2024
DOI: 10.1109/tcsvt.2023.3294291
|View full text |Cite
|
Sign up to set email alerts
|

Payload-Independent Direct Cost Learning for Image Steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…where X, Y and m represent the cover image, stego image and the secret messages, respectively. Emb(•) denotes the embedding conducted by the steganographic codes, D(•) represents the distortion of transferring the cover into a stego image, and H refers to the parity-check matrix of code C, while C(m) is the coset corresponding to syndrome m. At present, various steganographic schemes have been proposed for designing distortion cost functions with symmetric embedding, which can be mainly categorized into three groups: (1) heuristically designed schemes, such as WOWs (Wavelet-Obtained Weights) [10], UNIWARD (Universal Wavelet Relative Distortion) [11], HiLL (High-pass, Low-pass, and Low-pass) [12], QMP (Quaternion Magnitude-Phase) [13], UERD (Uniform Embedding Revisited Distortion) [14] and GUED (Generalized Uniform Embedding Distortion) [15]; (2) statistical-model-based schemes, such as MG (Multivariate Gaussian) [16], MiPOD (Minimizing the Power of the Optimal Detector) [17] and JMiPOD (JPEG steganography by MiPOD) [18]; and (3) deep-learning-based schemes, such as UT-GAN (U-net and double-Tanh framework using Generative Adversarial Network) [19], SPAR-RL (Steganographic Pixel-wise Actions and Rewards with Reinforcement Learning) [20], PICO-RL (Payload-Independent Cost learning framework using RL) [21], JS-GAN (JPEG Steganography using a GAN) [22] and JEC-RL (JPEG Embedding Cost with RL) [23]. It is worth noting that each of these designs can only be implemented on a specific type of image format, either spatial or JPEG; e.g., HiLL is specifically designed for spatial images and cannot be used for JPEG images.…”
Section: Introductionmentioning
confidence: 99%
“…where X, Y and m represent the cover image, stego image and the secret messages, respectively. Emb(•) denotes the embedding conducted by the steganographic codes, D(•) represents the distortion of transferring the cover into a stego image, and H refers to the parity-check matrix of code C, while C(m) is the coset corresponding to syndrome m. At present, various steganographic schemes have been proposed for designing distortion cost functions with symmetric embedding, which can be mainly categorized into three groups: (1) heuristically designed schemes, such as WOWs (Wavelet-Obtained Weights) [10], UNIWARD (Universal Wavelet Relative Distortion) [11], HiLL (High-pass, Low-pass, and Low-pass) [12], QMP (Quaternion Magnitude-Phase) [13], UERD (Uniform Embedding Revisited Distortion) [14] and GUED (Generalized Uniform Embedding Distortion) [15]; (2) statistical-model-based schemes, such as MG (Multivariate Gaussian) [16], MiPOD (Minimizing the Power of the Optimal Detector) [17] and JMiPOD (JPEG steganography by MiPOD) [18]; and (3) deep-learning-based schemes, such as UT-GAN (U-net and double-Tanh framework using Generative Adversarial Network) [19], SPAR-RL (Steganographic Pixel-wise Actions and Rewards with Reinforcement Learning) [20], PICO-RL (Payload-Independent Cost learning framework using RL) [21], JS-GAN (JPEG Steganography using a GAN) [22] and JEC-RL (JPEG Embedding Cost with RL) [23]. It is worth noting that each of these designs can only be implemented on a specific type of image format, either spatial or JPEG; e.g., HiLL is specifically designed for spatial images and cannot be used for JPEG images.…”
Section: Introductionmentioning
confidence: 99%