ZHANG Zhan, QU Fang, LIU Guangjie, WANG Junwen, DAI Yuewei, WANG Zhiquan. A Novel Security Evaluation Method for Digital Image Steganography Based on High-order Markov Chain Model[J]. INFORMATION AND CONTROL, 2010, 39(4): 455-461.
Citation: ZHANG Zhan, QU Fang, LIU Guangjie, WANG Junwen, DAI Yuewei, WANG Zhiquan. A Novel Security Evaluation Method for Digital Image Steganography Based on High-order Markov Chain Model[J]. INFORMATION AND CONTROL, 2010, 39(4): 455-461.

A Novel Security Evaluation Method for Digital Image Steganography Based on High-order Markov Chain Model

More Information
  • Received Date: August 10, 2009
  • Revised Date: May 26, 2010
  • Published Date: August 19, 2010
  • In order to re?ect more accurately the effect of steganography on the high-order statistical characteristics of cover image,a high-order Markov chain statistical model for digital image steganography is proposed.After a comparison of the results of high-order Markov chain model constructed by several common image scanning methods,an n-order Markov chain model for digital image steganography using Hilbert scanning method is adopted.Then the effect of steganography on empirical matrix of the proposed model is studied,a statistical measure for n-order Markov chain model to evaluate the statistical security of digital image steganography is proposed,and the boundedness and equivalence to ε-secure criterion in the given conditions of this measure are proved.Experiments show the changes of empirical matrix of the proposed model in cover and stego images,and comparing with ε-secure criterion and the statistical measure of Markov chain model,the changes of cover-image's high-order statistical distribution caused by steganography are re?ected more adequately in the statistical measure of the proposed model.
  • [1]
    Luo X Y,Wang D S,Wang P,et al.A review on blind detection for image steganography[J].Signal Processing,2008,88(9):2138-2157.
    [2]
    Sullivan K,Madhow U,Chandrasekaran S,et al.Steganalysis of spread spectrum data hiding exploiting cover memory[C]//Conference on Security,Steganography and Watermarking of Multimedia Contents Ⅶ:vol.5681.Bellingham,WA,USA:SPIE,2005:38-46.
    [3]
    Xuan G R,Shi Y Q,Gao J J,et al.Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions[M]//Lecture Notes in Computer Science:vol.3727.Berlin,Germany:Springer,2005:262-277.
    [4]
    Cachin C.An information-theoretic model for steganography[J].Information and Computation,2004,192(1):41-56.  
    [5]
    Wang Y,Moulin P.Steganalysis of block-structured stegotext[C]//Conference on Security,Steganography and Watermarking of Multimedia Contents Ⅵ:vol.5306.Bellingham,WA,USA:SPIE,2004:477.488.
    [6]
    Sullivan K,Madhow U,Chandrasekaran S,et al.Steganalysis for Markov cover data with applications to images[J].IEEE Transactions on Information Forensics and Security,2006,1(2):275-287.  
    [7]
    Ambalavanan A,Chandramouli R.A Bayesian image steganalysis approach to estimate the embedded secret message length[C]//7th Workshop on Multimedia and Security.New York,NY,USA:ACM,2005:33-38
    [8]
    陈丹,王育民.基于图像模型的掩密安全性定义[J].哈尔滨工业大学学报,2006,38(suppl.):901-904.Chen Dan,Wang Yumin.Steganography security definition based on image models[J].Journal of Harbin Institute of Technology,2006,38(suppl.):901-904.
    [9]
    Pevny T,Fridrich J.Benchmarking for steganography[M]//Lecture Notes in Computer Science:vol.5284.Berlin,Germany:Springer-Veriag,2008:251-267.
    [10]
    Bishop Y M,Fienberg S E,Holland P W.Discrete multivariate analysis:Theory and practice[M].Cambridge,MA,USA:MIT Press,2007:267-270.
    [11]
    Dabeer O,Sullivan K,Madhow U,et al.Detection of hiding in the least significant bit[J].IEEE Transactions on Signal Processing,2004,52(10):3046-3058.  
    [12]
    Hogan M T,Hurley N J,Silvestre G C M,et al.ML detection of steganography[C]//Conference on Security,Steganography and Watermarking of Multimedia Contents Ⅷ:vol.5681.Bellingham,WA,USA:SPIE,2005:16-27.
    [13]
    张湛,刘光杰,王俊文,等.基于Markov链安全性的量化隐写算法[J].光电子·激光,2009,20(7):944-949.Zhang Zhan,Liu Guangjie,Wang Junwen,et al.A novel quantization-embedded steganographic algorithm based on Markov chain security[J].Journal of Optoelectronics Laser,2009,20(7):944-949.
    [14]
    University of Southern California.USC-SIPI Image Database[DB/OL].[2008-05-15].http://sipi.usc.edu/services/database lindex.html,2008.
    [15]
    Schaefer G,Stich M.UCID-An uncompressed colour image database[-DB/OL].[2008-05-26].http://vision.cs.aston.ac.uk/datasets/UCID/ucid.html,2008.

Catalog

    Article views (1539) PDF downloads (265) Cited by()
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return