TY - JOUR
T1 - KL-sense secure image steganography
AU - Luo, Guoqi
AU - Subbalakshmi, K. P.
PY - 2011/1
Y1 - 2011/1
N2 - In this paper, we propose a computationally-efficient data hiding method which achieves Cachin's security criterion: zero Kullback-Liebler (KL) divergence. To preserve statistical properties of the cover medium, we swap pixels rather than modify them to hide information. We theoretically analyse the security of the proposed method from various perspectives. • Upper bounds of the KL divergence of second order statistics • The relationship between distortions in the DCT domain and embedding positions in the spatial domain • The upper bound on the conditional entropy in the DCT domain. We then subject our proposed stego method to several practical steganalysis algorithms. • Histogram based attacks • A higher-order statistics based universal steganalysis algorithm • A new learning based steganalysis that specifically for this hiding algorithm. Experimental results show that our data hiding method can prevent these statistical detection methods, when the embedding rate is less than or equal to 10%.
AB - In this paper, we propose a computationally-efficient data hiding method which achieves Cachin's security criterion: zero Kullback-Liebler (KL) divergence. To preserve statistical properties of the cover medium, we swap pixels rather than modify them to hide information. We theoretically analyse the security of the proposed method from various perspectives. • Upper bounds of the KL divergence of second order statistics • The relationship between distortions in the DCT domain and embedding positions in the spatial domain • The upper bound on the conditional entropy in the DCT domain. We then subject our proposed stego method to several practical steganalysis algorithms. • Histogram based attacks • A higher-order statistics based universal steganalysis algorithm • A new learning based steganalysis that specifically for this hiding algorithm. Experimental results show that our data hiding method can prevent these statistical detection methods, when the embedding rate is less than or equal to 10%.
KW - Conditional entropy
KW - Data hiding
KW - Kullback-Liebler divergence
KW - Markov chain
KW - Steganography
UR - http://www.scopus.com/inward/record.url?scp=84857206460&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84857206460&partnerID=8YFLogxK
U2 - 10.1504/IJSN.2011.045229
DO - 10.1504/IJSN.2011.045229
M3 - Article
AN - SCOPUS:84857206460
SN - 1747-8405
VL - 6
SP - 211
EP - 225
JO - International Journal of Security and Networks
JF - International Journal of Security and Networks
IS - 4
ER -