4.6 Article

Adaptive Payload Distribution in Multiple Images Steganography Based on Image Texture Features

Journal

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TDSC.2020.3004708

Keywords

Payloads; Security; Distortion; Image texture; Distribution strategy; Adaptation models; Cloud computing; Image steganography; multiple images; payload distribution; image texture features

Funding

  1. National Natural Science Foundation of China [61972142, 61772191]
  2. Hunan Provincial Natural Science Foundation of China [2020JJ4212]
  3. Open Project Program of National Laboratory of Pattern Recognition [201900017]

Ask authors/readers for more resources

This article introduces the application of multiple image steganography in the era of cloud storage, discusses payload distribution strategies for enhancing security performance, and provides supporting evidence through experiments.
With the coming era of cloud technology, cloud storage is an emerging technology to store massive digital images, which provides steganography a new fashion to embed secret information into massive images. Specifically, a resourceful steganographer could embed a set of secret information into multiple images adaptively, and share these images in cloud storage with the receiver, instead of traditional single image steganography. Nevertheless, it is still an open issue how to allocate embedding payload among a sequence of images for security performance enhancement. This article formulates adaptive payload distribution in multiple images steganography based on image texture features and provides the theoretical security analysis from the steganalyst's point of view. Two payload distribution strategies based on image texture complexity and distortion distribution are designed and discussed, respectively. The proposed strategies can be employed together with these state-of-the-art single image steganographic algorithms. The comparisons of the security performance against the modern universal pooled steganalysis are given. Furthermore, this article compares the per image detectability of these multiple images steganographic schemes against the modern single image steganalyzer. Extensive experimental results show that the proposed payload distribution strategies could obtain better security performance.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available