YUAN Jian, HUANG Yongfeng, LI Xing. A Quantitation Method to the Imperceptibility of Hiding-Vector in Multi-dimensional Hiding Space[J]. Chinese Journal of Electronics, 2013, 22(4): 826-832.
Citation: YUAN Jian, HUANG Yongfeng, LI Xing. A Quantitation Method to the Imperceptibility of Hiding-Vector in Multi-dimensional Hiding Space[J]. Chinese Journal of Electronics, 2013, 22(4): 826-832.

A Quantitation Method to the Imperceptibility of Hiding-Vector in Multi-dimensional Hiding Space

Funds: This work is supported by the National High Technology Research and Development Program of China (863 Program) (No.2011AA010704), the National Natural Science Foundation of China (No.61271392), and Tsinghua University Initiative Scientific Research Program (No.20111081023).
More Information
  • Corresponding author:

    YUAN Jian

  • Received Date: August 31, 2012
  • Revised Date: December 31, 2012
  • Published Date: September 24, 2013
  • Currently, few general methods have been suggested to quantitate the imperceptibility among various hiding algorithms. Especially, it is a challenge to quantitate the imperceptibility of the hiding-vector, which is consisted of orthogonal hiding algorithms in the multidimensional hiding space. In this paper, a novel model of general imperceptibility quantitation was proposed. According to this model, a quantitation method based on the relative entropy was designed. It is proved under this quantitation method that there exists the global maximal imperceptibility for any specified hiding-vector capacity. An optimization algorithm was proposed to approach this maximum by adjusting the allocation of secret message into each components of the hiding-vector. Experiments with VoI Pand bitmap multi-dimensional hiding space validated the effectiveness of the designed quantitation method and the proposed optimization algorithm.
  • A. Almohammad, G. Ghinea and R.M. Hierons, “JPEGs teganography: A performance evaluation of quantization tables”,Int. Conf. on Advanced Information Networking andA pplications (AINA 2009), Bradford, United Kingdom, pp.471-4 78, 2009.
    J.A. Christaline and D. Vaishali, “Image steganographic techniquesw ith improved embedding capacity and robustness”, Proc. of International Conference on Recent Trends in InformationT echnology (ICRTIT 2011), MIT, Anna University, Chennai, USA, pp.97-101, 2011.
    V. Thanikaiselvan and P. Arulmozhivarman, “Wave(let) decidec hoosy pixel embedding for stego”, Proc. of International Conferenceo n Computer, Communication and Electrical Technology( ICCCET 2011), Tamilnadu, India, pp.157-162, 2011.
    N. Kitawaki, H. Nagabuchi and K. Itoh, “Objective quality evaluationf or low-bit-rate speech coding systems”, IEEE Journalo n Selected Areas in Communications, Vol.6, No.2, pp.242-248,1 988.
    ITU-T P.862:2001, Perceptual Evaluation of Speech Quality( PESQ), An Objective Method for End-to-End Speech Quality Assessment of Narrow-Band Telephone Networks and Speech Codecs.
    H.I. Shahadi and R. Jidin, “High capacity and inaudibility audios teganography scheme”, Proc. of the 7th International Conferenceo n Information Assurance and Security (IAS 2011),Malacca, Malaysia, pp.104-109, 2011.
    Bo Xiao, Yongfeng Huang and Shanyu Tang, “An approacht o information hiding in low bit-rate speech stream”, Proc. of IEEE GLOBECOM 2008, New Orleans, Louisiana, U.S.A.,p p.1-5, 2008.
    Yongfeng Huang, Shanyu Tang and Jian Yuan, “Steganographyi n inactive frames of VoI Pstreams encoded by sourcec odec”, IEEE Transactions on Information Forensics and Security,Vol.6, No.2, pp.296-306, 2011.
    Zheming Lu, Bin Yan and Shenghe Sun, “Watermarking combinedw ith CEL Pspeech coding for authentication”, IEICET ransactions on Information and Systems, Vol.E88-D, No.2,p p.330-334, 2005.
    Liping Ji, Xiaolong Li, Bin Yang and Zhihong Liu, “A furthers tudy on a PVD-based steganography”, Proc. of International Conference on Multimedia Information Networking and Security( MINES 2010), Nanjing, Jiangsu, China, pp.686-690, 2010.
    M. Ramezani and S. Ghaemmagham, “Adaptive images teganography with mod-4 embedding using image contrast”, Proc. of the 7th IEEE Consumer Communications and Networking Conf. (CCN C2010), Las Vegas, Nevada, U.S.A., pp.1-4 , 2010.
    ITU-T G.723.1:2006, Dual Rate Speech Coder for Multimedia Communications Transmitting at 5.3 and 6.3 Kbit/s.
    RF C3550:2003, RTP: A Transport Protocol for Real-Time Applications.
    Hui Tian, Ke Zhou, Hong Jiang, Yongfeng Huang, Jin Liu andD an Feng, “An adaptive steganography scheme for voice overI P”, In the Proc. of IEEE Int. Symposium on Circuits andS ystems (ISCAS2009), Taipei, Taiwan, pp.2922-2925, 2009.
    Linda Yunlu Bai, Yongfeng Huang, Guannan Hou and Bo Xiao,“Covert channels based on jitter field of the RTC Pheader”, Proc. of IEEE IIHMS P2008, Harbin, China, pp.1388-1391,2 008.
    Yongfeng Huang, Jian Yuan, Minchao Chen, Y. Zhang, ShanyuT ang, “Key Distribution in the Convert Communication Basedon VoIP”, Chinese Journal of Electronics, Vol.20, No.2, pp.357-3 61, 2011.
    A. Westfeld, “F5-A steganographic algorithm”, InformationH iding, Lecture Notes in Computer Science, Springer, pp.289-302, 2001.
    US CViterbi School of Engineering, “The USC-SIPI ImageD atabase”, http://sipi.usc.edu/database, 2012.
    T. Pevný, P. Bas and J. Fridrich, “Steganalysis by subtractivep ixel adjacency matrix”, IEEE Transactions on Information Forensics and Security, Vol.5, No.2, pp.215-224, 2010.
  • Related Articles

