2013 IEEE International Conference on Acoustics, Speech and Signal Processing 2013
DOI: 10.1109/icassp.2013.6638198
|View full text |Cite
|
Sign up to set email alerts
|

Multivariate gaussian model for designing additive distortion for steganography

Abstract: Currently, the most successful approach to steganography in empirical objects, such as digital media, is to cast the embedding problem as source coding with a fidelity constraint. The sender specifies the costs of changing each cover element and then embeds a given payload by minimizing the total embedding cost. Since efficient practical codes exist that embed near the rate-distortion bound, the remaining task left to the steganographer is the fidelity measure -the choice of the costs. In the past, the costs w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
77
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 112 publications
(77 citation statements)
references
References 16 publications
0
77
0
Order By: Relevance
“…These techniques are designed by finding a model for cover images, and embedding modifications are done in such a way that this model is preserved. Highly undetectable stego (HUGO) [5], ASO [17], universal wavelet relative distortion (UNIWARD) [18], and maximum mean discrepancy (MMD) [19] [20], a non-heuristic distortion function is used to preserve the Kullback Leibler distance.…”
Section: Literature Reviewmentioning
confidence: 99%
“…These techniques are designed by finding a model for cover images, and embedding modifications are done in such a way that this model is preserved. Highly undetectable stego (HUGO) [5], ASO [17], universal wavelet relative distortion (UNIWARD) [18], and maximum mean discrepancy (MMD) [19] [20], a non-heuristic distortion function is used to preserve the Kullback Leibler distance.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Recently, many approaches design distortion function begin with a good statistic image model. Different to WOW, S-UNIWARD, or HILL, MG (Multivariate Gaussian) [19] adopt a different strategy in which the cover is modeled as a sequence of independent but not necessarily identically distributed quantized Gaussians. Then, the costs (the probabilities of modifying each pixel or change rates) are computed analytically from the estimated model in order to minimize the Kullback-Leibler divergence between the cover and stego distributions or, equivalently, the power of an optimal statistical test.…”
Section: Model Driven Methodsmentioning
confidence: 99%
“…The MiPOD scheme was proposed by Sedighi et al in 2015. The major contribution of the MiPOD scheme is that the pixel values are changed by at most ±1 when a secure message is embedded into the cover image with the Gaussian cover model [22,23], and Sedighi et al also considered a novel detectability-limited sender and estimated the secure payload of each cover image. In Figure 9, the vertical axis represents the error rate obtained by the SPAM method, and the horizontal axis represents the embedding rate (bpp), which ranges from 0.1 bpp to 6.7 bpp.…”
Section: Image Steganalysismentioning
confidence: 99%