YUAN Jian, HUANG Yongfeng, LI Xing, “A Quantitation Method to the Imperceptibility of Hiding-Vector in Multi-dimensional Hiding Space,” Chinese Journal of Electronics, vol. 22, no. 4, pp. 826-832, 2013,
Citation: YUAN Jian, HUANG Yongfeng, LI Xing, “A Quantitation Method to the Imperceptibility of Hiding-Vector in Multi-dimensional Hiding Space,” Chinese Journal of Electronics, vol. 22, no. 4, pp. 826-832, 2013,

A Quantitation Method to the Imperceptibility of Hiding-Vector in Multi-dimensional Hiding Space

Funds:  This work is supported by the National High Technology Research and Development Program of China (863 Program) (No.2011AA010704), the National Natural Science Foundation of China (No.61271392), and Tsinghua University Initiative Scientific Research Program (No.20111081023).
More Information
  • Corresponding author: YUAN Jian
  • Received Date: 2012-09-01
  • Rev Recd Date: 2013-01-01
  • Publish Date: 2013-09-25
  • Currently, few general methods have been suggested to quantitate the imperceptibility among various hiding algorithms. Especially, it is a challenge to quantitate the imperceptibility of the hiding-vector, which is consisted of orthogonal hiding algorithms in the multidimensional hiding space. In this paper, a novel model of general imperceptibility quantitation was proposed. According to this model, a quantitation method based on the relative entropy was designed. It is proved under this quantitation method that there exists the global maximal imperceptibility for any specified hiding-vector capacity. An optimization algorithm was proposed to approach this maximum by adjusting the allocation of secret message into each components of the hiding-vector. Experiments with VoI Pand bitmap multi-dimensional hiding space validated the effectiveness of the designed quantitation method and the proposed optimization algorithm.
  • loading
  • A. Almohammad, G. Ghinea and R.M. Hierons, “JPEGs teganography: A performance evaluation of quantization tables”,Int. Conf. on Advanced Information Networking andA pplications (AINA 2009), Bradford, United Kingdom, pp.471-4 78, 2009.
    J.A. Christaline and D. Vaishali, “Image steganographic techniquesw ith improved embedding capacity and robustness”, Proc. of International Conference on Recent Trends in InformationT echnology (ICRTIT 2011), MIT, Anna University, Chennai, USA, pp.97-101, 2011.
    V. Thanikaiselvan and P. Arulmozhivarman, “Wave(let) decidec hoosy pixel embedding for stego”, Proc. of International Conferenceo n Computer, Communication and Electrical Technology( ICCCET 2011), Tamilnadu, India, pp.157-162, 2011.
    N. Kitawaki, H. Nagabuchi and K. Itoh, “Objective quality evaluationf or low-bit-rate speech coding systems”, IEEE Journalo n Selected Areas in Communications, Vol.6, No.2, pp.242-248,1 988.
    ITU-T P.862:2001, Perceptual Evaluation of Speech Quality( PESQ), An Objective Method for End-to-End Speech Quality Assessment of Narrow-Band Telephone Networks and Speech Codecs.
    H.I. Shahadi and R. Jidin, “High capacity and inaudibility audios teganography scheme”, Proc. of the 7th International Conferenceo n Information Assurance and Security (IAS 2011),Malacca, Malaysia, pp.104-109, 2011.
    Bo Xiao, Yongfeng Huang and Shanyu Tang, “An approacht o information hiding in low bit-rate speech stream”, Proc. of IEEE GLOBECOM 2008, New Orleans, Louisiana, U.S.A.,p p.1-5, 2008.
    Yongfeng Huang, Shanyu Tang and Jian Yuan, “Steganographyi n inactive frames of VoI Pstreams encoded by sourcec odec”, IEEE Transactions on Information Forensics and Security,Vol.6, No.2, pp.296-306, 2011.
    Zheming Lu, Bin Yan and Shenghe Sun, “Watermarking combinedw ith CEL Pspeech coding for authentication”, IEICET ransactions on Information and Systems, Vol.E88-D, No.2,p p.330-334, 2005.
    Liping Ji, Xiaolong Li, Bin Yang and Zhihong Liu, “A furthers tudy on a PVD-based steganography”, Proc. of International Conference on Multimedia Information Networking and Security( MINES 2010), Nanjing, Jiangsu, China, pp.686-690, 2010.
    M. Ramezani and S. Ghaemmagham, “Adaptive images teganography with mod-4 embedding using image contrast”, Proc. of the 7th IEEE Consumer Communications and Networking Conf. (CCN C2010), Las Vegas, Nevada, U.S.A., pp.1-4 , 2010.
    ITU-T G.723.1:2006, Dual Rate Speech Coder for Multimedia Communications Transmitting at 5.3 and 6.3 Kbit/s.
    RF C3550:2003, RTP: A Transport Protocol for Real-Time Applications.
    Hui Tian, Ke Zhou, Hong Jiang, Yongfeng Huang, Jin Liu andD an Feng, “An adaptive steganography scheme for voice overI P”, In the Proc. of IEEE Int. Symposium on Circuits andS ystems (ISCAS2009), Taipei, Taiwan, pp.2922-2925, 2009.
    Linda Yunlu Bai, Yongfeng Huang, Guannan Hou and Bo Xiao,“Covert channels based on jitter field of the RTC Pheader”, Proc. of IEEE IIHMS P2008, Harbin, China, pp.1388-1391,2 008.
    Yongfeng Huang, Jian Yuan, Minchao Chen, Y. Zhang, ShanyuT ang, “Key Distribution in the Convert Communication Basedon VoIP”, Chinese Journal of Electronics, Vol.20, No.2, pp.357-3 61, 2011.
    A. Westfeld, “F5-A steganographic algorithm”, InformationH iding, Lecture Notes in Computer Science, Springer, pp.289-302, 2001.
    US CViterbi School of Engineering, “The USC-SIPI ImageD atabase”, http://sipi.usc.edu/database, 2012.
    T. Pevný, P. Bas and J. Fridrich, “Steganalysis by subtractivep ixel adjacency matrix”, IEEE Transactions on Information Forensics and Security, Vol.5, No.2, pp.215-224, 2010.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (514) PDF downloads(1046) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return