Chinese Journal of Network and Information Security ›› 2022, Vol. 8 ›› Issue (3): 18-28.doi: 10.11959/j.issn.2096-109x.2022029
• Topic: Multimedia Content Security • Previous Articles Next Articles
Zichi WANG1,2, Guorui FENG1, Xinpeng ZHANG1
Revised:
2022-05-06
Online:
2022-06-15
Published:
2022-06-01
Supported by:
CLC Number:
Zichi WANG, Guorui FENG, Xinpeng ZHANG. Steganography in NFT images[J]. Chinese Journal of Network and Information Security, 2022, 8(3): 18-28.
"
嵌入率/bit.pixel-1 | SPAM | maxSRMd2 | |||||||||||
HILL-o | HILL-p | MiPOD-o | MiPOD-p | DFEI-o | DFEI-p | HILL-o | HILL-p | MiPOD-o | MiPOD-p | DFEI-o | DFEI-p | ||
0.1 | 0.443 8 | 0.428 3 | 0.430 4 | 0.301 4 | 0.328 4 | 0.289 9 | |||||||
0.2 | 0.405 5 | 0.374 4 | 0.382 5 | 0.245 5 | 0.250 3 | 0.193 9 | |||||||
0.3 | 0.361 8 | 0.329 2 | 0.318 2 | 0.204 3 | 0.200 1 | 0.136 5 | |||||||
0.4 | 0.337 4 | 0.290 8 | 0.269 9 | 0.182 5 | 0.165 2 | 0.103 8 | |||||||
0.5 | 0.304 3 | 0.246 6 | 0.214 8 | 0.160 6 | 0.136 9 | 0.079 6 |
"
嵌入率/bit.pixel-1 | TLBP | SCRMQ1 | |||||||||||
HILL-o | HILL-p | MiPOD-o | MiPOD-p | DFEI-o | DFEI-p | HILL-o | HILL-p | MiPOD-o | MiPOD-p | DFEI-o | DFEI-p | ||
0.1 | 0.438 6 | 0.413 3 | 0.401 6 | 0.405 6 | 0.382 1 | 0.380 2 | |||||||
0.2 | 0.375 4 | 0.345 7 | 0.319 2 | 0.316 3 | 0.287 3 | 0.270 4 | |||||||
0.3 | 0.323 0 | 0.284 1 | 0.254 2 | 0.257 6 | 0.218 8 | 0.191 2 | |||||||
0.4 | 0.283 3 | 0.234 3 | 0.198 4 | 0.214 5 | 0.166 0 | 0.143 4 | |||||||
0.5 | 0.250 9 | 0.190 6 | 0.161 3 | 0.185 1 | 0.131 4 | 0.109 4 |
[1] | WANG Z C , FENG G R , REN Y L ,et al. Multichannel steganography in digital images for multiple receivers[J]. IEEE Multimedia, 2021,28(1): 65-73. |
[2] | WANG Z C , FENG G R , ZHANG X P . Repeatable data hiding:towards the reusability of digital images[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2022,32(1): 135-146. |
[3] | HU D H , WANG L , JIANG W J ,et al. A novel image steganography method via deep convolutional generative adversarial networks[J]. IEEE Access, 2018,6: 38303-38314. |
[4] | XU M T , FENG G R,R , REN Y L ,et al. On cloud storage optimization of blockchain with a clustering-based genetic algorithm[J]. IEEE Internet of Things Journal, 2020,7(9): 8547-8558. |
[5] | Bigverse[EB]. |
[6] | 孙曦, 张卫明, 俞能海 ,等. 基于空域图像变换参数扰动的隐写术[J]. 通信学报, 2017,38(10): 166-174. |
SUN X , ZHANG W M , YU N H ,et al. Steganography based on parameters' disturbance of spatial image transform[J]. Journal on Communications, 2017,38(10): 166-174. | |
[7] | WANG Z C , FENG G R , QIAN Z X ,et al. JPEG steganography with content similarity evaluation[J]. IEEE Transactions on Cybernetics, 2022: 1-12. |
[8] | FILLER T , JUDAS J , FRIDRICH J . Minimizing additive distortion in steganography using syndrome-trellis codes[J]. IEEE Transactions on Information Forensics and Security, 2011,6(3): 920-935. |
[9] | LI W X , ZHANG W M , LI L ,et al. Designing near-optimal steganographic codes in practice based on polar codes[J]. IEEE Transactions on Communications, 2020,68(7): 3948-3962. |
[10] | HOLUB V , FRIDRICH J . Designing steganographic distortion using directional filters[C]// Proceedings of 2012 IEEE International Workshop on Information Forensics and Security. 2012: 234-239. |
[11] | HOLUB V , FRIDRICH J . Digital image steganography using universal distortion[C]// Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security-IH&MMSec'13. 2013: 59-68. |
[12] | LI B , WANG M , HUANG J W ,et al. A new cost function for spatial image steganography[C]// Proceedings of 2014 IEEE International Conference on Image Processing. 2014: 4206-4210. |
[13] | SEDIGHI V , COGRANNE R , FRIDRICH J . Content-adaptive steganography by minimizing statistical detectability[J]. IEEE Transactions on Information Forensics and Security, 2016,11(2): 221-234. |
