亚洲免费av电影一区二区三区,日韩爱爱视频,51精品视频一区二区三区,91视频爱爱,日韩欧美在线播放视频,中文字幕少妇AV,亚洲电影中文字幕,久久久久亚洲av成人网址,久久综合视频网站,国产在线不卡免费播放

        ?

        An Image Steganography Algorithm Based on Quantization Index Modulation Resisting Scaling Attacks and Statistical Detection

        2018-08-15 10:38:34YueZhangDengpanYeJunjunGanZhenyuLiandQingfengCheng
        Computers Materials&Continua 2018年7期

        Yue Zhang, Dengpan Ye, Junjun Gan, Zhenyu Li and Qingfeng Cheng,

        Abstract: In view of the fact that the current adaptive steganography algorithms are difficult to resist scaling attacks and that a method resisting scaling attack is only for the nearest neighbor interpolation method, this paper proposes an image steganography algorithm based on quantization index modulation resisting both scaling attacks and statistical detection. For the spatial image, this paper uses the watermarking algorithm based on quantization index modulation to extract the embedded domain. Then construct the embedding distortion function of the new embedded domain based on S-UNIWARD steganography, and use the minimum distortion coding to realize the embedding of the secret messages. Finally, according to the embedding modification amplitude of secret messages in the new embedded domain, the quantization index modulation algorithm is applied to realize the final embedding of secret messages in the original embedded domain. The experimental results show that the algorithm proposed is robust to the three common interpolation attacks including the nearest neighbor interpolation, the bilinear interpolation and the bicubic interpolation. And the average correct extraction rate of embedded messages increases from 50% to over 93% after 0.5 times-fold scaling attack using the bicubic interpolation method, compared with the classical steganography algorithm S-UNIWARD. Also the algorithm proposed has higher detection resistance than the original watermarking algorithm based on quantization index modulation.

        Keywords: Image steganography, anti-scaling attack, anti-statistical detection, quantization index modulation.

        1 Introduction

        The steganography technology embeds secret messages into the cover file by certain modification way, so as to achieve the covert communications through broadband and Wi-Fi. As one branch of the steganography technology, digital image steganography has been widely used in the modern era of digital media and network development resisting detection of rich model [Ma, Luo, Li et al. (2018)]. However, with the development of electronic equipment, the digital image sharpness is getting higher, and the memory space occupied is also increasing, which makes the digital image suffer compression, scaling and other processing operations during transmission, resulting in the decline of digital image quality and information loss. If the existing highly-resistant adaptive image steganography is applied directly to digital images of electronic devices to realize information covert communication, it is difficult to extract the secret completely and correctly from the received stego image. Therefore, in order to realize the steganography technology based on electronic devices, the robustness of embedded message to image processing operation should be considered while the stego image is highly resistant to statistical detection. This paper focuses on image scaling processing, and studies an image steganography algorithm which can resist both scaling attack and statistical detection.

        In the aspect of anti-statistic detection, the existing adaptive steganography algorithms have realized the high anti-detection. Most of these algorithms calculate the distortion caused by the change of the cover pixel, and then apply the STCs coding [Tomas, Judas and Fridrich (2011)] to select the location with small distortion to realize the embedding of the secret messages. In recent years, with the rapid development of adaptive steganography,the design of distortion function is also various. Typical spatial adaptive steganography such as Hugo (Highly-undetectable Stego) [Pevny, Filler and Bas (2010); Luo, Song, Li et al. (2016)] steganography algorithm, WOW (Wavelet obtained Weights) [Holub and Fridrich (2012)] steganography algorithm, S-UNIWARD (Spatial Universal Wavelet relative Distortion) [Holub and Fridrich (2013)] steganography algorithm. In addition, there are Hill (High-pass, Low-pass, and Low-pass) [Li, Wang, Huang et al. (2014)], MiPOD(Minimizing the Power of Optimal Detor) algorithm [Sedighi, Cogranne and Fridrich(2016)], and so on, which have higher resistance to detection. Typical frequency-domain adaptive steganography algorithms such as UED (uniform embedding distortion) [Guo, Ni and Shi (2012)] Steganography and J-UNIWARD (JPEG Universal Wavelet Relative Distortion) [Holub and Fridrich (2013)] steganography algorithm. With the further research,the anti-detection performance of steganography algorithms has been greatly improved.However, a large number of experiments show that such steganography algorithms often have a high error rate in extracting secret message after suffering scaling attack. For example, a typical steganography S-UNIWARD, after a 0.5x the nearest neighbor interpolation scaling attack, whose correct rate of secret message extracted is only 50%.

