z-logo
open-access-imgOpen Access
Steganography in beautified mages
Author(s) -
Li Yun Liu,
Zi Chi Wang,
Zhen Qian,
Xin Peng Zhang,
Guo Rui Feng
Publication year - 2019
Publication title -
mathematical biosciences and engineering
Language(s) - Uncategorized
Resource type - Journals
SCImago Journal Rank - 0.451
H-Index - 45
eISSN - 1551-0018
pISSN - 1547-1063
DOI - 10.3934/mbe.2019116
Subject(s) - steganalysis , steganography , beautification , embedding , distortion (music) , computer science , artificial intelligence , image (mathematics) , watermark , steganography tools , digital watermarking , computer vision , pattern recognition (psychology) , telecommunications , amplifier , civil engineering , bandwidth (computing) , engineering
Existing distortion functions in steganography which achieved high undetectability are designed for unprocessed natural image. Nowadays, a large number of images are filtered before transmitting for the sake of beautification. In this situation, existing distortion functions should be improved to fit the properties of these beautified images. This paper proposes a distortion function optimization method for steganography on beautified images. Given an unprocessed image, a popular image beautification software is employed to produce two similar beautified images. One of them is used for embedding and the other one is employed as reference. Guided by the reference, existing distortion functions are improved by distinguishing the embedding costs for ±1 embedding. After embedding, the stego image is closer to the reference, which results in a higher undetectability against steganalysis. Experimental results also proved the increasing of undetectability when examined by modern steganalytic tools.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here