A Second Order Derivatives based Approach for Steganography

Jean-François Couchot, Raphaël Couturier, Yousra Ahmed Fadil, Christophe Guyeux

2016

Abstract

Steganography schemes are designed with the objective of minimizing a defined distortion function. In most existing state of the art approaches, this distortion function is based on image feature preservation. Since smooth regions or clean edges define image core, even a small modification in these areas largely modifies image features and is thus easily detectable. On the contrary, textures, noisy or chaotic regions are so difficult to model that the features having been modified inside these areas are similar to the initial ones. These regions are characterized by disturbed level curves. This work presents a new distortion function for steganography that is based on second order derivatives, which are mathematical tools that usually evaluate level curves. Two methods are explained to compute these partial derivatives and have been completely implemented. The first experiments show that these approaches are promising.

References

  1. Couchot, J., Couturier, R., and Guyeux, C. (2015). STABYLO: steganography with adaptive, bbs, and binary embedding at low cost. Annales des Télécommunications, 70(9-10):441-449.
  2. Filler, T., Judas, J., and Fridrich, J. J. (2011). Minimizing additive distortion in steganography using syndrometrellis codes. IEEE Transactions on Information Forensics and Security, 6(3-2):920-935.
  3. Fridrich, J. and Kodovsk, J. (2013). Multivariate gaussian model for designing additive distortion for steganography. In Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on, pages 2949-2953.
  4. Fridrich, J. J. and KodovskÉ, J. (2012). Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security, 7(3):868-882.
  5. Holub, V., Fridrich, J., and Denemark, T. (2014). Universal distortion function for steganography in an arbitrary domain. EURASIP Journal on Information Security, 2014(1).
  6. Holub, V. and Fridrich, J. J. (2012). Designing steganographic distortion using directional filters. In WIFS, pages 234-239. IEEE.
  7. KodovskÉ, J., Fridrich, J. J., and Holub, V. (2012). Ensemble classifiers for steganalysis of digital media. IEEE Transactions on Information Forensics and Security, 7(2):432-444.
  8. Luo, W., Huang, F., and Huang, J. (2010). Edge adaptive image steganography based on lsb matching revisited. IEEE Transactions on Information Forensics and Security, 5(2):201-214.
  9. PevnÉ, T., Filler, T., and Bas, P. (2010). Break our steganographic system. Available at http://www.agents.cz/boss/.
  10. PevnÉ, T., Filler, T., and Bas, P. (2010). Using highdimensional image models to perform highly undetectable steganography. In Böhme, R., Fong, P. W. L., and Safavi-Naini, R., editors, Information Hiding - 12th International Conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010, Revised Selected Papers, volume 6387 of Lecture Notes in Computer Science, pages 161-177. Springer.
Download


Paper Citation


in Harvard Style

Couchot J., Couturier R., Fadil Y. and Guyeux C. (2016). A Second Order Derivatives based Approach for Steganography . In Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016) ISBN 978-989-758-196-0, pages 424-431. DOI: 10.5220/0005966804240431


in Bibtex Style

@conference{secrypt16,
author={Jean-François Couchot and Raphaël Couturier and Yousra Ahmed Fadil and Christophe Guyeux},
title={A Second Order Derivatives based Approach for Steganography},
booktitle={Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016)},
year={2016},
pages={424-431},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005966804240431},
isbn={978-989-758-196-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016)
TI - A Second Order Derivatives based Approach for Steganography
SN - 978-989-758-196-0
AU - Couchot J.
AU - Couturier R.
AU - Fadil Y.
AU - Guyeux C.
PY - 2016
SP - 424
EP - 431
DO - 10.5220/0005966804240431