        The main research of anti-scaling attack performance is focused on the field of digital watermarking, and most of the existing robust watermarking algorithms are robust to scaling attacks. The common watermarking algorithms resisting scaling attacks are based on geometric invariants, time-frequency transform, image features, quantization index modulation and so on. Kim et al. [Kim, Choi, Park et al. (2003)] use logarithmic polar graph to obtain geometric invariants in the spatial domain, this scheme has strong robustness to RST (Rotation, Scaling, Translation) attacks. In the paper of Naderahmadian et al. [Naderahmadian and Beheshti (2015)], the message is embedded in the image wavelet domain in order to obtain stronger scaling attack performance. The Literature [Lin, Niu and Jiang (2015)] uses the Harris detector to extract the feature points and embed the watermark message. Zareian et al. [Zareian and Tohidypour (2014)]combined with image time-frequency transformation and quantization index modulation,watermark message can be extracted completely and correctly when watermark image suffers 0.5 times scaling attack. Most of these algorithms embed secret message into the region which is insensitive to scaling attack, and use the embedding algorithm of anti-scaling attack, which greatly improves the robustness of the algorithm to the scaling and other image processing attacks. However, if applied directly to the steganography field,only a few algorithms can ensure that the secret message is extracted correctly after the scaling attack. On the other hand, most of these watermarking algorithms modify the main content of the cover image to improve the robustness, so the image distortion is relatively large, so their performance of anti-detection is poor.

        In view of the effect of image processing on the performance of steganography, the papers [Zhang, Luo, Yang et al. (2015, 2016); Zhang, Qin, Zhang et al. (2018)] put forward the solution, which can resist JPEG compression processing and statistical detection. The main idea is to improve the robustness of the stego image to the compression attack by combining the robust watermarking algorithm against JPEG compression while guaranteeing the anti-detection of the stego image. However, such methods only consider compression attacks and do not consider scaling attacks during image transmission. Based on these researches, this paper studies the method of image steganography which can resist both scaling attack and statistic detection.

        In view of anti-scaling attack of steganography algorithm, we have proposed a steganography method based on scaling invariant pixels for anti-scaling attack and statistical detection. This method extracts the invariant pixels from the cover image suffering the nearest neighbor scaling attack, and generates a new embedded cover, and then uses the spatial distortion function S-UNIWARD to compute the distortion of the new cover, and finally embeds the secret message by STCs coding. This steganography ensures high resistance to detection and scaling attack, and also high embedding capacity.However, this method is only valid for the nearest neighbor interpolation scaling attack,and not resistant to other scaling methods.

        In this paper, combining the watermarking algorithm with strong robustness to scaling attack, an image adaptive steganography algorithm based on quantization modulation resisting scaling attack and statistical detection is proposed, drawing on the research scheme in reference Zhang et al. [Zhang, Luo, Yang et al. (2015)]. For the spatial domain image, the algorithm firstly uses the watermarking algorithm based on quantization index modulation to extract the embedded domain of secret message, then uses the spatial distortion function S-UNIWARD to construct the embedded distortion of the new embedded domain, and uses the minimization distortion coding to embed secret message.Finally, according to the modified amplitude of the new embedded domain, the algorithm based on quantization index modulation is applied to realize the final embedding of secret message in the original embedded domain. The algorithm is robust to three kinds of common interpolation scaling attacks [Han (2013)], and also has resistance to detection.The remainder of this manuscript is organized as follows. In the second section, the original quantization index modulation watermarking algorithm and the principle of S-UNIWARD distortion function and STCs coding are described. The third section elaborates the principle frame and the concrete steps of the proposed algorithm. The fourth section performs performance analysis from two aspects of algorithm anti-scaling and antidetection. The fifth section gives the experimental results, and the sixth section is the conclusion.

