Statistical Attack Resilient Data Hiding

نویسندگان

  • Palak K. Amin
  • Ning Liu
  • K. P. Subbalakshmi
چکیده

In this paper, we propose a discrete cosine transform (DCT) based spread spectrum data-hiding algorithm that is resilient to statistical attacks. Unlike other spread spectrum based data-hiding algorithms, the proposed algorithm does not introduce a low-pass filtering effect in the histogram of the stego image. The distance between the center of gravity (CoG) as defined by [14] of the unmarked host and the stego images was reduced by 74% in the proposed algorithm. The proposed algorithm is also resilient against the Chi-Square attack and does not compromise on robustness or capacity to achieve this goal. When compared to the generic block based DCT data-hiding scheme, the proposed algorithm provides a 41% reduction in the relative entropy between the host and stego images. In other words, the proposed algorithm is 41% more secure than generic DCT based data-hiding algorithms when measured in terms of relative entropy. The proposed algorithm also provides statistical resilience against a steganalysis attack specifically designed for block DCT datahiding algorithms [29]. The proposed algorithm is robust against a variety of image manipulating attacks such as noise addition, filtering, blurring, sharpening, JPEG compression etc. In the cases of dislocating attacks such as blurring and despeckling, the bit error ratio (BER) was 0.1045 and 0.0435 respectively, thereby yielding retrieval rates of over 89% and 95% respectively. In the case of low quality JPEG attack (Q-30) the retrieval rate was 92%. In the case of noise addition attacks, the retrieval rates were more than 92%.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Modeling the print-scan process for resilient data hiding

Print-scan resilient data hiding finds important applications in document security, and image copyright protection. In this paper, we build upon our previous work on print-scan resilient data hiding with the goal of providing a simple mathematical characterization for guiding the design of more sophisticated methods allowing higher volume of embedded data, or achieving more robustness. A model ...

متن کامل

A Data Hiding Scheme based on Local Coordinate System for 3D Triangle Mesh Models

Recently there is increased interest in hiding data in 3-D objects due to the ever-increasing diffusion of such objects in many areas such as architecture design, entertainment and cultural heritage. A data hiding scheme for 3D triangle mesh models is proposed in this paper. Constructed by the vertex and its 1-ring neighbors, rather than by only its 1-ring neighbors, the local coordinate system...

متن کامل

More Secured Steganography Model with High Concealing Capacity by using Genetic Algorithm, Integer Wavelet Transform and OPAP

Steganography is an art of writing for conveying message inside another media in a secret way that can only be detected by its intended recipient. There are security agents who would like to fight these data hiding systems by steganalysis, i.e. discovering covered secret messages and rendering them useless. Steganalysis is the art of detecting the message's existence, message length or place of...

متن کامل

An Effective Attack-Resilient Kalman Filter-Based Approach for Dynamic State Estimation of Synchronous Machine

Kalman filtering has been widely considered for dynamic state estimation in smart grids. Despite its unique merits, the Kalman Filter (KF)-based dynamic state estimation can be undesirably influenced by cyber adversarial attacks that can potentially be launched against the communication links in the Cyber-Physical System (CPS). To enhance the security of KF-based state estimation, in this paper...

متن کامل

Steganographic capacity estimation for the statistical restoration framework

In this paper we attempt to quantify the “active” steganographic capacity the maximum rate at which data can be hidden, and correctly decoded, in a multimedia cover subject to noise/attack (hence active), perceptual distortion criteria, and statistical steganalysis. Though work has been done in studying the capacity of data hiding as well as the rate of perfectly secure data hiding in noiseless...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Network Security

دوره 5  شماره 

صفحات  -

تاریخ انتشار 2007