[14] | YANG J H , RUAN D Y , HUANG J W ,et al. An embedding cost learning framework using GAN[J]. IEEE Transactions on Information Forensics and Security, 2020,15: 839-851. |
[15] | RONNEBERGER O , FISCHER P , BROX T . U-Net:convolutional networks for biomedical image segmentation[C]// Proceedings of International Conference on Medical Image Computing and Computer- Assisted Intervention. 2015: 234-241. |
[16] | TANG W X , LI B , TAN S Q ,et al. CNN-based adversarial embedding for image steganography[J]. IEEE Transactions on Information Forensics and Security, 2019,14(8): 2074-2087. |
[17] | DENEMARK T , FRIDRICH J . Steganography with multiple JPEG images of the same scene[J]. IEEE Transactions on Information Forensics and Security, 2017,12(10): 2308-2319. |
[18] | CHEN K J , ZHANG W M , ZHOU H ,et al. Defining cost functions for adaptive steganography at the microscale[C]// Proceedings of 2016 IEEE International Workshop on Information Forensics and Security. 2016: 1-6. |
[19] | ZHANG W M , ZHANG Z , ZHANG L L ,et al. Decomposing joint distortion for adaptive steganography[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2017,27(10): 2274-2280. |
[20] | ZHOU W B , ZHANG W M , YU N H . A new rule for cost reassignment in adaptive steganography[J]. IEEE Transactions on Information Forensics and Security, 2017,12(11): 2654-2667. |
[21] | WANG Z C , QIAN Z X , ZHANG X P ,et al. On improving distortion functions for JPEG steganography[J]. IEEE Access, 2018,6: 74917-74930. |
[22] | LI W X , CHEN K J , ZHANG W M ,et al. JPEG steganography with estimated side-information[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2020,30(7): 2288-2294. |
[23] | SHI L N , WANG Z C , QIAN Z X ,et al. Distortion function for steganography in texture synthesized images[M]// Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing. Cham: Springer International Publishing, 2018: 313-320. |
[24] | LI S , CHEN X , WANG Z C ,et al. Data hiding in IRIS image for privacy protection[J]. IETE Technical Review, 2018,35: 34-41. |
[25] | SHI L N , WANG Z C , QIAN Z X ,et al. Distortion function for emoji image steganography[J]. Computers,Materials & Continua, 2019,59(3): 943-953. |
[26] | WANG Z , FENG G , ZHANG X . Steganographic distortion function for enhanced images[C]// Proceedings of the 19th International Workshop on Digital-forensics and Watermarking (IWDW 2020). 2020: 31-40. |
[27] | PEVNY T , BAS P , FRIDRICH J . Steganalysis by subtractive pixel adjacency matrix[J]. IEEE Transactions on Information Forensics and Security, 2010,5(2): 215-224. |
[28] | FRIDRICH J , KODOVSKY J . Rich models for steganalysis of digital images[J]. IEEE Transactions on Information Forensics and Security, 2012,7(3): 868-882. |
[29] | HOLUB V , FRIDRICH J . Random projections of residuals for digital image steganalysis[J]. IEEE Transactions on Information Forensics and Security, 2013,8(12): 1996-2006. |
[30] | DENEMARK T , SEDIGHI V , HOLUB V ,et al. Selection-channel-aware rich model for Steganalysis of digital images[C]// Proceedings of 2014 IEEE International Workshop on Information Forensics and Security. 2014: 48-53. |
[31] | GOLJAN M , FRIDRICH J , COGRANNE R . Rich model for Steganalysis of color images[C]// Proceedings of 2014 IEEE International Workshop on Information Forensics and Security. 2014: 185-190. |
[32] | LI B , LI Z P , ZHOU S J ,et al. New steganalytic features for spatial image steganography based on derivative filters and threshold LBP operator[J]. IEEE Transactions on Information Forensics and Security, 2018,13(5): 1242-1257. |
[33] | KODOVSKY J , FRIDRICH J , HOLUB V . Ensemble classifiers for steganalysis of digital media[J]. IEEE Transactions on Information Forensics and Security, 2012,7(2): 432-444. |