        2 Related work

        2.1 Quantization index modulation watermarking algorithm

        The embedded algorithm of quantization index modulation (QIM) modulates the cover vector into different intervals to form the stego vector according to the different embedded message. If the stego vector is still fluctuating in this interval after scaling attack, it shows that it has better anti-scaling attack performance. In the paper Chen et al.[Chen and Wornell (2001)], a watermarking algorithm based on quantization index modulation is proposed, in which the distortion between cover vector and stego vector is minimized, and the robustness to image processing attack is considered. The basic principle of quantization index modulation algorithm and its contribution to the design of steganography algorithm against scaling attack and statistical detection are described below.The basic QIM algorithm uses two uniform quantizers Q0(.)and Q1(.), their centroids are given by the shift latticis the integer set,is the quantization step. Assuming that the cover vector is u , m ∈{0 ,1}is the message bit to be embedded. When the message is embedded, the following formula is applied to modulate the cover vector to the corresponding interval.

        where u′is the stego vector. The extraction operation is accomplished by minimizing the Euclidean Distance between u′and Qm(u).The watermarking algorithm based on quantization index modulation achieves its antiscaling capability by modulating the cover vector into different intervals according to the secret massage bit and quantization step. When the stego vector is attacked, the secret message can still be extracted exactly if its value is still fluctuating within the interval.For image scaling processing, the more accurate the algorithm is, the smaller the numerical change is, the higher the resistance.

        2.2 S-UNIWARD steganography algorithm

        S-UNIWARD steganography is a common steganography algorithm for spatial images.The distortion is calculated as the sum of the relative changes of the decomposition coefficients of the directional filter group of the cover image, and the detection resistance is improved by embedding the secret message into the region with complex texture. The calculation formula is as follows.

        where X and Y represent the cover and stego images in the spatial domain,andare their corresponding uvth wavelet coefficient in the k-th subband of the first decomposition level. σ>0is a constant used to stabilize numerical computations.

        STCs code is the encoding method commonly used in adaptive steganography, which can make the message embedding minimize the modification of the cover pixel. The process of embedding and extracting secret information using STCS encoding are shown in formulas (4) and (5).

        3 Image steganography algorithm based on quantization index modulation

        In order to enhance the robustness of the algorithm to a variety of scaling attacks, the adaptive steganography algorithm based on quantization index modulation against scaling attack and statistical detection is proposed in this paper. The quantization index modulation watermarking algorithm is used to extract the robust embedded domain and embedding mode, which guarantees the robustness of the algorithm to common scaling attacks. At the same time, the new distortion function is designed according to the original cover image modification after message embedding, so that the algorithm has resistance to detection. The principle frame and the main steps of the proposed algorithm during embedding and extracting are introduced in following.

        3.1 Algorithm principle architecture

        The schematic diagram of the image steganography algorithm based on quantization index modulation resisting scaling attack and statistical detection is shown in Fig. 1. Its embedding process and extraction process are described as follows.

        Embedding process:

        Step 1: Extract new cover elements. For the original spatial cover image, the robust watermark extraction algorithm based on quantization index modulation is used to extract new cover elements. It is convenient to use STCs code to find the embedded location with less distortion.

        Step 2: Design distortion function. Combined with the modified amplitude of the original cover image after embedding 0 and 1 by watermarking algorithm, the embedded distortion of new cover elements is constructed using S-UNIWARD of the spatial distortion function.

        Step 3: Minimize distortion embedding. Using the minimum distortion coding STCs to embed secret message in the new cover elements, the message embedding can minimize the change of new cover elements so as to achieve anti-detection.

        Step 4: Modify the original cover image according to the stego elements. According to the modifying of the cover elements by secret message, the watermarking algorithm based on quantization index modulation is used to embed the stego elements containing the secret message into the original cover image and to generate stego image.

        Figure 1: The diagram of the proposed algorithm

        Extraction process:

        Step 1: Stego image processing. Once again, the stego imagesubjected to the scaling attack is scaled to obtain the stego image′′with the same size as the original stego image.

        Step 2: Extract the stego elements. The robust watermark extraction algorithm based on quantization index modulation is applied to extract the stego elements encoded by STCs in preparation for further extracting the secret message.

