In order to optionally regulate embedding capacity and embedding transparency according to user's requirements in voice-over-IP(VoIP) steganography,a dynamic matrix encoding strategy(DMES) was presented.Differing ...In order to optionally regulate embedding capacity and embedding transparency according to user's requirements in voice-over-IP(VoIP) steganography,a dynamic matrix encoding strategy(DMES) was presented.Differing from the traditional matrix encoding strategy,DMES dynamically chose the size of each message group in a given set of adoptable message sizes.The appearance possibilities of all adoptable sizes were set in accordance with the desired embedding performance(embedding rate or bit-change rate).Accordingly,a searching algorithm that could provide an optimal combination of appearance possibilities was proposed.Furthermore,the roulette wheel algorithm was employed to determine the size of each message group according to the optimal combination of appearance possibilities.The effectiveness of DMES was evaluated in StegVoIP,which is a typical covert communication system based on VoIP.The experimental results demonstrate that DMES can adjust embedding capacity and embedding transparency effectively and flexibly,and achieve the desired embedding performance in any case.For the desired embedding rate,the average errors are not more than 0.000 8,and the standard deviations are not more than 0.002 0;for the desired bit-change rate,the average errors are not more than 0.001 4,and the standard deviations are not more than 0.002 6.展开更多
The rapid development of data communication in modern era demands secure exchange of information. Steganography is an established method for hiding secret data from an unauthorized access into a cover object in such a...The rapid development of data communication in modern era demands secure exchange of information. Steganography is an established method for hiding secret data from an unauthorized access into a cover object in such a way that it is invisible to human eyes. The cover object can be image, text, audio,or video. This paper proposes a secure steganography algorithm that hides a bitstream of the secret text into the least significant bits(LSBs) of the approximation coefficients of the integer wavelet transform(IWT) of grayscale images as well as each component of color images to form stego-images. The embedding and extracting phases of the proposed steganography algorithms are performed using the MATLAB software. Invisibility, payload capacity, and security in terms of peak signal to noise ratio(PSNR) and robustness are the key challenges to steganography. The statistical distortion between the cover images and the stego-images is measured by using the mean square error(MSE) and the PSNR, while the degree of closeness between them is evaluated using the normalized cross correlation(NCC). The experimental results show that, the proposed algorithms can hide the secret text with a large payload capacity with a high level of security and a higher invisibility. Furthermore, the proposed technique is computationally efficient and better results for both PSNR and NCC are achieved compared with the previous algorithms.展开更多
The evolution in communication techniques has created wide threats for crucial information transfer through a communication channel. Covert communication with steganography is a skill of concealing secret information ...The evolution in communication techniques has created wide threats for crucial information transfer through a communication channel. Covert communication with steganography is a skill of concealing secret information within cover object and hence shields the data theft over rapidly growing network.Recently, diverse steganography techniques using edge identification have been proposed in literature.Numerous methods however utilize certain pixels in the cover image for inserting edge information,resulting in significant deformation. The conventional edge detection method limits the deployment of edge detection in steganography as concealing the information would introduce some variations to the cover image. Hence inserting data in pixel areas recognized by existing conventional edge detection techniques like canny cannot ensure the recognition of the exact edge locations for the cover and stego images. In this paper, an Adaptive steganography method based on novel fuzzy edge identification is proposed. The method proposed is proficient of estimating the precise edge areas of a cover image and also ensures the exact edge location after embedding the secret message. Experimental results reveal that the technique has attained good imperceptibility compared to the Hayat AI-Dmour and Ahmed AIAni Edge XOR method in spatial domain.展开更多
In order to provide larger capacity of the hidden secret data while maintaining a good visual quality of stego-image, in accordance with the visual property that human eyes are less sensitive to strong texture, a nove...In order to provide larger capacity of the hidden secret data while maintaining a good visual quality of stego-image, in accordance with the visual property that human eyes are less sensitive to strong texture, a novel steganographic method based on wavelet and modulus function is presented. First, an image is divided into blocks of prescribed size, and every block is decomposed into one-level wavelet. Then, the capacity of the hidden secret data is decided with the number of wavelet coefficients of larger magnitude. Finally, secret information is embedded by steganography based on modulus function. From the experimental results, the proposed method hides much more information and maintains a good visual quality of stego-image. Besides, the embedded data can be extracted from the stego-image without referencing the original image.展开更多
Steganography based on bits-modification of speech frames is a kind of commonly used method, which targets at RTP payloads and offers covert communications over voice-over-IP(Vo IP). However, direct modification on fr...Steganography based on bits-modification of speech frames is a kind of commonly used method, which targets at RTP payloads and offers covert communications over voice-over-IP(Vo IP). However, direct modification on frames is often independent of the inherent speech features, which may lead to great degradation of speech quality. A novel frame-bitrate-change based steganography is proposed in this work, which discovers a novel covert channel for Vo IP and introduces less distortion. This method exploits the feature of multi-rate speech codecs that the practical bitrate of speech frame is identified only by speech decoder at receiving end. Based on this characteristic, two steganography strategies called bitrate downgrading(BD) and bitrate switching(BS)are provided. The first strategy substitutes high bit-rate speech frames with lower ones to embed secret message, which introduces very low distortion in practice, and much less than other bits-modification based methods with the same embedding capacity. The second one encodes secret message bits into different types of speech frames, which is an alternative choice for supplement. The two strategies are implemented and tested on our covert communication system Steg Vo IP. The experiment results show that our proposed method is effective and fulfills the real-time requirement of Vo IP communication.展开更多
基金Project(2009AA01A402) supported by the National High-Tech Research and Development Program of ChinaProject(NCET-06-0650) supported by Program for New Century Excellent Talents in University Project(IRT-0725) supported by Program for Changjiang Scholars and Innovative Research Team in Chinese University
文摘In order to optionally regulate embedding capacity and embedding transparency according to user's requirements in voice-over-IP(VoIP) steganography,a dynamic matrix encoding strategy(DMES) was presented.Differing from the traditional matrix encoding strategy,DMES dynamically chose the size of each message group in a given set of adoptable message sizes.The appearance possibilities of all adoptable sizes were set in accordance with the desired embedding performance(embedding rate or bit-change rate).Accordingly,a searching algorithm that could provide an optimal combination of appearance possibilities was proposed.Furthermore,the roulette wheel algorithm was employed to determine the size of each message group according to the optimal combination of appearance possibilities.The effectiveness of DMES was evaluated in StegVoIP,which is a typical covert communication system based on VoIP.The experimental results demonstrate that DMES can adjust embedding capacity and embedding transparency effectively and flexibly,and achieve the desired embedding performance in any case.For the desired embedding rate,the average errors are not more than 0.000 8,and the standard deviations are not more than 0.002 0;for the desired bit-change rate,the average errors are not more than 0.001 4,and the standard deviations are not more than 0.002 6.