[34] | YE J , NI J Q , YI Y . Deep learning hierarchical representations for image steganalysis[J]. IEEE Transactions on Information Forensics and Security, 2017,12(11): 2545-2557. |
[35] | LI B , WEI W H , FERREIRA A ,et al. ReST-net:diverse activation modules and parallel subnets-based CNN for spatial image steganalysis[J]. IEEE Signal Processing Letters, 2018,25(5): 650-654. |
[36] | BOROUMAND M , CHEN M , FRIDRICH J . Deep residual network for steganalysis of digital images[J]. IEEE Transactions on Information Forensics and Security, 2019,14(5): 1181-1193. |
[37] | YOU W K , ZHANG H , ZHAO X F . A Siamese CNN for image steganalysis[J]. IEEE Transactions on Information Forensics and Security, 2021,16: 291-306. |
[38] | YANG H W , HE H , ZHANG W Z ,et al. FedSteg:a federated transfer learning framework for secure image steganalysis[J]. IEEE Transactions on Network Science and Engineering, 2021,8(2): 1084-1094. |
[39] | PEVNY T , FILLER T , BAS P . Using high-dimensional image models to perform highly undetectable steganography[C]// Proceedings of the 12th International Conference on Information Hiding. 2010: 161-177. |
[1] | Genlin XIE, Guozhen CHENG, Yawen WANG, Qingfeng WANG. Software diversity evaluating method based on gadget feature analysis [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 161-173. |
[2] | Benwei HE, Yunfei GUO, Yawen WANG, Qingfeng WANG, Hongchao HU. Software diversification method based on binary rewriting [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 94-103. |
[3] | Xiaoling SONG, Yong LIU, Jingnan DONG, Yongfei HUANG. Application and prospect of blockchain in Metaverse [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 45-65. |
[4] | Jiameng MEI, Yanzhen REN, Lina WANG. Generation-based linguistic steganography with controllable security [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 53-65. |
[5] | Menghan LI, Kejiang CHEN, Weiming ZHANG, Nenghai YU. Computationally secure steganography based on speech synthesis [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 134-141. |
[6] | Hailong WANG, Yangchun LI, Yuxiao LI. Research on evolution and security risk of Metaverse [J]. Chinese Journal of Network and Information Security, 2022, 8(2): 132-138. |
[7] | Yaofei WANG, Weiming ZHANG, Kejiang CHEN, Wenbo ZHOU, Nenghai YU. Survey on image non-additive steganography [J]. Chinese Journal of Network and Information Security, 2021, 7(6): 1-10. |
[8] | Yuxiang CHENG, Weiming ZHANG, Weixiang LI, Nenghai YU. Binary image steganography method based on layered embedding [J]. Chinese Journal of Network and Information Security, 2021, 7(5): 49-56. |
[9] | Haitao SONG,Guangming TANG,Yifeng SUN,Yang WANG. Digital steganography model and its formal description [J]. Chinese Journal of Network and Information Security, 2020, 6(3): 59-65. |
[10] | Jinglei TAN, Hongqi ZHANG, Cheng LEI, Xiaohu LIU, Shuo WANG. Research progress on moving target defense for SDN [J]. Chinese Journal of Network and Information Security, 2018, 4(7): 1-12. |
[11] | Ya-fei YUAN,Wei LU,Bing-wen FENG,Jian WENG. Online universal steganalysis system based on multiple pre-trained model [J]. Chinese Journal of Network and Information Security, 2017, 3(5): 32-37. |
[12] | Miao ZHANG,Xin-sheng JI,Jian-jian AI,Wen-yan LIU,Hong-chao HU,Shu-min HUO. Secure deployment strategy of virtual machines based on operating system diversity [J]. Chinese Journal of Network and Information Security, 2017, 3(10): 35-43. |
[13] | Deng-pan YE,Fang-fang MA,Yuan MEI. Steganalysis based on transfer learning [J]. Chinese Journal of Network and Information Security, 2017, 3(1): 23-30. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|