        Step 3: Minimize distortion decoding. The secret message embedded in the stego elements in the Step 2 is extracted by STCs decoding.

        The algorithm proposed uses the robust watermark algorithm based on quantization index modulation to extract the embedded domain and the embedding modification amplitude of the secret message, and combines the distortion function design and STCs coding to embed the secret message into the cover image, which not only maintains the robustness of the algorithm to scaling attack, but also guarantees the anti-detection of the algorithm to a certain extent.

        The main steps in the process of embedding and extracting are introduced respectively,including the secret message embedding and extracting algorithm based on quantization index modulation and the design of distortion function based on modification amplitude of cover image.

        3.2 Watermarking algorithm based on quantization index modulation

        Based on the quantization index modulation algorithm, the new cover elements are extracted from the original cover image, which is convenient to design distortion function and improve the anti-detection performance of the algorithm. And the algorithm is further used to realize the final embedding of stego elements encoded by STCs to enhance its robustness against scaling attacks. The embedding and extraction algorithms are shown in Fig. 2 and Fig. 3, respectively.

        Figure 2: Secret message embedding algorithm based on quantization index modulation

        Figure 3: Secret message extraction algorithm based on quantization index modulation

        In the embedding process of the algorithm, the cover image is first transformed by wavelet transform, because embedding secret message in the wavelet domain can improve the robustness of the algorithm to the scaling attack. Then the wavelet low frequency coefficients are divided into blocks, the blocks are rearrange into vectors, and for each low frequency coefficient vector, u ={u1,u2,...,uN}, it is divided into odd vector x and even vector y , and, where Nis the length of cover vectors. Then calculate the norm of vector x and yrespectively, the formula is as follows.

        Then the relative relationship between the two vectors x and yis obtained by calculating the ratio of the norm lpof vectors x and yThen the method of quantization index modulation is applied to ratio z to get zq, and its calculation formula is as follows.

        where Δis the quantization step, determining the intensity of the modification of the vector. Finally, the values of sub-vectors x and y are modulated according to the ratio between z and zqto get x′and y′, and then rearrangeandto get. Through block combination, wavelet inverse transform, the stego image is finally obtained. The calculation formula of x′and y′are as follows.

        The extraction process of the algorithm is similar to the embedding process. After wavelet transform, the low frequency stego coefficients are divided into blocks. For each block, rearranged into vectors, and each vector u′is divided into odd vector x′and even vector y′, calculating the norm lp′of x′and y′respectively, getting the ratio z′. Then Q0(z ′)and Q1( z′)modulated z′by quantized modulation after embedding 0 and 1 are calculated respectively, and then calculate Euclidean distance between z′and Q0(z′),Q1( z ′). The secret message can be extracted according to the following formula.

        The extraction process of this algorithm is relatively simple, as long as knowing the quantization step Δusing when embedding. In the above embedding process, the ratio of the two norms is used to guarantees the relative numerical relationship between scaling sub-vectors. Therefore, the algorithm is robust to scaling attacks and the secret message can be extracted after stego image suffering scaling attacks.

        3.3 Design of distortion function based on modification amplitude of cover image

        Combining the modified amplitude of the original cover image after embedding 0 and 1 and the definition of the spatial distortion function S-UNIWARD, the embedded distortion of new cover elements are constructed, and the minimum distortion embedding is realized by STCs coding, which can reduce the influence of embedding of secret message to cover image and improve the detection performance. The design schematic diagram of the distortion function is shown below.

        Figure 4: Design schematic diagram of distortion function based on the modification amplitude of cover image

        Firstly, the ±1,±2and ±3distortion of cover image are calculated by S-UNIWARD according to the formula (3).

        Then, the secret message embedding algorithm based on quantization index modulation in 3.2 is used to embed 0 and 1 in the original cover image, to generate the stego image Y0and Y1. The modified amplitude of pixel value after embedding 0 and 1 of original cover image is calculated respectively, and the formula is as follows.

        where pX(i,j)is the pixel value of cover image, and pYm(i,j)is the pixel value after embedding m.

        The embedding algorithm based on quantization index modulation is to embed 1 bit message in each vector, so the distortion function after embedding 0 and 1 is defined as the sum of the distortion value of all pixel values in each vector.