    [1]Zhao Junfeng, Wang Shen, Sun Fanghui. Saliency Map Construction for Adversarial Image Steganography[J]. Chinese Journal of Electronics, 2025, 34(3): 816-827. DOI: 10.23919/cje.2024.00.090
    [2]LI Hao, ZHANG Yi, WANG Jinwei, ZHANG Weiming, LUO Xiangyang. Lightweight Steganography Detection Method Based on Multiple Residual Structures and Transformer[J]. Chinese Journal of Electronics, 2024, 33(4): 965-978. DOI: 10.23919/cje.2022.00.452
    [3]CAO Yuanlong, LI Junjie, CHAO Kailin, XIAO Jianmao, LEI Gang. Blockchain Meets Generative Behavior Steganography: A Novel Covert Communication Framework for Secure IoT Edge Computing[J]. Chinese Journal of Electronics, 2024, 33(4): 886-898. DOI: 10.23919/cje.2023.00.382
    [4]WEN Juan, ZHANG Jie, ZHOU Jie, LI Yan, XUE Yiming. An Adaptive JPEG Steganographic Scheme Based on Run-Length Statistical Complexity[J]. Chinese Journal of Electronics, 2018, 27(1): 52-59. DOI: 10.1049/cje.2017.11.012
    [5]WU Zhijun, CAO Haijuan, LI Douzhe. An Approach of Steganography in G.729 Bitstream Based on Matrix Coding and Interleaving[J]. Chinese Journal of Electronics, 2015, 24(1): 157-165.
    [6]HUANG Qinghua, WANG Tong. Multi-dimensional EEF Criterion for Source Number Estimation[J]. Chinese Journal of Electronics, 2014, 23(3): 503-507.
    [7]HUANG Yongfeng, YUAN Jian, CHEN Minchao, XIAO Bo. Key Distribution over the Covert Communication Based on VoIP[J]. Chinese Journal of Electronics, 2011, 20(2): 357-360.
    [8]HU Donghui, WANG Lina, JIANG Xiaqiu, YE Dengpan, LIAN Shiguo. A Specific Steganalysis Approach to Effective Attacking the MB1[J]. Chinese Journal of Electronics, 2009, 18(4): 610-614.
    [9]GUO Yanqing, KONG Xiangwei, YOU Xingang, LI Lingling. Universal Methodology for Developing Quantitative Steganalysis[J]. Chinese Journal of Electronics, 2009, 18(3): 455-459.
    [10]NIU Shaozhang, ZHOU Qi, CUI Baojiang, ZHOU Linna. Detecting LSB Steganography Based on Noise Function[J]. Chinese Journal of Electronics, 2009, 18(2): 343-346.

Catalog

    Article Metrics

    Article views (551) PDF downloads (1047) Cited by()
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return