiple images steganography based on image texture features[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(2): 897-911.
    [14]
    WANG Z C, FENG G R, SHEN L Q, et al. Cover selection for steganography using image similarity[J]. IEEE Transactions on Dependable and Secure Computing, 2023, 20(3): 2328-2340.
    [15]
    YIN Z X, KE L F. Robust adaptive steganography based on dither modulation and modification with re-compression[J]. IEEE Transactions on Signal and Information Processing Over Networks, 2021, 7: 336-345. doi: 10.1109/TSIPN.2021.3081373
    [16]
    DUAN X L, LI B, YIN Z X, et al. Robust image steganography against lossy JPEG compression based on embedding domain selection and adaptive error correction[J]. Expert Systems with Applications, 2023, 229: 120416. doi: 10.1016/j.eswa.2023.120416
    [17]
    KER A D. A capacity result for batch steganography[J]. IEEE Signal Processing Letters, 2007, 14(8): 525-528. doi: 10.1109/LSP.2006.891319
    [18]
    EVSUTIN O, KOKURINA A, MESHCHERYAKOV R. Approach to the selection of the best cover image for information embedding in JPEG images based on the principles of the optimality[J]. Journal of Decision Systems, 2018, 27(S1): 256-264. doi: 10.1080/12460125.2018.1460163
    [19]
    ZHONG N, QIAN Z X, WANG Z C, et al. Batch steganography via generative network[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2021, 31(1): 88-97. doi: 10.1109/TCSVT.2020.2974884
    [20]
    WANG Z C, ZHANG X P, QIAN Z X. Practical cover selection for steganography[J]. IEEE Signal Processing Letters, 2019, 27: 71-75.
    [21]
    WANG Z C, ZHANG X P, YIN Z X. Joint cover-selection and payload-allocation by steganographic distortion optimization[J]. IEEE Signal Processing Letters, 2018, 25(10): 1530-1534. doi: 10.1109/LSP.2018.2865888
    [22]
    HOLUB V, FRIDRICH J, DENEMARK T. Universal distortion function for steganography in an arbitrary domain[J]. EURASIP Journal on Information Security, 2014, 2014(1): 1. doi: 10.1186/1687-417X-2014-1
    [23]
    KODOVSKY J, FRIDRICH J, HOLUB V. Ensemble classifiers for steganalysis of digital media[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 432-444. doi: 10.1109/TIFS.2011.2175919
    [24]
    KODOVSKÝ J, FRIDRICH J. Steganalysis of JPEG images using rich models[C]//Media Watermarking, Security, and Forensics, Bellingham: SPIE, 2012, 8303: 7.
    [25]
    JESSICA F. BOSSbase[EB/OL]. (2018-10-23)[2023-04-13]. http://dde.binghamton.edu/download/.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(6)  / Tables(7)

    Article Metrics

    Article views(255) PDF downloads(3) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return