        By means of the above distortion calculation, we can get the distortion value of the new cover element embedding 0 and 1. In addition, when we pre-embed 0 and 1, the distortion in the vectorwhere the extraction error occurred is wetcost, which means this block is less resistant to scaling attacks and is not suitable for embedding.

        4 Performance analysis

        4.1 Anti-scaling performance analysis

        Compared with S-UNIWARD steganography algorithm, the proposed steganography algorithm based on quantization index modulation improves the correct extraction rate of secret message after scaling attack. However, under the low scaling factor, compared with the robust algorithm based on quantization index modulation, the correct extraction rate of secret message is slightly lower. Because the algorithm proposed uses STCs code to embed and extract secret message, there is error diffusion in STCs decoding, that is, if the stego elements STCs encoded in extraction Step 2 has errors, using STCs decoding in Step 3 will result in a larger extraction error.

        The principle of correct message extraction and error diffusion during STCs decoding is shown in formulas (12) and (13). Hypothesis sub-check matrixh=2andw=2are the height and width of, respectively. H is a parity-check matrix.are the stego sequences before and after scaling, mand m ′are the sequences of secret messages extracted before and after scaling. The secret messages can be extracted exactly and correctly in the stego sequence ybefore scaling. However, a 1-bit error in the stego sequence will result in a 2-bit error in the extracted secret message m ′after scaling. The position of the red mark in y′indicates the position where the error occurred in the stego sequence after scaling, and the position of the red mark in H indicates the position associated with the error in y′.

        This is because there are at most h elements in any column of the check matrixthat are not zero. When yi′∈ y′goes wrong, it affects at most h bit in embedded message, that is, the upper limit of the error diffusion is h-fold of the error bit occurred in.

        4.2 Anti-detection performance analysis

        Compared with the original watermarking algorithm, the image steganography algorithm proposed based on quantization index modulation improves the detection resistance,which is because the algorithm based on the original watermarking algorithm, combined with the distortion function design and the principle of minimizing distortion embedding,makes the message embedding minimize the modification to cover image, so as to improve the detection resistance.

        Fig. 5 is the schematic diagram of the proposed algorithm for improving detection resistance. After embedding with distortion function and STC encoding, the amount of modifications generated in the stego elements relative to the cover elements are smaller than the original quantization index modulation algorithm. The stego elements with the red mark represent the modified elements after STCs encoding in embedding Step 3. For the stego elements not modified after embedding, the corresponding positions of the original cover image are not changed at the end of embedding in embedding Step 4,resulting in a smaller embedding distortion.

        Figure 5: Schematic diagram of the proposed algorithm’s resistance to detection

        5 Experimental results and analysis

        In order to verify the effectiveness of the proposed algorithm in this paper, we apply the robust watermarking algorithm in the document [Zareian and Tohidypour (2014)], the algorithm proposed and S-UNIWARD respectively in the MATLAB R2015a to realize the embedding and extracting of the message. The SPAM feature [Pevn, Bas and Fridrich(2010)] of the cover image and the stego image are extracted respectively to test the detection performance. The 2000 original images are randomly selected in BossBase-1.01 Image Library with the size 512×512. The binary sequences are randomly generated as secret message sequences to be embedded.

        The parameters of the algorithm are as follows: the bits of secret message are fixed at 96 bit; the scaling factor is varied from 0.25 to 2.0 in 0.25 increments; the three common interpolation method is used to scale the stego image; the distortion constant wetc ost =1013; the norm p=2, the length of a single segmented vector is 32.

        5.1 ParameterΔselection

        Parameter Δis the quantization step, it determines the extent to which the embedded message modifies the cover image. If it is too small, it is difficult to resist scaling attack,but if it is too large, the embedding will cause greater distortion to cover image, and the anti-detection performance is poor. Therefore, the purpose of this experiment is to find an optimal value formaking the algorithm proposed have maximum robustness along with maximum anti-detection.

        In this paper, 2000 images are embedded and extracted using the algorithm proposed, and the quantization stepis varied from 0.02 to 0.1 in 0.02 increments. In this section, the bilinear interpolation method is used to scale the images, and the scaling factors are 0.25,0.5, 0.75 and 1. The average extraction error rate and detection error rate in the 2000 images are obtained with the growth of Fig. 6 under different scaling factors.