文摘The rapid development of data communication in modern era demands secure exchange of information. Steganography is an established method for hiding secret data from an unauthorized access into a cover object in such a way that it is invisible to human eyes. The cover object can be image, text, audio,or video. This paper proposes a secure steganography algorithm that hides a bitstream of the secret text into the least significant bits(LSBs) of the approximation coefficients of the integer wavelet transform(IWT) of grayscale images as well as each component of color images to form stego-images. The embedding and extracting phases of the proposed steganography algorithms are performed using the MATLAB software. Invisibility, payload capacity, and security in terms of peak signal to noise ratio(PSNR) and robustness are the key challenges to steganography. The statistical distortion between the cover images and the stego-images is measured by using the mean square error(MSE) and the PSNR, while the degree of closeness between them is evaluated using the normalized cross correlation(NCC). The experimental results show that, the proposed algorithms can hide the secret text with a large payload capacity with a high level of security and a higher invisibility. Furthermore, the proposed technique is computationally efficient and better results for both PSNR and NCC are achieved compared with the previous algorithms.
文摘The evolution in communication techniques has created wide threats for crucial information transfer through a communication channel. Covert communication with steganography is a skill of concealing secret information within cover object and hence shields the data theft over rapidly growing network.Recently, diverse steganography techniques using edge identification have been proposed in literature.Numerous methods however utilize certain pixels in the cover image for inserting edge information,resulting in significant deformation. The conventional edge detection method limits the deployment of edge detection in steganography as concealing the information would introduce some variations to the cover image. Hence inserting data in pixel areas recognized by existing conventional edge detection techniques like canny cannot ensure the recognition of the exact edge locations for the cover and stego images. In this paper, an Adaptive steganography method based on novel fuzzy edge identification is proposed. The method proposed is proficient of estimating the precise edge areas of a cover image and also ensures the exact edge location after embedding the secret message. Experimental results reveal that the technique has attained good imperceptibility compared to the Hayat AI-Dmour and Ahmed AIAni Edge XOR method in spatial domain.
基金the National Natural Science Foundation of China (50677014)Hunan Provincial Natural Science Foundation of China (06JJ50114).
文摘In order to provide larger capacity of the hidden secret data while maintaining a good visual quality of stego-image, in accordance with the visual property that human eyes are less sensitive to strong texture, a novel steganographic method based on wavelet and modulus function is presented. First, an image is divided into blocks of prescribed size, and every block is decomposed into one-level wavelet. Then, the capacity of the hidden secret data is decided with the number of wavelet coefficients of larger magnitude. Finally, secret information is embedded by steganography based on modulus function. From the experimental results, the proposed method hides much more information and maintains a good visual quality of stego-image. Besides, the embedded data can be extracted from the stego-image without referencing the original image.
基金Project(2011CB302305)supported by National Basic Research Program(973 Program)of ChinaProjects(61232004,61302094)supported by National Natural Science Foundation of China+2 种基金Project(ZQN-PY115)supported by Promotion Program for Young and Middle-aged Teacher in Science and Technology Research of Huaqiao University,ChinaProject(JA13012)supported by Education Science Research Program for Young and Middle-aged Teacher of Fujian Province of ChinaProject(2014J01238)supported by Natural Science Foundation of Fujian Province of China
文摘Steganography based on bits-modification of speech frames is a kind of commonly used method, which targets at RTP payloads and offers covert communications over voice-over-IP(Vo IP). However, direct modification on frames is often independent of the inherent speech features, which may lead to great degradation of speech quality. A novel frame-bitrate-change based steganography is proposed in this work, which discovers a novel covert channel for Vo IP and introduces less distortion. This method exploits the feature of multi-rate speech codecs that the practical bitrate of speech frame is identified only by speech decoder at receiving end. Based on this characteristic, two steganography strategies called bitrate downgrading(BD) and bitrate switching(BS)are provided. The first strategy substitutes high bit-rate speech frames with lower ones to embed secret message, which introduces very low distortion in practice, and much less than other bits-modification based methods with the same embedding capacity. The second one encodes secret message bits into different types of speech frames, which is an alternative choice for supplement. The two strategies are implemented and tested on our covert communication system Steg Vo IP. The experiment results show that our proposed method is effective and fulfills the real-time requirement of Vo IP communication.