        Figure 6: Extraction error rate of secret message under different quantization steps (left);Detection error rate of stego images under different quantization steps (right)

        From the graph, when the parameter, the change of the curve in the graph is larger, but when, the change tends to smooth. In order to balance the antiscaling performance and anti-detection performance of the algorithm, this paper chooses a compromise value to make the quantization step, which not only can maintain the anti-detection, but also can guarantee the secret message to be extracted completely and correctly after scaling higher probability.

        5.2 Scaling attack resistant experiment

        This section tests the algorithm performance in two parts of anti-scaling performance test and anti-scaling comparison experiment. 2000 images are secret randomly in BossBase-1.01 image library to embed the message and generate stego images. Then scale the stego images extract the secret message. The anti-scaling performance is evaluated through the average extraction bit error rate and exactly correct extraction rate of the secret message.The average extraction bit error rateis the number of message bits extracted mistakenly, and n is the total number of embedded message. The extraction rate exactly correctis the number of the stego images that can be extract the secret message completely and correctly,is the total number of the stego images.

        5.2.1 Anti-scaling performance test experiment

        The nearest neighbor interpolation method, bilinear interpolation method and bicubic interpolation method are used to scale the 2000 stego images, the scaling factors are from 0.25 to 2, interval 0.25, and then the secret messages are extracted from the scaled stego images. The average bit error rate and the correct extraction rate of the secret message from the 2000 stego images are obtained as shown in Fig. 7.

        Figure 7: The average bit error rate of secret message under different scaling factors(left); the correct extraction rate of secret message under different scaling factors (right)

        Fig. 7 shows that, with the scaling factor being less than 1, the average bit error rate of secret message decreases with the increase of the scaling factor, and the number of stego images that can extract the message completely and correctly increases. Because as the scaling factor increases, the loss of the secret message in the image decreases, the extraction error rate is reduced. At the same time, it can be seen that the algorithm is best for bicubic interpolation scaling attack. Using the bicubic interpolation method to scale the image, the scaled pixel is obtained by the weighted of the 16 pixels around it, so the computational complexity is the highest and the distortion of scaled image is the most accurate, so as to the bit error rate is lowest. Also, when the scaling factor is greater than 1, the bit error rate of massage in the stego images suffering the nearest neighbor interpolation method is lower than the other two interpolation methods. This is because when the nearest neighbor interpolation method is used to enlarge the image, the new pixels to be inserted are the original pixels closest to the new pixels coordinate. When scaled to the original size, the pixels of the stego image change little, so the bit error rate is the lowest.

        5.2.2 Anti-scaling comparison experiment

        2000 spatial images are randomly selected, and S-UNIWARD adaptive steganography algorithm [Holub and Fridrich (2013)], the algorithm proposed in this paper and the robust watermarking algorithm in Zareian et al. [Zareian and Tohidypour (2014)] are used to embed the secret message and generate stego images. Bicubic interpolation is used to scale the stego images and then extract the secret message. Fig. 8 is the average bit error rate of secret message extracted for the stego images after scaling. Fig. 9 is the extraction rate exactly correct of secret message.

        Figure 8: Extraction error rate of secret message under different scaling factors

        Figure 9: Extraction rate exactly correct of secret message under different scaling factors

        Fig. 8(a) shows that when the scaling factor is not 1, the extraction bit error rate of SUNIWARD steganography algorithm is higher, which is about 50%, equivalent to random guessing. However, the correction rate of extracting message in 2000 stego images generated by the algorithm proposed is over 93% when the scaling factor is greater than 0.5. Fig. 8(b) shows that the error rate of extracting message is flat with the original watermarking algorithm. When the scaling factor is 0.25, the algorithm proposed is higher, because the error diffusion of STCs coding, which leads to increase in error rate.In order to further illustrate the resistance of the algorithm to scaling attack, we also make a further statistic on the extraction rate exactly correct of secret message under different scaling factors, as shown in Fig. 9. For 2000 testing images, the stego images obtained by S-UNIWARD steganography algorithm after scaling attacks cannot extract the secret message exactly and correctly. For the proposed algorithm, when the scaling factor is 0.5,the proportion of message extracted completely and correctly is 62.65%, which is 20%higher than the original watermark algorithm.

        5.3 Statistical detection resistant experiment

        The SPAM feature [Pevn, Bas and Fridrich (2010)] of the original cover image, the stego image generated by the robust watermarking algorithm in literature [Zareian and Tohidypour (2014)], the proposed algorithm in this paper are extracted respectively. The average detection error rate EOOBis shown in Fig. 10 using the Ensemble Classifier for training and testing.

        The experimental results show that under the SPAM feature, the robustness of the proposed algorithm is about 2% higher than the original robust watermarking algorithm.Under the premise of no scaling attack, the detection of this algorithm is much lower than S-UNIWARD adaptive steganography algorithm. This is because under the same embedding rate, taking the ‘Lena’ as an example, the S-UNIWARD steganography algorithm changes the image to about 13 262144(4.959106e?5), however, in order to improve the anti-scaling performance of this algorithm, the change of the cover image is about50 128(0.390625). In order to improve the anti-scaling attack performance of this algorithm, only sacrificing some resistance detection, this is the reason why the algorithm detection error rate is lower than S-UNIWARD steganography algorithm.

        Figure 10: Detection error rate under different scaling factors

        6 Conclusion

        For the existing adaptive steganography algorithm is difficult to resist scaling attacks, and our earlier proposed algorithm resisting scaling attack and statistical detection only for the nearest neighbor interpolation scaling attack, this paper presents an image adaptive steganography algorithm based quantization index modulation of anti-scaling attacks and statistical detection. The algorithm first draws on the robust watermarking algorithm based on quantization index modulation to determine the embedded domain and embedding mode of secret message. Then, the spatial distortion function S-UNIWARD is used to construct the new embedding distortion, and the STCs code is used to embed the secret message, which improves the anti-detection performance of the algorithm while ensuring the robustness against scaling attack. The experimental results show that the average correct extraction rate of embedded messages increases from 50% to over 93%after 0.5 times scaling attack, compared with the classical steganography algorithm of SUNIWARD, and the algorithm has higher detection resistance than the original watermarking algorithm based on quantization index modulation. But the algorithm proposed in this paper is implemented under low embedding rate, so next we will study how to improve the embedding rate of the algorithm.

        Acknowledgement:This work was supported by the National Natural Science Foundation of China (No. 61379151, 61401512, 61572052, U1636219), the National Key Research and Development Program of China (No. 2016YFB0801303, 2016QY01W0105), and the Key Technologies Research and Development Program of Henan Provinces (No. 162102210032).

        成人欧美一区二区三区白人| 国产精品无码翘臀在线观看| 亚洲中文字幕无码天然素人在线| 亚洲综合精品成人| 亚洲精品美女自拍偷拍| 丝袜美腿亚洲综合久久| 色哟哟亚洲色精一区二区 | 中文无码一区二区不卡αv| 亚洲AV综合久久九九| 高清少妇一区二区三区| 久久精品中文少妇内射| 亚洲国产一区中文字幕| 黄色大片国产精品久久| 色综合天天综合网国产成人网| 国产亚洲午夜高清国产拍精品 | 手机在线观看亚洲av| 国产av剧情一区二区三区| 亚洲精品美女久久久久久久| 手机看片福利盒子久久青| 黄片午夜免费观看视频国产| 国产精品蝌蚪九色av综合网| 手机看片福利一区二区三区| 日本手机在线| 亚洲97成人精品久久久| 永久亚洲成a人片777777| 精品综合久久久久久97超人| 欧美日韩国产在线人成dvd| 国产一区二区三区成人| 亚洲乱码一区av春药高潮| 欧美在线视频免费观看| 国产成人夜色在线视频观看| 亚洲午夜狼人综合影院| 国产精品igao视频网| 亚洲欧美日韩精品高清| 韩国一区二区三区黄色录像| 大地资源中文第3页| 久久AV中文一区二区三区| 激情视频国产在线观看| 婷婷四虎东京热无码群交双飞视频 | 国产成人亚洲精品91专区高清| 蜜桃日本免费看mv免费版|